/usr/share/scap-security-guide/ssg-centos6-ds.xml is in ssg-nondebian 0.1.31-5.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915 2916 2917 2918 2919 2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982 2983 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666 3667 3668 3669 3670 3671 3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682 3683 3684 3685 3686 3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703 3704 3705 3706 3707 3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767 3768 3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783 3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825 3826 3827 3828 3829 3830 3831 3832 3833 3834 3835 3836 3837 3838 3839 3840 3841 3842 3843 3844 3845 3846 3847 3848 3849 3850 3851 3852 3853 3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 3864 3865 3866 3867 3868 3869 3870 3871 3872 3873 3874 3875 3876 3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889 3890 3891 3892 3893 3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926 3927 3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938 3939 3940 3941 3942 3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964 3965 3966 3967 3968 3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994 3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036 4037 4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066 4067 4068 4069 4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083 4084 4085 4086 4087 4088 4089 4090 4091 4092 4093 4094 4095 4096 4097 4098 4099 4100 4101 4102 4103 4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203 4204 4205 4206 4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217 4218 4219 4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262 4263 4264 4265 4266 4267 4268 4269 4270 4271 4272 4273 4274 4275 4276 4277 4278 4279 4280 4281 4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309 4310 4311 4312 4313 4314 4315 4316 4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340 4341 4342 4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411 4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430 4431 4432 4433 4434 4435 4436 4437 4438 4439 4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450 4451 4452 4453 4454 4455 4456 4457 4458 4459 4460 4461 4462 4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499 4500 4501 4502 4503 4504 4505 4506 4507 4508 4509 4510 4511 4512 4513 4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553 4554 4555 4556 4557 4558 4559 4560 4561 4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580 4581 4582 4583 4584 4585 4586 4587 4588 4589 4590 4591 4592 4593 4594 4595 4596 4597 4598 4599 4600 4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622 4623 4624 4625 4626 4627 4628 4629 4630 4631 4632 4633 4634 4635 4636 4637 4638 4639 4640 4641 4642 4643 4644 4645 4646 4647 4648 4649 4650 4651 4652 4653 4654 4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666 4667 4668 4669 4670 4671 4672 4673 4674 4675 4676 4677 4678 4679 4680 4681 4682 4683 4684 4685 4686 4687 4688 4689 4690 4691 4692 4693 4694 4695 4696 4697 4698 4699 4700 4701 4702 4703 4704 4705 4706 4707 4708 4709 4710 4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722 4723 4724 4725 4726 4727 4728 4729 4730 4731 4732 4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762 4763 4764 4765 4766 4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779 4780 4781 4782 4783 4784 4785 4786 4787 4788 4789 4790 4791 4792 4793 4794 4795 4796 4797 4798 4799 4800 4801 4802 4803 4804 4805 4806 4807 4808 4809 4810 4811 4812 4813 4814 4815 4816 4817 4818 4819 4820 4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847 4848 4849 4850 4851 4852 4853 4854 4855 4856 4857 4858 4859 4860 4861 4862 4863 4864 4865 4866 4867 4868 4869 4870 4871 4872 4873 4874 4875 4876 4877 4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888 4889 4890 4891 4892 4893 4894 4895 4896 4897 4898 4899 4900 4901 4902 4903 4904 4905 4906 4907 4908 4909 4910 4911 4912 4913 4914 4915 4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928 4929 4930 4931 4932 4933 4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945 4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956 4957 4958 4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971 4972 4973 4974 4975 4976 4977 4978 4979 4980 4981 4982 4983 4984 4985 4986 4987 4988 4989 4990 4991 4992 4993 4994 4995 4996 4997 4998 4999 5000 5001 5002 5003 5004 5005 5006 5007 5008 5009 5010 5011 5012 5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106 5107 5108 5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133 5134 5135 5136 5137 5138 5139 5140 5141 5142 5143 5144 5145 5146 5147 5148 5149 5150 5151 5152 5153 5154 5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166 5167 5168 5169 5170 5171 5172 5173 5174 5175 5176 5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187 5188 5189 5190 5191 5192 5193 5194 5195 5196 5197 5198 5199 5200 5201 5202 5203 5204 5205 5206 5207 5208 5209 5210 5211 5212 5213 5214 5215 5216 5217 5218 5219 5220 5221 5222 5223 5224 5225 5226 5227 5228 5229 5230 5231 5232 5233 5234 5235 5236 5237 5238 5239 5240 5241 5242 5243 5244 5245 5246 5247 5248 5249 5250 5251 5252 5253 5254 5255 5256 5257 5258 5259 5260 5261 5262 5263 5264 5265 5266 5267 5268 5269 5270 5271 5272 5273 5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291 5292 5293 5294 5295 5296 5297 5298 5299 5300 5301 5302 5303 5304 5305 5306 5307 5308 5309 5310 5311 5312 5313 5314 5315 5316 5317 5318 5319 5320 5321 5322 5323 5324 5325 5326 5327 5328 5329 5330 5331 5332 5333 5334 5335 5336 5337 5338 5339 5340 5341 5342 5343 5344 5345 5346 5347 5348 5349 5350 5351 5352 5353 5354 5355 5356 5357 5358 5359 5360 5361 5362 5363 5364 5365 5366 5367 5368 5369 5370 5371 5372 5373 5374 5375 5376 5377 5378 5379 5380 5381 5382 5383 5384 5385 5386 5387 5388 5389 5390 5391 5392 5393 5394 5395 5396 5397 5398 5399 5400 5401 5402 5403 5404 5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420 5421 5422 5423 5424 5425 5426 5427 5428 5429 5430 5431 5432 5433 5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446 5447 5448 5449 5450 5451 5452 5453 5454 5455 5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499 5500 5501 5502 5503 5504 5505 5506 5507 5508 5509 5510 5511 5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526 5527 5528 5529 5530 5531 5532 5533 5534 5535 5536 5537 5538 5539 5540 5541 5542 5543 5544 5545 5546 5547 5548 5549 5550 5551 5552 5553 5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603 5604 5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643 5644 5645 5646 5647 5648 5649 5650 5651 5652 5653 5654 5655 5656 5657 5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704 5705 5706 5707 5708 5709 5710 5711 5712 5713 5714 5715 5716 5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732 5733 5734 5735 5736 5737 5738 5739 5740 5741 5742 5743 5744 5745 5746 5747 5748 5749 5750 5751 5752 5753 5754 5755 5756 5757 5758 5759 5760 5761 5762 5763 5764 5765 5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776 5777 5778 5779 5780 5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803 5804 5805 5806 5807 5808 5809 5810 5811 5812 5813 5814 5815 5816 5817 5818 5819 5820 5821 5822 5823 5824 5825 5826 5827 5828 5829 5830 5831 5832 5833 5834 5835 5836 5837 5838 5839 5840 5841 5842 5843 5844 5845 5846 5847 5848 5849 5850 5851 5852 5853 5854 5855 5856 5857 5858 5859 5860 5861 5862 5863 5864 5865 5866 5867 5868 5869 5870 5871 5872 5873 5874 5875 5876 5877 5878 5879 5880 5881 5882 5883 5884 5885 5886 5887 5888 5889 5890 5891 5892 5893 5894 5895 5896 5897 5898 5899 5900 5901 5902 5903 5904 5905 5906 5907 5908 5909 5910 5911 5912 5913 5914 5915 5916 5917 5918 5919 5920 5921 5922 5923 5924 5925 5926 5927 5928 5929 5930 5931 5932 5933 5934 5935 5936 5937 5938 5939 5940 5941 5942 5943 5944 5945 5946 5947 5948 5949 5950 5951 5952 5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969 5970 5971 5972 5973 5974 5975 5976 5977 5978 5979 5980 5981 5982 5983 5984 5985 5986 5987 5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009 6010 6011 6012 6013 6014 6015 6016 6017 6018 6019 6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045 6046 6047 6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091 6092 6093 6094 6095 6096 6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318 6319 6320 6321 6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338 6339 6340 6341 6342 6343 6344 6345 6346 6347 6348 6349 6350 6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361 6362 6363 6364 6365 6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379 6380 6381 6382 6383 6384 6385 6386 6387 6388 6389 6390 6391 6392 6393 6394 6395 6396 6397 6398 6399 6400 6401 6402 6403 6404 6405 6406 6407 6408 6409 6410 6411 6412 6413 6414 6415 6416 6417 6418 6419 6420 6421 6422 6423 6424 6425 6426 6427 6428 6429 6430 6431 6432 6433 6434 6435 6436 6437 6438 6439 6440 6441 6442 6443 6444 6445 6446 6447 6448 6449 6450 6451 6452 6453 6454 6455 6456 6457 6458 6459 6460 6461 6462 6463 6464 6465 6466 6467 6468 6469 6470 6471 6472 6473 6474 6475 6476 6477 6478 6479 6480 6481 6482 6483 6484 6485 6486 6487 6488 6489 6490 6491 6492 6493 6494 6495 6496 6497 6498 6499 6500 6501 6502 6503 6504 6505 6506 6507 6508 6509 6510 6511 6512 6513 6514 6515 6516 6517 6518 6519 6520 6521 6522 6523 6524 6525 6526 6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537 6538 6539 6540 6541 6542 6543 6544 6545 6546 6547 6548 6549 6550 6551 6552 6553 6554 6555 6556 6557 6558 6559 6560 6561 6562 6563 6564 6565 6566 6567 6568 6569 6570 6571 6572 6573 6574 6575 6576 6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597 6598 6599 6600 6601 6602 6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622 6623 6624 6625 6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648 6649 6650 6651 6652 6653 6654 6655 6656 6657 6658 6659 6660 6661 6662 6663 6664 6665 6666 6667 6668 6669 6670 6671 6672 6673 6674 6675 6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689 6690 6691 6692 6693 6694 6695 6696 6697 6698 6699 6700 6701 6702 6703 6704 6705 6706 6707 6708 6709 6710 6711 6712 6713 6714 6715 6716 6717 6718 6719 6720 6721 6722 6723 6724 6725 6726 6727 6728 6729 6730 6731 6732 6733 6734 6735 6736 6737 6738 6739 6740 6741 6742 6743 6744 6745 6746 6747 6748 6749 6750 6751 6752 6753 6754 6755 6756 6757 6758 6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769 6770 6771 6772 6773 6774 6775 6776 6777 6778 6779 6780 6781 6782 6783 6784 6785 6786 6787 6788 6789 6790 6791 6792 6793 6794 6795 6796 6797 6798 6799 6800 6801 6802 6803 6804 6805 6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816 6817 6818 6819 6820 6821 6822 6823 6824 6825 6826 6827 6828 6829 6830 6831 6832 6833 6834 6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845 6846 6847 6848 6849 6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938 6939 6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990 6991 6992 6993 6994 6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011 7012 7013 7014 7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036 7037 7038 7039 7040 7041 7042 7043 7044 7045 7046 7047 7048 7049 7050 7051 7052 7053 7054 7055 7056 7057 7058 7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079 7080 7081 7082 7083 7084 7085 7086 7087 7088 7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128 7129 7130 7131 7132 7133 7134 7135 7136 7137 7138 7139 7140 7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167 7168 7169 7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200 7201 7202 7203 7204 7205 7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227 7228 7229 7230 7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282 7283 7284 7285 7286 7287 7288 7289 7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305 7306 7307 7308 7309 7310 7311 7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334 7335 7336 7337 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367 7368 7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386 7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 7426 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471 7472 7473 7474 7475 7476 7477 7478 7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490 7491 7492 7493 7494 7495 7496 7497 7498 7499 7500 7501 7502 7503 7504 7505 7506 7507 7508 7509 7510 7511 7512 7513 7514 7515 7516 7517 7518 7519 7520 7521 7522 7523 7524 7525 7526 7527 7528 7529 7530 7531 7532 7533 7534 7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546 7547 7548 7549 7550 7551 7552 7553 7554 7555 7556 7557 7558 7559 7560 7561 7562 7563 7564 7565 7566 7567 7568 7569 7570 7571 7572 7573 7574 7575 7576 7577 7578 7579 7580 7581 7582 7583 7584 7585 7586 7587 7588 7589 7590 7591 7592 7593 7594 7595 7596 7597 7598 7599 7600 7601 7602 7603 7604 7605 7606 7607 7608 7609 7610 7611 7612 7613 7614 7615 7616 7617 7618 7619 7620 7621 7622 7623 7624 7625 7626 7627 7628 7629 7630 7631 7632 7633 7634 7635 7636 7637 7638 7639 7640 7641 7642 7643 7644 7645 7646 7647 7648 7649 7650 7651 7652 7653 7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664 7665 7666 7667 7668 7669 7670 7671 7672 7673 7674 7675 7676 7677 7678 7679 7680 7681 7682 7683 7684 7685 7686 7687 7688 7689 7690 7691 7692 7693 7694 7695 7696 7697 7698 7699 7700 7701 7702 7703 7704 7705 7706 7707 7708 7709 7710 7711 7712 7713 7714 7715 7716 7717 7718 7719 7720 7721 7722 7723 7724 7725 7726 7727 7728 7729 7730 7731 7732 7733 7734 7735 7736 7737 7738 7739 7740 7741 7742 7743 7744 7745 7746 7747 7748 7749 7750 7751 7752 7753 7754 7755 7756 7757 7758 7759 7760 7761 7762 7763 7764 7765 7766 7767 7768 7769 7770 7771 7772 7773 7774 7775 7776 7777 7778 7779 7780 7781 7782 7783 7784 7785 7786 7787 7788 7789 7790 7791 7792 7793 7794 7795 7796 7797 7798 7799 7800 7801 7802 7803 7804 7805 7806 7807 7808 7809 7810 7811 7812 7813 7814 7815 7816 7817 7818 7819 7820 7821 7822 7823 7824 7825 7826 7827 7828 7829 7830 7831 7832 7833 7834 7835 7836 7837 7838 7839 7840 7841 7842 7843 7844 7845 7846 7847 7848 7849 7850 7851 7852 7853 7854 7855 7856 7857 7858 7859 7860 7861 7862 7863 7864 7865 7866 7867 7868 7869 7870 7871 7872 7873 7874 7875 7876 7877 7878 7879 7880 7881 7882 7883 7884 7885 7886 7887 7888 7889 7890 7891 7892 7893 7894 7895 7896 7897 7898 7899 7900 7901 7902 7903 7904 7905 7906 7907 7908 7909 7910 7911 7912 7913 7914 7915 7916 7917 7918 7919 7920 7921 7922 7923 7924 7925 7926 7927 7928 7929 7930 7931 7932 7933 7934 7935 7936 7937 7938 7939 7940 7941 7942 7943 7944 7945 7946 7947 7948 7949 7950 7951 7952 7953 7954 7955 7956 7957 7958 7959 7960 7961 7962 7963 7964 7965 7966 7967 7968 7969 7970 7971 7972 7973 7974 7975 7976 7977 7978 7979 7980 7981 7982 7983 7984 7985 7986 7987 7988 7989 7990 7991 7992 7993 7994 7995 7996 7997 7998 7999 8000 8001 8002 8003 8004 8005 8006 8007 8008 8009 8010 8011 8012 8013 8014 8015 8016 8017 8018 8019 8020 8021 8022 8023 8024 8025 8026 8027 8028 8029 8030 8031 8032 8033 8034 8035 8036 8037 8038 8039 8040 8041 8042 8043 8044 8045 8046 8047 8048 8049 8050 8051 8052 8053 8054 8055 8056 8057 8058 8059 8060 8061 8062 8063 8064 8065 8066 8067 8068 8069 8070 8071 8072 8073 8074 8075 8076 8077 8078 8079 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8091 8092 8093 8094 8095 8096 8097 8098 8099 8100 8101 8102 8103 8104 8105 8106 8107 8108 8109 8110 8111 8112 8113 8114 8115 8116 8117 8118 8119 8120 8121 8122 8123 8124 8125 8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145 8146 8147 8148 8149 8150 8151 8152 8153 8154 8155 8156 8157 8158 8159 8160 8161 8162 8163 8164 8165 8166 8167 8168 8169 8170 8171 8172 8173 8174 8175 8176 8177 8178 8179 8180 8181 8182 8183 8184 8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205 8206 8207 8208 8209 8210 8211 8212 8213 8214 8215 8216 8217 8218 8219 8220 8221 8222 8223 8224 8225 8226 8227 8228 8229 8230 8231 8232 8233 8234 8235 8236 8237 8238 8239 8240 8241 8242 8243 8244 8245 8246 8247 8248 8249 8250 8251 8252 8253 8254 8255 8256 8257 8258 8259 8260 8261 8262 8263 8264 8265 8266 8267 8268 8269 8270 8271 8272 8273 8274 8275 8276 8277 8278 8279 8280 8281 8282 8283 8284 8285 8286 8287 8288 8289 8290 8291 8292 8293 8294 8295 8296 8297 8298 8299 8300 8301 8302 8303 8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314 8315 8316 8317 8318 8319 8320 8321 8322 8323 8324 8325 8326 8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343 8344 8345 8346 8347 8348 8349 8350 8351 8352 8353 8354 8355 8356 8357 8358 8359 8360 8361 8362 8363 8364 8365 8366 8367 8368 8369 8370 8371 8372 8373 8374 8375 8376 8377 8378 8379 8380 8381 8382 8383 8384 8385 8386 8387 8388 8389 8390 8391 8392 8393 8394 8395 8396 8397 8398 8399 8400 8401 8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435 8436 8437 8438 8439 8440 8441 8442 8443 8444 8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469 8470 8471 8472 8473 8474 8475 8476 8477 8478 8479 8480 8481 8482 8483 8484 8485 8486 8487 8488 8489 8490 8491 8492 8493 8494 8495 8496 8497 8498 8499 8500 8501 8502 8503 8504 8505 8506 8507 8508 8509 8510 8511 8512 8513 8514 8515 8516 8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568 8569 8570 8571 8572 8573 8574 8575 8576 8577 8578 8579 8580 8581 8582 8583 8584 8585 8586 8587 8588 8589 8590 8591 8592 8593 8594 8595 8596 8597 8598 8599 8600 8601 8602 8603 8604 8605 8606 8607 8608 8609 8610 8611 8612 8613 8614 8615 8616 8617 8618 8619 8620 8621 8622 8623 8624 8625 8626 8627 8628 8629 8630 8631 8632 8633 8634 8635 8636 8637 8638 8639 8640 8641 8642 8643 8644 8645 8646 8647 8648 8649 8650 8651 8652 8653 8654 8655 8656 8657 8658 8659 8660 8661 8662 8663 8664 8665 8666 8667 8668 8669 8670 8671 8672 8673 8674 8675 8676 8677 8678 8679 8680 8681 8682 8683 8684 8685 8686 8687 8688 8689 8690 8691 8692 8693 8694 8695 8696 8697 8698 8699 8700 8701 8702 8703 8704 8705 8706 8707 8708 8709 8710 8711 8712 8713 8714 8715 8716 8717 8718 8719 8720 8721 8722 8723 8724 8725 8726 8727 8728 8729 8730 8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741 8742 8743 8744 8745 8746 8747 8748 8749 8750 8751 8752 8753 8754 8755 8756 8757 8758 8759 8760 8761 8762 8763 8764 8765 8766 8767 8768 8769 8770 8771 8772 8773 8774 8775 8776 8777 8778 8779 8780 8781 8782 8783 8784 8785 8786 8787 8788 8789 8790 8791 8792 8793 8794 8795 8796 8797 8798 8799 8800 8801 8802 8803 8804 8805 8806 8807 8808 8809 8810 8811 8812 8813 8814 8815 8816 8817 8818 8819 8820 8821 8822 8823 8824 8825 8826 8827 8828 8829 8830 8831 8832 8833 8834 8835 8836 8837 8838 8839 8840 8841 8842 8843 8844 8845 8846 8847 8848 8849 8850 8851 8852 8853 8854 8855 8856 8857 8858 8859 8860 8861 8862 8863 8864 8865 8866 8867 8868 8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883 8884 8885 8886 8887 8888 8889 8890 8891 8892 8893 8894 8895 8896 8897 8898 8899 8900 8901 8902 8903 8904 8905 8906 8907 8908 8909 8910 8911 8912 8913 8914 8915 8916 8917 8918 8919 8920 8921 8922 8923 8924 8925 8926 8927 8928 8929 8930 8931 8932 8933 8934 8935 8936 8937 8938 8939 8940 8941 8942 8943 8944 8945 8946 8947 8948 8949 8950 8951 8952 8953 8954 8955 8956 8957 8958 8959 8960 8961 8962 8963 8964 8965 8966 8967 8968 8969 8970 8971 8972 8973 8974 8975 8976 8977 8978 8979 8980 8981 8982 8983 8984 8985 8986 8987 8988 8989 8990 8991 8992 8993 8994 8995 8996 8997 8998 8999 9000 9001 9002 9003 9004 9005 9006 9007 9008 9009 9010 9011 9012 9013 9014 9015 9016 9017 9018 9019 9020 9021 9022 9023 9024 9025 9026 9027 9028 9029 9030 9031 9032 9033 9034 9035 9036 9037 9038 9039 9040 9041 9042 9043 9044 9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090 9091 9092 9093 9094 9095 9096 9097 9098 9099 9100 9101 9102 9103 9104 9105 9106 9107 9108 9109 9110 9111 9112 9113 9114 9115 9116 9117 9118 9119 9120 9121 9122 9123 9124 9125 9126 9127 9128 9129 9130 9131 9132 9133 9134 9135 9136 9137 9138 9139 9140 9141 9142 9143 9144 9145 9146 9147 9148 9149 9150 9151 9152 9153 9154 9155 9156 9157 9158 9159 9160 9161 9162 9163 9164 9165 9166 9167 9168 9169 9170 9171 9172 9173 9174 9175 9176 9177 9178 9179 9180 9181 9182 9183 9184 9185 9186 9187 9188 9189 9190 9191 9192 9193 9194 9195 9196 9197 9198 9199 9200 9201 9202 9203 9204 9205 9206 9207 9208 9209 9210 9211 9212 9213 9214 9215 9216 9217 9218 9219 9220 9221 9222 9223 9224 9225 9226 9227 9228 9229 9230 9231 9232 9233 9234 9235 9236 9237 9238 9239 9240 9241 9242 9243 9244 9245 9246 9247 9248 9249 9250 9251 9252 9253 9254 9255 9256 9257 9258 9259 9260 9261 9262 9263 9264 9265 9266 9267 9268 9269 9270 9271 9272 9273 9274 9275 9276 9277 9278 9279 9280 9281 9282 9283 9284 9285 9286 9287 9288 9289 9290 9291 9292 9293 9294 9295 9296 9297 9298 9299 9300 9301 9302 9303 9304 9305 9306 9307 9308 9309 9310 9311 9312 9313 9314 9315 9316 9317 9318 9319 9320 9321 9322 9323 9324 9325 9326 9327 9328 9329 9330 9331 9332 9333 9334 9335 9336 9337 9338 9339 9340 9341 9342 9343 9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355 9356 9357 9358 9359 9360 9361 9362 9363 9364 9365 9366 9367 9368 9369 9370 9371 9372 9373 9374 9375 9376 9377 9378 9379 9380 9381 9382 9383 9384 9385 9386 9387 9388 9389 9390 9391 9392 9393 9394 9395 9396 9397 9398 9399 9400 9401 9402 9403 9404 9405 9406 9407 9408 9409 9410 9411 9412 9413 9414 9415 9416 9417 9418 9419 9420 9421 9422 9423 9424 9425 9426 9427 9428 9429 9430 9431 9432 9433 9434 9435 9436 9437 9438 9439 9440 9441 9442 9443 9444 9445 9446 9447 9448 9449 9450 9451 9452 9453 9454 9455 9456 9457 9458 9459 9460 9461 9462 9463 9464 9465 9466 9467 9468 9469 9470 9471 9472 9473 9474 9475 9476 9477 9478 9479 9480 9481 9482 9483 9484 9485 9486 9487 9488 9489 9490 9491 9492 9493 9494 9495 9496 9497 9498 9499 9500 9501 9502 9503 9504 9505 9506 9507 9508 9509 9510 9511 9512 9513 9514 9515 9516 9517 9518 9519 9520 9521 9522 9523 9524 9525 9526 9527 9528 9529 9530 9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542 9543 9544 9545 9546 9547 9548 9549 9550 9551 9552 9553 9554 9555 9556 9557 9558 9559 9560 9561 9562 9563 9564 9565 9566 9567 9568 9569 9570 9571 9572 9573 9574 9575 9576 9577 9578 9579 9580 9581 9582 9583 9584 9585 9586 9587 9588 9589 9590 9591 9592 9593 9594 9595 9596 9597 9598 9599 9600 9601 9602 9603 9604 9605 9606 9607 9608 9609 9610 9611 9612 9613 9614 9615 9616 9617 9618 9619 9620 9621 9622 9623 9624 9625 9626 9627 9628 9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640 9641 9642 9643 9644 9645 9646 9647 9648 9649 9650 9651 9652 9653 9654 9655 9656 9657 9658 9659 9660 9661 9662 9663 9664 9665 9666 9667 9668 9669 9670 9671 9672 9673 9674 9675 9676 9677 9678 9679 9680 9681 9682 9683 9684 9685 9686 9687 9688 9689 9690 9691 9692 9693 9694 9695 9696 9697 9698 9699 9700 9701 9702 9703 9704 9705 9706 9707 9708 9709 9710 9711 9712 9713 9714 9715 9716 9717 9718 9719 9720 9721 9722 9723 9724 9725 9726 9727 9728 9729 9730 9731 9732 9733 9734 9735 9736 9737 9738 9739 9740 9741 9742 9743 9744 9745 9746 9747 9748 9749 9750 9751 9752 9753 9754 9755 9756 9757 9758 9759 9760 9761 9762 9763 9764 9765 9766 9767 9768 9769 9770 9771 9772 9773 9774 9775 9776 9777 9778 9779 9780 9781 9782 9783 9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815 9816 9817 9818 9819 9820 9821 9822 9823 9824 9825 9826 9827 9828 9829 9830 9831 9832 9833 9834 9835 9836 9837 9838 9839 9840 9841 9842 9843 9844 9845 9846 9847 9848 9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866 9867 9868 9869 9870 9871 9872 9873 9874 9875 9876 9877 9878 9879 9880 9881 9882 9883 9884 9885 9886 9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898 9899 9900 9901 9902 9903 9904 9905 9906 9907 9908 9909 9910 9911 9912 9913 9914 9915 9916 9917 9918 9919 9920 9921 9922 9923 9924 9925 9926 9927 9928 9929 9930 9931 9932 9933 9934 9935 9936 9937 9938 9939 9940 9941 9942 9943 9944 9945 9946 9947 9948 9949 9950 9951 9952 9953 9954 9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965 9966 9967 9968 9969 9970 9971 9972 9973 9974 9975 9976 9977 9978 9979 9980 9981 9982 9983 9984 9985 9986 9987 9988 9989 9990 9991 9992 9993 9994 9995 9996 9997 9998 9999 10000 10001 10002 10003 10004 10005 10006 10007 10008 10009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023 10024 10025 10026 10027 10028 10029 10030 10031 10032 10033 10034 10035 10036 10037 10038 10039 10040 10041 10042 10043 10044 10045 10046 10047 10048 10049 10050 10051 10052 10053 10054 10055 10056 10057 10058 10059 10060 10061 10062 10063 10064 10065 10066 10067 10068 10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080 10081 10082 10083 10084 10085 10086 10087 10088 10089 10090 10091 10092 10093 10094 10095 10096 10097 10098 10099 10100 10101 10102 10103 10104 10105 10106 10107 10108 10109 10110 10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127 10128 10129 10130 10131 10132 10133 10134 10135 10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147 10148 10149 10150 10151 10152 10153 10154 10155 10156 10157 10158 10159 10160 10161 10162 10163 10164 10165 10166 10167 10168 10169 10170 10171 10172 10173 10174 10175 10176 10177 10178 10179 10180 10181 10182 10183 10184 10185 10186 10187 10188 10189 10190 10191 10192 10193 10194 10195 10196 10197 10198 10199 10200 10201 10202 10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224 10225 10226 10227 10228 10229 10230 10231 10232 10233 10234 10235 10236 10237 10238 10239 10240 10241 10242 10243 10244 10245 10246 10247 10248 10249 10250 10251 10252 10253 10254 10255 10256 10257 10258 10259 10260 10261 10262 10263 10264 10265 10266 10267 10268 10269 10270 10271 10272 10273 10274 10275 10276 10277 10278 10279 10280 10281 10282 10283 10284 10285 10286 10287 10288 10289 10290 10291 10292 10293 10294 10295 10296 10297 10298 10299 10300 10301 10302 10303 10304 10305 10306 10307 10308 10309 10310 10311 10312 10313 10314 10315 10316 10317 10318 10319 10320 10321 10322 10323 10324 10325 10326 10327 10328 10329 10330 10331 10332 10333 10334 10335 10336 10337 10338 10339 10340 10341 10342 10343 10344 10345 10346 10347 10348 10349 10350 10351 10352 10353 10354 10355 10356 10357 10358 10359 10360 10361 10362 10363 10364 10365 10366 10367 10368 10369 10370 10371 10372 10373 10374 10375 10376 10377 10378 10379 10380 10381 10382 10383 10384 10385 10386 10387 10388 10389 10390 10391 10392 10393 10394 10395 10396 10397 10398 10399 10400 10401 10402 10403 10404 10405 10406 10407 10408 10409 10410 10411 10412 10413 10414 10415 10416 10417 10418 10419 10420 10421 10422 10423 10424 10425 10426 10427 10428 10429 10430 10431 10432 10433 10434 10435 10436 10437 10438 10439 10440 10441 10442 10443 10444 10445 10446 10447 10448 10449 10450 10451 10452 10453 10454 10455 10456 10457 10458 10459 10460 10461 10462 10463 10464 10465 10466 10467 10468 10469 10470 10471 10472 10473 10474 10475 10476 10477 10478 10479 10480 10481 10482 10483 10484 10485 10486 10487 10488 10489 10490 10491 10492 10493 10494 10495 10496 10497 10498 10499 10500 10501 10502 10503 10504 10505 10506 10507 10508 10509 10510 10511 10512 10513 10514 10515 10516 10517 10518 10519 10520 10521 10522 10523 10524 10525 10526 10527 10528 10529 10530 10531 10532 10533 10534 10535 10536 10537 10538 10539 10540 10541 10542 10543 10544 10545 10546 10547 10548 10549 10550 10551 10552 10553 10554 10555 10556 10557 10558 10559 10560 10561 10562 10563 10564 10565 10566 10567 10568 10569 10570 10571 10572 10573 10574 10575 10576 10577 10578 10579 10580 10581 10582 10583 10584 10585 10586 10587 10588 10589 10590 10591 10592 10593 10594 10595 10596 10597 10598 10599 10600 10601 10602 10603 10604 10605 10606 10607 10608 10609 10610 10611 10612 10613 10614 10615 10616 10617 10618 10619 10620 10621 10622 10623 10624 10625 10626 10627 10628 10629 10630 10631 10632 10633 10634 10635 10636 10637 10638 10639 10640 10641 10642 10643 10644 10645 10646 10647 10648 10649 10650 10651 10652 10653 10654 10655 10656 10657 10658 10659 10660 10661 10662 10663 10664 10665 10666 10667 10668 10669 10670 10671 10672 10673 10674 10675 10676 10677 10678 10679 10680 10681 10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698 10699 10700 10701 10702 10703 10704 10705 10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716 10717 10718 10719 10720 10721 10722 10723 10724 10725 10726 10727 10728 10729 10730 10731 10732 10733 10734 10735 10736 10737 10738 10739 10740 10741 10742 10743 10744 10745 10746 10747 10748 10749 10750 10751 10752 10753 10754 10755 10756 10757 10758 10759 10760 10761 10762 10763 10764 10765 10766 10767 10768 10769 10770 10771 10772 10773 10774 10775 10776 10777 10778 10779 10780 10781 10782 10783 10784 10785 10786 10787 10788 10789 10790 10791 10792 10793 10794 10795 10796 10797 10798 10799 10800 10801 10802 10803 10804 10805 10806 10807 10808 10809 10810 10811 10812 10813 10814 10815 10816 10817 10818 10819 10820 10821 10822 10823 10824 10825 10826 10827 10828 10829 10830 10831 10832 10833 10834 10835 10836 10837 10838 10839 10840 10841 10842 10843 10844 10845 10846 10847 10848 10849 10850 10851 10852 10853 10854 10855 10856 10857 10858 10859 10860 10861 10862 10863 10864 10865 10866 10867 10868 10869 10870 10871 10872 10873 10874 10875 10876 10877 10878 10879 10880 10881 10882 10883 10884 10885 10886 10887 10888 10889 10890 10891 10892 10893 10894 10895 10896 10897 10898 10899 10900 10901 10902 10903 10904 10905 10906 10907 10908 10909 10910 10911 10912 10913 10914 10915 10916 10917 10918 10919 10920 10921 10922 10923 10924 10925 10926 10927 10928 10929 10930 10931 10932 10933 10934 10935 10936 10937 10938 10939 10940 10941 10942 10943 10944 10945 10946 10947 10948 10949 10950 10951 10952 10953 10954 10955 10956 10957 10958 10959 10960 10961 10962 10963 10964 10965 10966 10967 10968 10969 10970 10971 10972 10973 10974 10975 10976 10977 10978 10979 10980 10981 10982 10983 10984 10985 10986 10987 10988 10989 10990 10991 10992 10993 10994 10995 10996 10997 10998 10999 11000 11001 11002 11003 11004 11005 11006 11007 11008 11009 11010 11011 11012 11013 11014 11015 11016 11017 11018 11019 11020 11021 11022 11023 11024 11025 11026 11027 11028 11029 11030 11031 11032 11033 11034 11035 11036 11037 11038 11039 11040 11041 11042 11043 11044 11045 11046 11047 11048 11049 11050 11051 11052 11053 11054 11055 11056 11057 11058 11059 11060 11061 11062 11063 11064 11065 11066 11067 11068 11069 11070 11071 11072 11073 11074 11075 11076 11077 11078 11079 11080 11081 11082 11083 11084 11085 11086 11087 11088 11089 11090 11091 11092 11093 11094 11095 11096 11097 11098 11099 11100 11101 11102 11103 11104 11105 11106 11107 11108 11109 11110 11111 11112 11113 11114 11115 11116 11117 11118 11119 11120 11121 11122 11123 11124 11125 11126 11127 11128 11129 11130 11131 11132 11133 11134 11135 11136 11137 11138 11139 11140 11141 11142 11143 11144 11145 11146 11147 11148 11149 11150 11151 11152 11153 11154 11155 11156 11157 11158 11159 11160 11161 11162 11163 11164 11165 11166 11167 11168 11169 11170 11171 11172 11173 11174 11175 11176 11177 11178 11179 11180 11181 11182 11183 11184 11185 11186 11187 11188 11189 11190 11191 11192 11193 11194 11195 11196 11197 11198 11199 11200 11201 11202 11203 11204 11205 11206 11207 11208 11209 11210 11211 11212 11213 11214 11215 11216 11217 11218 11219 11220 11221 11222 11223 11224 11225 11226 11227 11228 11229 11230 11231 11232 11233 11234 11235 11236 11237 11238 11239 11240 11241 11242 11243 11244 11245 11246 11247 11248 11249 11250 11251 11252 11253 11254 11255 11256 11257 11258 11259 11260 11261 11262 11263 11264 11265 11266 11267 11268 11269 11270 11271 11272 11273 11274 11275 11276 11277 11278 11279 11280 11281 11282 11283 11284 11285 11286 11287 11288 11289 11290 11291 11292 11293 11294 11295 11296 11297 11298 11299 11300 11301 11302 11303 11304 11305 11306 11307 11308 11309 11310 11311 11312 11313 11314 11315 11316 11317 11318 11319 11320 11321 11322 11323 11324 11325 11326 11327 11328 11329 11330 11331 11332 11333 11334 11335 11336 11337 11338 11339 11340 11341 11342 11343 11344 11345 11346 11347 11348 11349 11350 11351 11352 11353 11354 11355 11356 11357 11358 11359 11360 11361 11362 11363 11364 11365 11366 11367 11368 11369 11370 11371 11372 11373 11374 11375 11376 11377 11378 11379 11380 11381 11382 11383 11384 11385 11386 11387 11388 11389 11390 11391 11392 11393 11394 11395 11396 11397 11398 11399 11400 11401 11402 11403 11404 11405 11406 11407 11408 11409 11410 11411 11412 11413 11414 11415 11416 11417 11418 11419 11420 11421 11422 11423 11424 11425 11426 11427 11428 11429 11430 11431 11432 11433 11434 11435 11436 11437 11438 11439 11440 11441 11442 11443 11444 11445 11446 11447 11448 11449 11450 11451 11452 11453 11454 11455 11456 11457 11458 11459 11460 11461 11462 11463 11464 11465 11466 11467 11468 11469 11470 11471 11472 11473 11474 11475 11476 11477 11478 11479 11480 11481 11482 11483 11484 11485 11486 11487 11488 11489 11490 11491 11492 11493 11494 11495 11496 11497 11498 11499 11500 11501 11502 11503 11504 11505 11506 11507 11508 11509 11510 11511 11512 11513 11514 11515 11516 11517 11518 11519 11520 11521 11522 11523 11524 11525 11526 11527 11528 11529 11530 11531 11532 11533 11534 11535 11536 11537 11538 11539 11540 11541 11542 11543 11544 11545 11546 11547 11548 11549 11550 11551 11552 11553 11554 11555 11556 11557 11558 11559 11560 11561 11562 11563 11564 11565 11566 11567 11568 11569 11570 11571 11572 11573 11574 11575 11576 11577 11578 11579 11580 11581 11582 11583 11584 11585 11586 11587 11588 11589 11590 11591 11592 11593 11594 11595 11596 11597 11598 11599 11600 11601 11602 11603 11604 11605 11606 11607 11608 11609 11610 11611 11612 11613 11614 11615 11616 11617 11618 11619 11620 11621 11622 11623 11624 11625 11626 11627 11628 11629 11630 11631 11632 11633 11634 11635 11636 11637 11638 11639 11640 11641 11642 11643 11644 11645 11646 11647 11648 11649 11650 11651 11652 11653 11654 11655 11656 11657 11658 11659 11660 11661 11662 11663 11664 11665 11666 11667 11668 11669 11670 11671 11672 11673 11674 11675 11676 11677 11678 11679 11680 11681 11682 11683 11684 11685 11686 11687 11688 11689 11690 11691 11692 11693 11694 11695 11696 11697 11698 11699 11700 11701 11702 11703 11704 11705 11706 11707 11708 11709 11710 11711 11712 11713 11714 11715 11716 11717 11718 11719 11720 11721 11722 11723 11724 11725 11726 11727 11728 11729 11730 11731 11732 11733 11734 11735 11736 11737 11738 11739 11740 11741 11742 11743 11744 11745 11746 11747 11748 11749 11750 11751 11752 11753 11754 11755 11756 11757 11758 11759 11760 11761 11762 11763 11764 11765 11766 11767 11768 11769 11770 11771 11772 11773 11774 11775 11776 11777 11778 11779 11780 11781 11782 11783 11784 11785 11786 11787 11788 11789 11790 11791 11792 11793 11794 11795 11796 11797 11798 11799 11800 11801 11802 11803 11804 11805 11806 11807 11808 11809 11810 11811 11812 11813 11814 11815 11816 11817 11818 11819 11820 11821 11822 11823 11824 11825 11826 11827 11828 11829 11830 11831 11832 11833 11834 11835 11836 11837 11838 11839 11840 11841 11842 11843 11844 11845 11846 11847 11848 11849 11850 11851 11852 11853 11854 11855 11856 11857 11858 11859 11860 11861 11862 11863 11864 11865 11866 11867 11868 11869 11870 11871 11872 11873 11874 11875 11876 11877 11878 11879 11880 11881 11882 11883 11884 11885 11886 11887 11888 11889 11890 11891 11892 11893 11894 11895 11896 11897 11898 11899 11900 11901 11902 11903 11904 11905 11906 11907 11908 11909 11910 11911 11912 11913 11914 11915 11916 11917 11918 11919 11920 11921 11922 11923 11924 11925 11926 11927 11928 11929 11930 11931 11932 11933 11934 11935 11936 11937 11938 11939 11940 11941 11942 11943 11944 11945 11946 11947 11948 11949 11950 11951 11952 11953 11954 11955 11956 11957 11958 11959 11960 11961 11962 11963 11964 11965 11966 11967 11968 11969 11970 11971 11972 11973 11974 11975 11976 11977 11978 11979 11980 11981 11982 11983 11984 11985 11986 11987 11988 11989 11990 11991 11992 11993 11994 11995 11996 11997 11998 11999 12000 12001 12002 12003 12004 12005 12006 12007 12008 12009 12010 12011 12012 12013 12014 12015 12016 12017 12018 12019 12020 12021 12022 12023 12024 12025 12026 12027 12028 12029 12030 12031 12032 12033 12034 12035 12036 12037 12038 12039 12040 12041 12042 12043 12044 12045 12046 12047 12048 12049 12050 12051 12052 12053 12054 12055 12056 12057 12058 12059 12060 12061 12062 12063 12064 12065 12066 12067 12068 12069 12070 12071 12072 12073 12074 12075 12076 12077 12078 12079 12080 12081 12082 12083 12084 12085 12086 12087 12088 12089 12090 12091 12092 12093 12094 12095 12096 12097 12098 12099 12100 12101 12102 12103 12104 12105 12106 12107 12108 12109 12110 12111 12112 12113 12114 12115 12116 12117 12118 12119 12120 12121 12122 12123 12124 12125 12126 12127 12128 12129 12130 12131 12132 12133 12134 12135 12136 12137 12138 12139 12140 12141 12142 12143 12144 12145 12146 12147 12148 12149 12150 12151 12152 12153 12154 12155 12156 12157 12158 12159 12160 12161 12162 12163 12164 12165 12166 12167 12168 12169 12170 12171 12172 12173 12174 12175 12176 12177 12178 12179 12180 12181 12182 12183 12184 12185 12186 12187 12188 12189 12190 12191 12192 12193 12194 12195 12196 12197 12198 12199 12200 12201 12202 12203 12204 12205 12206 12207 12208 12209 12210 12211 12212 12213 12214 12215 12216 12217 12218 12219 12220 12221 12222 12223 12224 12225 12226 12227 12228 12229 12230 12231 12232 12233 12234 12235 12236 12237 12238 12239 12240 12241 12242 12243 12244 12245 12246 12247 12248 12249 12250 12251 12252 12253 12254 12255 12256 12257 12258 12259 12260 12261 12262 12263 12264 12265 12266 12267 12268 12269 12270 12271 12272 12273 12274 12275 12276 12277 12278 12279 12280 12281 12282 12283 12284 12285 12286 12287 12288 12289 12290 12291 12292 12293 12294 12295 12296 12297 12298 12299 12300 12301 12302 12303 12304 12305 12306 12307 12308 12309 12310 12311 12312 12313 12314 12315 12316 12317 12318 12319 12320 12321 12322 12323 12324 12325 12326 12327 12328 12329 12330 12331 12332 12333 12334 12335 12336 12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349 12350 12351 12352 12353 12354 12355 12356 12357 12358 12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376 12377 12378 12379 12380 12381 12382 12383 12384 12385 12386 12387 12388 12389 12390 12391 12392 12393 12394 12395 12396 12397 12398 12399 12400 12401 12402 12403 12404 12405 12406 12407 12408 12409 12410 12411 12412 12413 12414 12415 12416 12417 12418 12419 12420 12421 12422 12423 12424 12425 12426 12427 12428 12429 12430 12431 12432 12433 12434 12435 12436 12437 12438 12439 12440 12441 12442 12443 12444 12445 12446 12447 12448 12449 12450 12451 12452 12453 12454 12455 12456 12457 12458 12459 12460 12461 12462 12463 12464 12465 12466 12467 12468 12469 12470 12471 12472 12473 12474 12475 12476 12477 12478 12479 12480 12481 12482 12483 12484 12485 12486 12487 12488 12489 12490 12491 12492 12493 12494 12495 12496 12497 12498 12499 12500 12501 12502 12503 12504 12505 12506 12507 12508 12509 12510 12511 12512 12513 12514 12515 12516 12517 12518 12519 12520 12521 12522 12523 12524 12525 12526 12527 12528 12529 12530 12531 12532 12533 12534 12535 12536 12537 12538 12539 12540 12541 12542 12543 12544 12545 12546 12547 12548 12549 12550 12551 12552 12553 12554 12555 12556 12557 12558 12559 12560 12561 12562 12563 12564 12565 12566 12567 12568 12569 12570 12571 12572 12573 12574 12575 12576 12577 12578 12579 12580 12581 12582 12583 12584 12585 12586 12587 12588 12589 12590 12591 12592 12593 12594 12595 12596 12597 12598 12599 12600 12601 12602 12603 12604 12605 12606 12607 12608 12609 12610 12611 12612 12613 12614 12615 12616 12617 12618 12619 12620 12621 12622 12623 12624 12625 12626 12627 12628 12629 12630 12631 12632 12633 12634 12635 12636 12637 12638 12639 12640 12641 12642 12643 12644 12645 12646 12647 12648 12649 12650 12651 12652 12653 12654 12655 12656 12657 12658 12659 12660 12661 12662 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672 12673 12674 12675 12676 12677 12678 12679 12680 12681 12682 12683 12684 12685 12686 12687 12688 12689 12690 12691 12692 12693 12694 12695 12696 12697 12698 12699 12700 12701 12702 12703 12704 12705 12706 12707 12708 12709 12710 12711 12712 12713 12714 12715 12716 12717 12718 12719 12720 12721 12722 12723 12724 12725 12726 12727 12728 12729 12730 12731 12732 12733 12734 12735 12736 12737 12738 12739 12740 12741 12742 12743 12744 12745 12746 12747 12748 12749 12750 12751 12752 12753 12754 12755 12756 12757 12758 12759 12760 12761 12762 12763 12764 12765 12766 12767 12768 12769 12770 12771 12772 12773 12774 12775 12776 12777 12778 12779 12780 12781 12782 12783 12784 12785 12786 12787 12788 12789 12790 12791 12792 12793 12794 12795 12796 12797 12798 12799 12800 12801 12802 12803 12804 12805 12806 12807 12808 12809 12810 12811 12812 12813 12814 12815 12816 12817 12818 12819 12820 12821 12822 12823 12824 12825 12826 12827 12828 12829 12830 12831 12832 12833 12834 12835 12836 12837 12838 12839 12840 12841 12842 12843 12844 12845 12846 12847 12848 12849 12850 12851 12852 12853 12854 12855 12856 12857 12858 12859 12860 12861 12862 12863 12864 12865 12866 12867 12868 12869 12870 12871 12872 12873 12874 12875 12876 12877 12878 12879 12880 12881 12882 12883 12884 12885 12886 12887 12888 12889 12890 12891 12892 12893 12894 12895 12896 12897 12898 12899 12900 12901 12902 12903 12904 12905 12906 12907 12908 12909 12910 12911 12912 12913 12914 12915 12916 12917 12918 12919 12920 12921 12922 12923 12924 12925 12926 12927 12928 12929 12930 12931 12932 12933 12934 12935 12936 12937 12938 12939 12940 12941 12942 12943 12944 12945 12946 12947 12948 12949 12950 12951 12952 12953 12954 12955 12956 12957 12958 12959 12960 12961 12962 12963 12964 12965 12966 12967 12968 12969 12970 12971 12972 12973 12974 12975 12976 12977 12978 12979 12980 12981 12982 12983 12984 12985 12986 12987 12988 12989 12990 12991 12992 12993 12994 12995 12996 12997 12998 12999 13000 13001 13002 13003 13004 13005 13006 13007 13008 13009 13010 13011 13012 13013 13014 13015 13016 13017 13018 13019 13020 13021 13022 13023 13024 13025 13026 13027 13028 13029 13030 13031 13032 13033 13034 13035 13036 13037 13038 13039 13040 13041 13042 13043 13044 13045 13046 13047 13048 13049 13050 13051 13052 13053 13054 13055 13056 13057 13058 13059 13060 13061 13062 13063 13064 13065 13066 13067 13068 13069 13070 13071 13072 13073 13074 13075 13076 13077 13078 13079 13080 13081 13082 13083 13084 13085 13086 13087 13088 13089 13090 13091 13092 13093 13094 13095 13096 13097 13098 13099 13100 13101 13102 13103 13104 13105 13106 13107 13108 13109 13110 13111 13112 13113 13114 13115 13116 13117 13118 13119 13120 13121 13122 13123 13124 13125 13126 13127 13128 13129 13130 13131 13132 13133 13134 13135 13136 13137 13138 13139 13140 13141 13142 13143 13144 13145 13146 13147 13148 13149 13150 13151 13152 13153 13154 13155 13156 13157 13158 13159 13160 13161 13162 13163 13164 13165 13166 13167 13168 13169 13170 13171 13172 13173 13174 13175 13176 13177 13178 13179 13180 13181 13182 13183 13184 13185 13186 13187 13188 13189 13190 13191 13192 13193 13194 13195 13196 13197 13198 13199 13200 13201 13202 13203 13204 13205 13206 13207 13208 13209 13210 13211 13212 13213 13214 13215 13216 13217 13218 13219 13220 13221 13222 13223 13224 13225 13226 13227 13228 13229 13230 13231 13232 13233 13234 13235 13236 13237 13238 13239 13240 13241 13242 13243 13244 13245 13246 13247 13248 13249 13250 13251 13252 13253 13254 13255 13256 13257 13258 13259 13260 13261 13262 13263 13264 13265 13266 13267 13268 13269 13270 13271 13272 13273 13274 13275 13276 13277 13278 13279 13280 13281 13282 13283 13284 13285 13286 13287 13288 13289 13290 13291 13292 13293 13294 13295 13296 13297 13298 13299 13300 13301 13302 13303 13304 13305 13306 13307 13308 13309 13310 13311 13312 13313 13314 13315 13316 13317 13318 13319 13320 13321 13322 13323 13324 13325 13326 13327 13328 13329 13330 13331 13332 13333 13334 13335 13336 13337 13338 13339 13340 13341 13342 13343 13344 13345 13346 13347 13348 13349 13350 13351 13352 13353 13354 13355 13356 13357 13358 13359 13360 13361 13362 13363 13364 13365 13366 13367 13368 13369 13370 13371 13372 13373 13374 13375 13376 13377 13378 13379 13380 13381 13382 13383 13384 13385 13386 13387 13388 13389 13390 13391 13392 13393 13394 13395 13396 13397 13398 13399 13400 13401 13402 13403 13404 13405 13406 13407 13408 13409 13410 13411 13412 13413 13414 13415 13416 13417 13418 13419 13420 13421 13422 13423 13424 13425 13426 13427 13428 13429 13430 13431 13432 13433 13434 13435 13436 13437 13438 13439 13440 13441 13442 13443 13444 13445 13446 13447 13448 13449 13450 13451 13452 13453 13454 13455 13456 13457 13458 13459 13460 13461 13462 13463 13464 13465 13466 13467 13468 13469 13470 13471 13472 13473 13474 13475 13476 13477 13478 13479 13480 13481 13482 13483 13484 13485 13486 13487 13488 13489 13490 13491 13492 13493 13494 13495 13496 13497 13498 13499 13500 13501 13502 13503 13504 13505 13506 13507 13508 13509 13510 13511 13512 13513 13514 13515 13516 13517 13518 13519 13520 13521 13522 13523 13524 13525 13526 13527 13528 13529 13530 13531 13532 13533 13534 13535 13536 13537 13538 13539 13540 13541 13542 13543 13544 13545 13546 13547 13548 13549 13550 13551 13552 13553 13554 13555 13556 13557 13558 13559 13560 13561 13562 13563 13564 13565 13566 13567 13568 13569 13570 13571 13572 13573 13574 13575 13576 13577 13578 13579 13580 13581 13582 13583 13584 13585 13586 13587 13588 13589 13590 13591 13592 13593 13594 13595 13596 13597 13598 13599 13600 13601 13602 13603 13604 13605 13606 13607 13608 13609 13610 13611 13612 13613 13614 13615 13616 13617 13618 13619 13620 13621 13622 13623 13624 13625 13626 13627 13628 13629 13630 13631 13632 13633 13634 13635 13636 13637 13638 13639 13640 13641 13642 13643 13644 13645 13646 13647 13648 13649 13650 13651 13652 13653 13654 13655 13656 13657 13658 13659 13660 13661 13662 13663 13664 13665 13666 13667 13668 13669 13670 13671 13672 13673 13674 13675 13676 13677 13678 13679 13680 13681 13682 13683 13684 13685 13686 13687 13688 13689 13690 13691 13692 13693 13694 13695 13696 13697 13698 13699 13700 13701 13702 13703 13704 13705 13706 13707 13708 13709 13710 13711 13712 13713 13714 13715 13716 13717 13718 13719 13720 13721 13722 13723 13724 13725 13726 13727 13728 13729 13730 13731 13732 13733 13734 13735 13736 13737 13738 13739 13740 13741 13742 13743 13744 13745 13746 13747 13748 13749 13750 13751 13752 13753 13754 13755 13756 13757 13758 13759 13760 13761 13762 13763 13764 13765 13766 13767 13768 13769 13770 13771 13772 13773 13774 13775 13776 13777 13778 13779 13780 13781 13782 13783 13784 13785 13786 13787 13788 13789 13790 13791 13792 13793 13794 13795 13796 13797 13798 13799 13800 13801 13802 13803 13804 13805 13806 13807 13808 13809 13810 13811 13812 13813 13814 13815 13816 13817 13818 13819 13820 13821 13822 13823 13824 13825 13826 13827 13828 13829 13830 13831 13832 13833 13834 13835 13836 13837 13838 13839 13840 13841 13842 13843 13844 13845 13846 13847 13848 13849 13850 13851 13852 13853 13854 13855 13856 13857 13858 13859 13860 13861 13862 13863 13864 13865 13866 13867 13868 13869 13870 13871 13872 13873 13874 13875 13876 13877 13878 13879 13880 13881 13882 13883 13884 13885 13886 13887 13888 13889 13890 13891 13892 13893 13894 13895 13896 13897 13898 13899 13900 13901 13902 13903 13904 13905 13906 13907 13908 13909 13910 13911 13912 13913 13914 13915 13916 13917 13918 13919 13920 13921 13922 13923 13924 13925 13926 13927 13928 13929 13930 13931 13932 13933 13934 13935 13936 13937 13938 13939 13940 13941 13942 13943 13944 13945 13946 13947 13948 13949 13950 13951 13952 13953 13954 13955 13956 13957 13958 13959 13960 13961 13962 13963 13964 13965 13966 13967 13968 13969 13970 13971 13972 13973 13974 13975 13976 13977 13978 13979 13980 13981 13982 13983 13984 13985 13986 13987 13988 13989 13990 13991 13992 13993 13994 13995 13996 13997 13998 13999 14000 14001 14002 14003 14004 14005 14006 14007 14008 14009 14010 14011 14012 14013 14014 14015 14016 14017 14018 14019 14020 14021 14022 14023 14024 14025 14026 14027 14028 14029 14030 14031 14032 14033 14034 14035 14036 14037 14038 14039 14040 14041 14042 14043 14044 14045 14046 14047 14048 14049 14050 14051 14052 14053 14054 14055 14056 14057 14058 14059 14060 14061 14062 14063 14064 14065 14066 14067 14068 14069 14070 14071 14072 14073 14074 14075 14076 14077 14078 14079 14080 14081 14082 14083 14084 14085 14086 14087 14088 14089 14090 14091 14092 14093 14094 14095 14096 14097 14098 14099 14100 14101 14102 14103 14104 14105 14106 14107 14108 14109 14110 14111 14112 14113 14114 14115 14116 14117 14118 14119 14120 14121 14122 14123 14124 14125 14126 14127 14128 14129 14130 14131 14132 14133 14134 14135 14136 14137 14138 14139 14140 14141 14142 14143 14144 14145 14146 14147 14148 14149 14150 14151 14152 14153 14154 14155 14156 14157 14158 14159 14160 14161 14162 14163 14164 14165 14166 14167 14168 14169 14170 14171 14172 14173 14174 14175 14176 14177 14178 14179 14180 14181 14182 14183 14184 14185 14186 14187 14188 14189 14190 14191 14192 14193 14194 14195 14196 14197 14198 14199 14200 14201 14202 14203 14204 14205 14206 14207 14208 14209 14210 14211 14212 14213 14214 14215 14216 14217 14218 14219 14220 14221 14222 14223 14224 14225 14226 14227 14228 14229 14230 14231 14232 14233 14234 14235 14236 14237 14238 14239 14240 14241 14242 14243 14244 14245 14246 14247 14248 14249 14250 14251 14252 14253 14254 14255 14256 14257 14258 14259 14260 14261 14262 14263 14264 14265 14266 14267 14268 14269 14270 14271 14272 14273 14274 14275 14276 14277 14278 14279 14280 14281 14282 14283 14284 14285 14286 14287 14288 14289 14290 14291 14292 14293 14294 14295 14296 14297 14298 14299 14300 14301 14302 14303 14304 14305 14306 14307 14308 14309 14310 14311 14312 14313 14314 14315 14316 14317 14318 14319 14320 14321 14322 14323 14324 14325 14326 14327 14328 14329 14330 14331 14332 14333 14334 14335 14336 14337 14338 14339 14340 14341 14342 14343 14344 14345 14346 14347 14348 14349 14350 14351 14352 14353 14354 14355 14356 14357 14358 14359 14360 14361 14362 14363 14364 14365 14366 14367 14368 14369 14370 14371 14372 14373 14374 14375 14376 14377 14378 14379 14380 14381 14382 14383 14384 14385 14386 14387 14388 14389 14390 14391 14392 14393 14394 14395 14396 14397 14398 14399 14400 14401 14402 14403 14404 14405 14406 14407 14408 14409 14410 14411 14412 14413 14414 14415 14416 14417 14418 14419 14420 14421 14422 14423 14424 14425 14426 14427 14428 14429 14430 14431 14432 14433 14434 14435 14436 14437 14438 14439 14440 14441 14442 14443 14444 14445 14446 14447 14448 14449 14450 14451 14452 14453 14454 14455 14456 14457 14458 14459 14460 14461 14462 14463 14464 14465 14466 14467 14468 14469 14470 14471 14472 14473 14474 14475 14476 14477 14478 14479 14480 14481 14482 14483 14484 14485 14486 14487 14488 14489 14490 14491 14492 14493 14494 14495 14496 14497 14498 14499 14500 14501 14502 14503 14504 14505 14506 14507 14508 14509 14510 14511 14512 14513 14514 14515 14516 14517 14518 14519 14520 14521 14522 14523 14524 14525 14526 14527 14528 14529 14530 14531 14532 14533 14534 14535 14536 14537 14538 14539 14540 14541 14542 14543 14544 14545 14546 14547 14548 14549 14550 14551 14552 14553 14554 14555 14556 14557 14558 14559 14560 14561 14562 14563 14564 14565 14566 14567 14568 14569 14570 14571 14572 14573 14574 14575 14576 14577 14578 14579 14580 14581 14582 14583 14584 14585 14586 14587 14588 14589 14590 14591 14592 14593 14594 14595 14596 14597 14598 14599 14600 14601 14602 14603 14604 14605 14606 14607 14608 14609 14610 14611 14612 14613 14614 14615 14616 14617 14618 14619 14620 14621 14622 14623 14624 14625 14626 14627 14628 14629 14630 14631 14632 14633 14634 14635 14636 14637 14638 14639 14640 14641 14642 14643 14644 14645 14646 14647 14648 14649 14650 14651 14652 14653 14654 14655 14656 14657 14658 14659 14660 14661 14662 14663 14664 14665 14666 14667 14668 14669 14670 14671 14672 14673 14674 14675 14676 14677 14678 14679 14680 14681 14682 14683 14684 14685 14686 14687 14688 14689 14690 14691 14692 14693 14694 14695 14696 14697 14698 14699 14700 14701 14702 14703 14704 14705 14706 14707 14708 14709 14710 14711 14712 14713 14714 14715 14716 14717 14718 14719 14720 14721 14722 14723 14724 14725 14726 14727 14728 14729 14730 14731 14732 14733 14734 14735 14736 14737 14738 14739 14740 14741 14742 14743 14744 14745 14746 14747 14748 14749 14750 14751 14752 14753 14754 14755 14756 14757 14758 14759 14760 14761 14762 14763 14764 14765 14766 14767 14768 14769 14770 14771 14772 14773 14774 14775 14776 14777 14778 14779 14780 14781 14782 14783 14784 14785 14786 14787 14788 14789 14790 14791 14792 14793 14794 14795 14796 14797 14798 14799 14800 14801 14802 14803 14804 14805 14806 14807 14808 14809 14810 14811 14812 14813 14814 14815 14816 14817 14818 14819 14820 14821 14822 14823 14824 14825 14826 14827 14828 14829 14830 14831 14832 14833 14834 14835 14836 14837 14838 14839 14840 14841 14842 14843 14844 14845 14846 14847 14848 14849 14850 14851 14852 14853 14854 14855 14856 14857 14858 14859 14860 14861 14862 14863 14864 14865 14866 14867 14868 14869 14870 14871 14872 14873 14874 14875 14876 14877 14878 14879 14880 14881 14882 14883 14884 14885 14886 14887 14888 14889 14890 14891 14892 14893 14894 14895 14896 14897 14898 14899 14900 14901 14902 14903 14904 14905 14906 14907 14908 14909 14910 14911 14912 14913 14914 14915 14916 14917 14918 14919 14920 14921 14922 14923 14924 14925 14926 14927 14928 14929 14930 14931 14932 14933 14934 14935 14936 14937 14938 14939 14940 14941 14942 14943 14944 14945 14946 14947 14948 14949 14950 14951 14952 14953 14954 14955 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 14972 14973 14974 14975 14976 14977 14978 14979 14980 14981 14982 14983 14984 14985 14986 14987 14988 14989 14990 14991 14992 14993 14994 14995 14996 14997 14998 14999 15000 15001 15002 15003 15004 15005 15006 15007 15008 15009 15010 15011 15012 15013 15014 15015 15016 15017 15018 15019 15020 15021 15022 15023 15024 15025 15026 15027 15028 15029 15030 15031 15032 15033 15034 15035 15036 15037 15038 15039 15040 15041 15042 15043 15044 15045 15046 15047 15048 15049 15050 15051 15052 15053 15054 15055 15056 15057 15058 15059 15060 15061 15062 15063 15064 15065 15066 15067 15068 15069 15070 15071 15072 15073 15074 15075 15076 15077 15078 15079 15080 15081 15082 15083 15084 15085 15086 15087 15088 15089 15090 15091 15092 15093 15094 15095 15096 15097 15098 15099 15100 15101 15102 15103 15104 15105 15106 15107 15108 15109 15110 15111 15112 15113 15114 15115 15116 15117 15118 15119 15120 15121 15122 15123 15124 15125 15126 15127 15128 15129 15130 15131 15132 15133 15134 15135 15136 15137 15138 15139 15140 15141 15142 15143 15144 15145 15146 15147 15148 15149 15150 15151 15152 15153 15154 15155 15156 15157 15158 15159 15160 15161 15162 15163 15164 15165 15166 15167 15168 15169 15170 15171 15172 15173 15174 15175 15176 15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191 15192 15193 15194 15195 15196 15197 15198 15199 15200 15201 15202 15203 15204 15205 15206 15207 15208 15209 15210 15211 15212 15213 15214 15215 15216 15217 15218 15219 15220 15221 15222 15223 15224 15225 15226 15227 15228 15229 15230 15231 15232 15233 15234 15235 15236 15237 15238 15239 15240 15241 15242 15243 15244 15245 15246 15247 15248 15249 15250 15251 15252 15253 15254 15255 15256 15257 15258 15259 15260 15261 15262 15263 15264 15265 15266 15267 15268 15269 15270 15271 15272 15273 15274 15275 15276 15277 15278 15279 15280 15281 15282 15283 15284 15285 15286 15287 15288 15289 15290 15291 15292 15293 15294 15295 15296 15297 15298 15299 15300 15301 15302 15303 15304 15305 15306 15307 15308 15309 15310 15311 15312 15313 15314 15315 15316 15317 15318 15319 15320 15321 15322 15323 15324 15325 15326 15327 15328 15329 15330 15331 15332 15333 15334 15335 15336 15337 15338 15339 15340 15341 15342 15343 15344 15345 15346 15347 15348 15349 15350 15351 15352 15353 15354 15355 15356 15357 15358 15359 15360 15361 15362 15363 15364 15365 15366 15367 15368 15369 15370 15371 15372 15373 15374 15375 15376 15377 15378 15379 15380 15381 15382 15383 15384 15385 15386 15387 15388 15389 15390 15391 15392 15393 15394 15395 15396 15397 15398 15399 15400 15401 15402 15403 15404 15405 15406 15407 15408 15409 15410 15411 15412 15413 15414 15415 15416 15417 15418 15419 15420 15421 15422 15423 15424 15425 15426 15427 15428 15429 15430 15431 15432 15433 15434 15435 15436 15437 15438 15439 15440 15441 15442 15443 15444 15445 15446 15447 15448 15449 15450 15451 15452 15453 15454 15455 15456 15457 15458 15459 15460 15461 15462 15463 15464 15465 15466 15467 15468 15469 15470 15471 15472 15473 15474 15475 15476 15477 15478 15479 15480 15481 15482 15483 15484 15485 15486 15487 15488 15489 15490 15491 15492 15493 15494 15495 15496 15497 15498 15499 15500 15501 15502 15503 15504 15505 15506 15507 15508 15509 15510 15511 15512 15513 15514 15515 15516 15517 15518 15519 15520 15521 15522 15523 15524 15525 15526 15527 15528 15529 15530 15531 15532 15533 15534 15535 15536 15537 15538 15539 15540 15541 15542 15543 15544 15545 15546 15547 15548 15549 15550 15551 15552 15553 15554 15555 15556 15557 15558 15559 15560 15561 15562 15563 15564 15565 15566 15567 15568 15569 15570 15571 15572 15573 15574 15575 15576 15577 15578 15579 15580 15581 15582 15583 15584 15585 15586 15587 15588 15589 15590 15591 15592 15593 15594 15595 15596 15597 15598 15599 15600 15601 15602 15603 15604 15605 15606 15607 15608 15609 15610 15611 15612 15613 15614 15615 15616 15617 15618 15619 15620 15621 15622 15623 15624 15625 15626 15627 15628 15629 15630 15631 15632 15633 15634 15635 15636 15637 15638 15639 15640 15641 15642 15643 15644 15645 15646 15647 15648 15649 15650 15651 15652 15653 15654 15655 15656 15657 15658 15659 15660 15661 15662 15663 15664 15665 15666 15667 15668 15669 15670 15671 15672 15673 15674 15675 15676 15677 15678 15679 15680 15681 15682 15683 15684 15685 15686 15687 15688 15689 15690 15691 15692 15693 15694 15695 15696 15697 15698 15699 15700 15701 15702 15703 15704 15705 15706 15707 15708 15709 15710 15711 15712 15713 15714 15715 15716 15717 15718 15719 15720 15721 15722 15723 15724 15725 15726 15727 15728 15729 15730 15731 15732 15733 15734 15735 15736 15737 15738 15739 15740 15741 15742 15743 15744 15745 15746 15747 15748 15749 15750 15751 15752 15753 15754 15755 15756 15757 15758 15759 15760 15761 15762 15763 15764 15765 15766 15767 15768 15769 15770 15771 15772 15773 15774 15775 15776 15777 15778 15779 15780 15781 15782 15783 15784 15785 15786 15787 15788 15789 15790 15791 15792 15793 15794 15795 15796 15797 15798 15799 15800 15801 15802 15803 15804 15805 15806 15807 15808 15809 15810 15811 15812 15813 15814 15815 15816 15817 15818 15819 15820 15821 15822 15823 15824 15825 15826 15827 15828 15829 15830 15831 15832 15833 15834 15835 15836 15837 15838 15839 15840 15841 15842 15843 15844 15845 15846 15847 15848 15849 15850 15851 15852 15853 15854 15855 15856 15857 15858 15859 15860 15861 15862 15863 15864 15865 15866 15867 15868 15869 15870 15871 15872 15873 15874 15875 15876 15877 15878 15879 15880 15881 15882 15883 15884 15885 15886 15887 15888 15889 15890 15891 15892 15893 15894 15895 15896 15897 15898 15899 15900 15901 15902 15903 15904 15905 15906 15907 15908 15909 15910 15911 15912 15913 15914 15915 15916 15917 15918 15919 15920 15921 15922 15923 15924 15925 15926 15927 15928 15929 15930 15931 15932 15933 15934 15935 15936 15937 15938 15939 15940 15941 15942 15943 15944 15945 15946 15947 15948 15949 15950 15951 15952 15953 15954 15955 15956 15957 15958 15959 15960 15961 15962 15963 15964 15965 15966 15967 15968 15969 15970 15971 15972 15973 15974 15975 15976 15977 15978 15979 15980 15981 15982 15983 15984 15985 15986 15987 15988 15989 15990 15991 15992 15993 15994 15995 15996 15997 15998 15999 16000 16001 16002 16003 16004 16005 16006 16007 16008 16009 16010 16011 16012 16013 16014 16015 16016 16017 16018 16019 16020 16021 16022 16023 16024 16025 16026 16027 16028 16029 16030 16031 16032 16033 16034 16035 16036 16037 16038 16039 16040 16041 16042 16043 16044 16045 16046 16047 16048 16049 16050 16051 16052 16053 16054 16055 16056 16057 16058 16059 16060 16061 16062 16063 16064 16065 16066 16067 16068 16069 16070 16071 16072 16073 16074 16075 16076 16077 16078 16079 16080 16081 16082 16083 16084 16085 16086 16087 16088 16089 16090 16091 16092 16093 16094 16095 16096 16097 16098 16099 16100 16101 16102 16103 16104 16105 16106 16107 16108 16109 16110 16111 16112 16113 16114 16115 16116 16117 16118 16119 16120 16121 16122 16123 16124 16125 16126 16127 16128 16129 16130 16131 16132 16133 16134 16135 16136 16137 16138 16139 16140 16141 16142 16143 16144 16145 16146 16147 16148 16149 16150 16151 16152 16153 16154 16155 16156 16157 16158 16159 16160 16161 16162 16163 16164 16165 16166 16167 16168 16169 16170 16171 16172 16173 16174 16175 16176 16177 16178 16179 16180 16181 16182 16183 16184 16185 16186 16187 16188 16189 16190 16191 16192 16193 16194 16195 16196 16197 16198 16199 16200 16201 16202 16203 16204 16205 16206 16207 16208 16209 16210 16211 16212 16213 16214 16215 16216 16217 16218 16219 16220 16221 16222 16223 16224 16225 16226 16227 16228 16229 16230 16231 16232 16233 16234 16235 16236 16237 16238 16239 16240 16241 16242 16243 16244 16245 16246 16247 16248 16249 16250 16251 16252 16253 16254 16255 16256 16257 16258 16259 16260 16261 16262 16263 16264 16265 16266 16267 16268 16269 16270 16271 16272 16273 16274 16275 16276 16277 16278 16279 16280 16281 16282 16283 16284 16285 16286 16287 16288 16289 16290 16291 16292 16293 16294 16295 16296 16297 16298 16299 16300 16301 16302 16303 16304 16305 16306 16307 16308 16309 16310 16311 16312 16313 16314 16315 16316 16317 16318 16319 16320 16321 16322 16323 16324 16325 16326 16327 16328 16329 16330 16331 16332 16333 16334 16335 16336 16337 16338 16339 16340 16341 16342 16343 16344 16345 16346 16347 16348 16349 16350 16351 16352 16353 16354 16355 16356 16357 16358 16359 16360 16361 16362 16363 16364 16365 16366 16367 16368 16369 16370 16371 16372 16373 16374 16375 16376 16377 16378 16379 16380 16381 16382 16383 16384 16385 16386 16387 16388 16389 16390 16391 16392 16393 16394 16395 16396 16397 16398 16399 16400 16401 16402 16403 16404 16405 16406 16407 16408 16409 16410 16411 16412 16413 16414 16415 16416 16417 16418 16419 16420 16421 16422 16423 16424 16425 16426 16427 16428 16429 16430 16431 16432 16433 16434 16435 16436 16437 16438 16439 16440 16441 16442 16443 16444 16445 16446 16447 16448 16449 16450 16451 16452 16453 16454 16455 16456 16457 16458 16459 16460 16461 16462 16463 16464 16465 16466 16467 16468 16469 16470 16471 16472 16473 16474 16475 16476 16477 16478 16479 16480 16481 16482 16483 16484 16485 16486 16487 16488 16489 16490 16491 16492 16493 16494 16495 16496 16497 16498 16499 16500 16501 16502 16503 16504 16505 16506 16507 16508 16509 16510 16511 16512 16513 16514 16515 16516 16517 16518 16519 16520 16521 16522 16523 16524 16525 16526 16527 16528 16529 16530 16531 16532 16533 16534 16535 16536 16537 16538 16539 16540 16541 16542 16543 16544 16545 16546 16547 16548 16549 16550 16551 16552 16553 16554 16555 16556 16557 16558 16559 16560 16561 16562 16563 16564 16565 16566 16567 16568 16569 16570 16571 16572 16573 16574 16575 16576 16577 16578 16579 16580 16581 16582 16583 16584 16585 16586 16587 16588 16589 16590 16591 16592 16593 16594 16595 16596 16597 16598 16599 16600 16601 16602 16603 16604 16605 16606 16607 16608 16609 16610 16611 16612 16613 16614 16615 16616 16617 16618 16619 16620 16621 16622 16623 16624 16625 16626 16627 16628 16629 16630 16631 16632 16633 16634 16635 16636 16637 16638 16639 16640 16641 16642 16643 16644 16645 16646 16647 16648 16649 16650 16651 16652 16653 16654 16655 16656 16657 16658 16659 16660 16661 16662 16663 16664 16665 16666 16667 16668 16669 16670 16671 16672 16673 16674 16675 16676 16677 16678 16679 16680 16681 16682 16683 16684 16685 16686 16687 16688 16689 16690 16691 16692 16693 16694 16695 16696 16697 16698 16699 16700 16701 16702 16703 16704 16705 16706 16707 16708 16709 16710 16711 16712 16713 16714 16715 16716 16717 16718 16719 16720 16721 16722 16723 16724 16725 16726 16727 16728 16729 16730 16731 16732 16733 16734 16735 16736 16737 16738 16739 16740 16741 16742 16743 16744 16745 16746 16747 16748 16749 16750 16751 16752 16753 16754 16755 16756 16757 16758 16759 16760 16761 16762 16763 16764 16765 16766 16767 16768 16769 16770 16771 16772 16773 16774 16775 16776 16777 16778 16779 16780 16781 16782 16783 16784 16785 16786 16787 16788 16789 16790 16791 16792 16793 16794 16795 16796 16797 16798 16799 16800 16801 16802 16803 16804 16805 16806 16807 16808 16809 16810 16811 16812 16813 16814 16815 16816 16817 16818 16819 16820 16821 16822 16823 16824 16825 16826 16827 16828 16829 16830 16831 16832 16833 16834 16835 16836 16837 16838 16839 16840 16841 16842 16843 16844 16845 16846 16847 16848 16849 16850 16851 16852 16853 16854 16855 16856 16857 16858 16859 16860 16861 16862 16863 16864 16865 16866 16867 16868 16869 16870 16871 16872 16873 16874 16875 16876 16877 16878 16879 16880 16881 16882 16883 16884 16885 16886 16887 16888 16889 16890 16891 16892 16893 16894 16895 16896 16897 16898 16899 16900 16901 16902 16903 16904 16905 16906 16907 16908 16909 16910 16911 16912 16913 16914 16915 16916 16917 16918 16919 16920 16921 16922 16923 16924 16925 16926 16927 16928 16929 16930 16931 16932 16933 16934 16935 16936 16937 16938 16939 16940 16941 16942 16943 16944 16945 16946 16947 16948 16949 16950 16951 16952 16953 16954 16955 16956 16957 16958 16959 16960 16961 16962 16963 16964 16965 16966 16967 16968 16969 16970 16971 16972 16973 16974 16975 16976 16977 16978 16979 16980 16981 16982 16983 16984 16985 16986 16987 16988 16989 16990 16991 16992 16993 16994 16995 16996 16997 16998 16999 17000 17001 17002 17003 17004 17005 17006 17007 17008 17009 17010 17011 17012 17013 17014 17015 17016 17017 17018 17019 17020 17021 17022 17023 17024 17025 17026 17027 17028 17029 17030 17031 17032 17033 17034 17035 17036 17037 17038 17039 17040 17041 17042 17043 17044 17045 17046 17047 17048 17049 17050 17051 17052 17053 17054 17055 17056 17057 17058 17059 17060 17061 17062 17063 17064 17065 17066 17067 17068 17069 17070 17071 17072 17073 17074 17075 17076 17077 17078 17079 17080 17081 17082 17083 17084 17085 17086 17087 17088 17089 17090 17091 17092 17093 17094 17095 17096 17097 17098 17099 17100 17101 17102 17103 17104 17105 17106 17107 17108 17109 17110 17111 17112 17113 17114 17115 17116 17117 17118 17119 17120 17121 17122 17123 17124 17125 17126 17127 17128 17129 17130 17131 17132 17133 17134 17135 17136 17137 17138 17139 17140 17141 17142 17143 17144 17145 17146 17147 17148 17149 17150 17151 17152 17153 17154 17155 17156 17157 17158 17159 17160 17161 17162 17163 17164 17165 17166 17167 17168 17169 17170 17171 17172 17173 17174 17175 17176 17177 17178 17179 17180 17181 17182 17183 17184 17185 17186 17187 17188 17189 17190 17191 17192 17193 17194 17195 17196 17197 17198 17199 17200 17201 17202 17203 17204 17205 17206 17207 17208 17209 17210 17211 17212 17213 17214 17215 17216 17217 17218 17219 17220 17221 17222 17223 17224 17225 17226 17227 17228 17229 17230 17231 17232 17233 17234 17235 17236 17237 17238 17239 17240 17241 17242 17243 17244 17245 17246 17247 17248 17249 17250 17251 17252 17253 17254 17255 17256 17257 17258 17259 17260 17261 17262 17263 17264 17265 17266 17267 17268 17269 17270 17271 17272 17273 17274 17275 17276 17277 17278 17279 17280 17281 17282 17283 17284 17285 17286 17287 17288 17289 17290 17291 17292 17293 17294 17295 17296 17297 17298 17299 17300 17301 17302 17303 17304 17305 17306 17307 17308 17309 17310 17311 17312 17313 17314 17315 17316 17317 17318 17319 17320 17321 17322 17323 17324 17325 17326 17327 17328 17329 17330 17331 17332 17333 17334 17335 17336 17337 17338 17339 17340 17341 17342 17343 17344 17345 17346 17347 17348 17349 17350 17351 17352 17353 17354 17355 17356 17357 17358 17359 17360 17361 17362 17363 17364 17365 17366 17367 17368 17369 17370 17371 17372 17373 17374 17375 17376 17377 17378 17379 17380 17381 17382 17383 17384 17385 17386 17387 17388 17389 17390 17391 17392 17393 17394 17395 17396 17397 17398 17399 17400 17401 17402 17403 17404 17405 17406 17407 17408 17409 17410 17411 17412 17413 17414 17415 17416 17417 17418 17419 17420 17421 17422 17423 17424 17425 17426 17427 17428 17429 17430 17431 17432 17433 17434 17435 17436 17437 17438 17439 17440 17441 17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452 17453 17454 17455 17456 17457 17458 17459 17460 17461 17462 17463 17464 17465 17466 17467 17468 17469 17470 17471 17472 17473 17474 17475 17476 17477 17478 17479 17480 17481 17482 17483 17484 17485 17486 17487 17488 17489 17490 17491 17492 17493 17494 17495 17496 17497 17498 17499 17500 17501 17502 17503 17504 17505 17506 17507 17508 17509 17510 17511 17512 17513 17514 17515 17516 17517 17518 17519 17520 17521 17522 17523 17524 17525 17526 17527 17528 17529 17530 17531 17532 17533 17534 17535 17536 17537 17538 17539 17540 17541 17542 17543 17544 17545 17546 17547 17548 17549 17550 17551 17552 17553 17554 17555 17556 17557 17558 17559 17560 17561 17562 17563 17564 17565 17566 17567 17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578 17579 17580 17581 17582 17583 17584 17585 17586 17587 17588 17589 17590 17591 17592 17593 17594 17595 17596 17597 17598 17599 17600 17601 17602 17603 17604 17605 17606 17607 17608 17609 17610 17611 17612 17613 17614 17615 17616 17617 17618 17619 17620 17621 17622 17623 17624 17625 17626 17627 17628 17629 17630 17631 17632 17633 17634 17635 17636 17637 17638 17639 17640 17641 17642 17643 17644 17645 17646 17647 17648 17649 17650 17651 17652 17653 17654 17655 17656 17657 17658 17659 17660 17661 17662 17663 17664 17665 17666 17667 17668 17669 17670 17671 17672 17673 17674 17675 17676 17677 17678 17679 17680 17681 17682 17683 17684 17685 17686 17687 17688 17689 17690 17691 17692 17693 17694 17695 17696 17697 17698 17699 17700 17701 17702 17703 17704 17705 17706 17707 17708 17709 17710 17711 17712 17713 17714 17715 17716 17717 17718 17719 17720 17721 17722 17723 17724 17725 17726 17727 17728 17729 17730 17731 17732 17733 17734 17735 17736 17737 17738 17739 17740 17741 17742 17743 17744 17745 17746 17747 17748 17749 17750 17751 17752 17753 17754 17755 17756 17757 17758 17759 17760 17761 17762 17763 17764 17765 17766 17767 17768 17769 17770 17771 17772 17773 17774 17775 17776 17777 17778 17779 17780 17781 17782 17783 17784 17785 17786 17787 17788 17789 17790 17791 17792 17793 17794 17795 17796 17797 17798 17799 17800 17801 17802 17803 17804 17805 17806 17807 17808 17809 17810 17811 17812 17813 17814 17815 17816 17817 17818 17819 17820 17821 17822 17823 17824 17825 17826 17827 17828 17829 17830 17831 17832 17833 17834 17835 17836 17837 17838 17839 17840 17841 17842 17843 17844 17845 17846 17847 17848 17849 17850 17851 17852 17853 17854 17855 17856 17857 17858 17859 17860 17861 17862 17863 17864 17865 17866 17867 17868 17869 17870 17871 17872 17873 17874 17875 17876 17877 17878 17879 17880 17881 17882 17883 17884 17885 17886 17887 17888 17889 17890 17891 17892 17893 17894 17895 17896 17897 17898 17899 17900 17901 17902 17903 17904 17905 17906 17907 17908 17909 17910 17911 17912 17913 17914 17915 17916 17917 17918 17919 17920 17921 17922 17923 17924 17925 17926 17927 17928 17929 17930 17931 17932 17933 17934 17935 17936 17937 17938 17939 17940 17941 17942 17943 17944 17945 17946 17947 17948 17949 17950 17951 17952 17953 17954 17955 17956 17957 17958 17959 17960 17961 17962 17963 17964 17965 17966 17967 17968 17969 17970 17971 17972 17973 17974 17975 17976 17977 17978 17979 17980 17981 17982 17983 17984 17985 17986 17987 17988 17989 17990 17991 17992 17993 17994 17995 17996 17997 17998 17999 18000 18001 18002 18003 18004 18005 18006 18007 18008 18009 18010 18011 18012 18013 18014 18015 18016 18017 18018 18019 18020 18021 18022 18023 18024 18025 18026 18027 18028 18029 18030 18031 18032 18033 18034 18035 18036 18037 18038 18039 18040 18041 18042 18043 18044 18045 18046 18047 18048 18049 18050 18051 18052 18053 18054 18055 18056 18057 18058 18059 18060 18061 18062 18063 18064 18065 18066 18067 18068 18069 18070 18071 18072 18073 18074 18075 18076 18077 18078 18079 18080 18081 18082 18083 18084 18085 18086 18087 18088 18089 18090 18091 18092 18093 18094 18095 18096 18097 18098 18099 18100 18101 18102 18103 18104 18105 18106 18107 18108 18109 18110 18111 18112 18113 18114 18115 18116 18117 18118 18119 18120 18121 18122 18123 18124 18125 18126 18127 18128 18129 18130 18131 18132 18133 18134 18135 18136 18137 18138 18139 18140 18141 18142 18143 18144 18145 18146 18147 18148 18149 18150 18151 18152 18153 18154 18155 18156 18157 18158 18159 18160 18161 18162 18163 18164 18165 18166 18167 18168 18169 18170 18171 18172 18173 18174 18175 18176 18177 18178 18179 18180 18181 18182 18183 18184 18185 18186 18187 18188 18189 18190 18191 18192 18193 18194 18195 18196 18197 18198 18199 18200 18201 18202 18203 18204 18205 18206 18207 18208 18209 18210 18211 18212 18213 18214 18215 18216 18217 18218 18219 18220 18221 18222 18223 18224 18225 18226 18227 18228 18229 18230 18231 18232 18233 18234 18235 18236 18237 18238 18239 18240 18241 18242 18243 18244 18245 18246 18247 18248 18249 18250 18251 18252 18253 18254 18255 18256 18257 18258 18259 18260 18261 18262 18263 18264 18265 18266 18267 18268 18269 18270 18271 18272 18273 18274 18275 18276 18277 18278 18279 18280 18281 18282 18283 18284 18285 18286 18287 18288 18289 18290 18291 18292 18293 18294 18295 18296 18297 18298 18299 18300 18301 18302 18303 18304 18305 18306 18307 18308 18309 18310 18311 18312 18313 18314 18315 18316 18317 18318 18319 18320 18321 18322 18323 18324 18325 18326 18327 18328 18329 18330 18331 18332 18333 18334 18335 18336 18337 18338 18339 18340 18341 18342 18343 18344 18345 18346 18347 18348 18349 18350 18351 18352 18353 18354 18355 18356 18357 18358 18359 18360 18361 18362 18363 18364 18365 18366 18367 18368 18369 18370 18371 18372 18373 18374 18375 18376 18377 18378 18379 18380 18381 18382 18383 18384 18385 18386 18387 18388 18389 18390 18391 18392 18393 18394 18395 18396 18397 18398 18399 18400 18401 18402 18403 18404 18405 18406 18407 18408 18409 18410 18411 18412 18413 18414 18415 18416 18417 18418 18419 18420 18421 18422 18423 18424 18425 18426 18427 18428 18429 18430 18431 18432 18433 18434 18435 18436 18437 18438 18439 18440 18441 18442 18443 18444 18445 18446 18447 18448 18449 18450 18451 18452 18453 18454 18455 18456 18457 18458 18459 18460 18461 18462 18463 18464 18465 18466 18467 18468 18469 18470 18471 18472 18473 18474 18475 18476 18477 18478 18479 18480 18481 18482 18483 18484 18485 18486 18487 18488 18489 18490 18491 18492 18493 18494 18495 18496 18497 18498 18499 18500 18501 18502 18503 18504 18505 18506 18507 18508 18509 18510 18511 18512 18513 18514 18515 18516 18517 18518 18519 18520 18521 18522 18523 18524 18525 18526 18527 18528 18529 18530 18531 18532 18533 18534 18535 18536 18537 18538 18539 18540 18541 18542 18543 18544 18545 18546 18547 18548 18549 18550 18551 18552 18553 18554 18555 18556 18557 18558 18559 18560 18561 18562 18563 18564 18565 18566 18567 18568 18569 18570 18571 18572 18573 18574 18575 18576 18577 18578 18579 18580 18581 18582 18583 18584 18585 18586 18587 18588 18589 18590 18591 18592 18593 18594 18595 18596 18597 18598 18599 18600 18601 18602 18603 18604 18605 18606 18607 18608 18609 18610 18611 18612 18613 18614 18615 18616 18617 18618 18619 18620 18621 18622 18623 18624 18625 18626 18627 18628 18629 18630 18631 18632 18633 18634 18635 18636 18637 18638 18639 18640 18641 18642 18643 18644 18645 18646 18647 18648 18649 18650 18651 18652 18653 18654 18655 18656 18657 18658 18659 18660 18661 18662 18663 18664 18665 18666 18667 18668 18669 18670 18671 18672 18673 18674 18675 18676 18677 18678 18679 18680 18681 18682 18683 18684 18685 18686 18687 18688 18689 18690 18691 18692 18693 18694 18695 18696 18697 18698 18699 18700 18701 18702 18703 18704 18705 18706 18707 18708 18709 18710 18711 18712 18713 18714 18715 18716 18717 18718 18719 18720 18721 18722 18723 18724 18725 18726 18727 18728 18729 18730 18731 18732 18733 18734 18735 18736 18737 18738 18739 18740 18741 18742 18743 18744 18745 18746 18747 18748 18749 18750 18751 18752 18753 18754 18755 18756 18757 18758 18759 18760 18761 18762 18763 18764 18765 18766 18767 18768 18769 18770 18771 18772 18773 18774 18775 18776 18777 18778 18779 18780 18781 18782 18783 18784 18785 18786 18787 18788 18789 18790 18791 18792 18793 18794 18795 18796 18797 18798 18799 18800 18801 18802 18803 18804 18805 18806 18807 18808 18809 18810 18811 18812 18813 18814 18815 18816 18817 18818 18819 18820 18821 18822 18823 18824 18825 18826 18827 18828 18829 18830 18831 18832 18833 18834 18835 18836 18837 18838 18839 18840 18841 18842 18843 18844 18845 18846 18847 18848 18849 18850 18851 18852 18853 18854 18855 18856 18857 18858 18859 18860 18861 18862 18863 18864 18865 18866 18867 18868 18869 18870 18871 18872 18873 18874 18875 18876 18877 18878 18879 18880 18881 18882 18883 18884 18885 18886 18887 18888 18889 18890 18891 18892 18893 18894 18895 18896 18897 18898 18899 18900 18901 18902 18903 18904 18905 18906 18907 18908 18909 18910 18911 18912 18913 18914 18915 18916 18917 18918 18919 18920 18921 18922 18923 18924 18925 18926 18927 18928 18929 18930 18931 18932 18933 18934 18935 18936 18937 18938 18939 18940 18941 18942 18943 18944 18945 18946 18947 18948 18949 18950 18951 18952 18953 18954 18955 18956 18957 18958 18959 18960 18961 18962 18963 18964 18965 18966 18967 18968 18969 18970 18971 18972 18973 18974 18975 18976 18977 18978 18979 18980 18981 18982 18983 18984 18985 18986 18987 18988 18989 18990 18991 18992 18993 18994 18995 18996 18997 18998 18999 19000 19001 19002 19003 19004 19005 19006 19007 19008 19009 19010 19011 19012 19013 19014 19015 19016 19017 19018 19019 19020 19021 19022 19023 19024 19025 19026 19027 19028 19029 19030 19031 19032 19033 19034 19035 19036 19037 19038 19039 19040 19041 19042 19043 19044 19045 19046 19047 19048 19049 19050 19051 19052 19053 19054 19055 19056 19057 19058 19059 19060 19061 19062 19063 19064 19065 19066 19067 19068 19069 19070 19071 19072 19073 19074 19075 19076 19077 19078 19079 19080 19081 19082 19083 19084 19085 19086 19087 19088 19089 19090 19091 19092 19093 19094 19095 19096 19097 19098 19099 19100 19101 19102 19103 19104 19105 19106 19107 19108 19109 19110 19111 19112 19113 19114 19115 19116 19117 19118 19119 19120 19121 19122 19123 19124 19125 19126 19127 19128 19129 19130 19131 19132 19133 19134 19135 19136 19137 19138 19139 19140 19141 19142 19143 19144 19145 19146 19147 19148 19149 19150 19151 19152 19153 19154 19155 19156 19157 19158 19159 19160 19161 19162 19163 19164 19165 19166 19167 19168 19169 19170 19171 19172 19173 19174 19175 19176 19177 19178 19179 19180 19181 19182 19183 19184 19185 19186 19187 19188 19189 19190 19191 19192 19193 19194 19195 19196 19197 19198 19199 19200 19201 19202 19203 19204 19205 19206 19207 19208 19209 19210 19211 19212 19213 19214 19215 19216 19217 19218 19219 19220 19221 19222 19223 19224 19225 19226 19227 19228 19229 19230 19231 19232 19233 19234 19235 19236 19237 19238 19239 19240 19241 19242 19243 19244 19245 19246 19247 19248 19249 19250 19251 19252 19253 19254 19255 19256 19257 19258 19259 19260 19261 19262 19263 19264 19265 19266 19267 19268 19269 19270 19271 19272 19273 19274 19275 19276 19277 19278 19279 19280 19281 19282 19283 19284 19285 19286 19287 19288 19289 19290 19291 19292 19293 19294 19295 19296 19297 19298 19299 19300 19301 19302 19303 19304 19305 19306 19307 19308 19309 19310 19311 19312 19313 19314 19315 19316 19317 19318 19319 19320 19321 19322 19323 19324 19325 19326 19327 19328 19329 19330 19331 19332 19333 19334 19335 19336 19337 19338 19339 19340 19341 19342 19343 19344 19345 19346 19347 19348 19349 19350 19351 19352 19353 19354 19355 19356 19357 19358 19359 19360 19361 19362 19363 19364 19365 19366 19367 19368 19369 19370 19371 19372 19373 19374 19375 19376 19377 19378 19379 19380 19381 19382 19383 19384 19385 19386 19387 19388 19389 19390 19391 19392 19393 19394 19395 19396 19397 19398 19399 19400 19401 19402 19403 19404 19405 19406 19407 19408 19409 19410 19411 19412 19413 19414 19415 19416 19417 19418 19419 19420 19421 19422 19423 19424 19425 19426 19427 19428 19429 19430 19431 19432 19433 19434 19435 19436 19437 19438 19439 19440 19441 19442 19443 19444 19445 19446 19447 19448 19449 19450 19451 19452 19453 19454 19455 19456 19457 19458 19459 19460 19461 19462 19463 19464 19465 19466 19467 19468 19469 19470 19471 19472 19473 19474 19475 19476 19477 19478 19479 19480 19481 19482 19483 19484 19485 19486 19487 19488 19489 19490 19491 19492 19493 19494 19495 19496 19497 19498 19499 19500 19501 19502 19503 19504 19505 19506 19507 19508 19509 19510 19511 19512 19513 19514 19515 19516 19517 19518 19519 19520 19521 19522 19523 19524 19525 19526 19527 19528 19529 19530 19531 19532 19533 19534 19535 19536 19537 19538 19539 19540 19541 19542 19543 19544 19545 19546 19547 19548 19549 19550 19551 19552 19553 19554 19555 19556 19557 19558 19559 19560 19561 19562 19563 19564 19565 19566 19567 19568 19569 19570 19571 19572 19573 19574 19575 19576 19577 19578 19579 19580 19581 19582 19583 19584 19585 19586 19587 19588 19589 19590 19591 19592 19593 19594 19595 19596 19597 19598 19599 19600 19601 19602 19603 19604 19605 19606 19607 19608 19609 19610 19611 19612 19613 19614 19615 19616 19617 19618 19619 19620 19621 19622 19623 19624 19625 19626 19627 19628 19629 19630 19631 19632 19633 19634 19635 19636 19637 19638 19639 19640 19641 19642 19643 19644 19645 19646 19647 19648 19649 19650 19651 19652 19653 19654 19655 19656 19657 19658 19659 19660 19661 19662 19663 19664 19665 19666 19667 19668 19669 19670 19671 19672 19673 19674 19675 19676 19677 19678 19679 19680 19681 19682 19683 19684 19685 19686 19687 19688 19689 19690 19691 19692 19693 19694 19695 19696 19697 19698 19699 19700 19701 19702 19703 19704 19705 19706 19707 19708 19709 19710 19711 19712 19713 19714 19715 19716 19717 19718 19719 19720 19721 19722 19723 19724 19725 19726 19727 19728 19729 19730 19731 19732 19733 19734 19735 19736 19737 19738 19739 19740 19741 19742 19743 19744 19745 19746 19747 19748 19749 19750 19751 19752 19753 19754 19755 19756 19757 19758 19759 19760 19761 19762 19763 19764 19765 19766 19767 19768 19769 19770 19771 19772 19773 19774 19775 19776 19777 19778 19779 19780 19781 19782 19783 19784 19785 19786 19787 19788 19789 19790 19791 19792 19793 19794 19795 19796 19797 19798 19799 19800 19801 19802 19803 19804 19805 19806 19807 19808 19809 19810 19811 19812 19813 19814 19815 19816 19817 19818 19819 19820 19821 19822 19823 19824 19825 19826 19827 19828 19829 19830 19831 19832 19833 19834 19835 19836 19837 19838 19839 19840 19841 19842 19843 19844 19845 19846 19847 19848 19849 19850 19851 19852 19853 19854 19855 19856 19857 19858 19859 19860 19861 19862 19863 19864 19865 19866 19867 19868 19869 19870 19871 19872 19873 19874 19875 19876 19877 19878 19879 19880 19881 19882 19883 19884 19885 19886 19887 19888 19889 19890 19891 19892 19893 19894 19895 19896 19897 19898 19899 19900 19901 19902 19903 19904 19905 19906 19907 19908 19909 19910 19911 19912 19913 19914 19915 19916 19917 19918 19919 19920 19921 19922 19923 19924 19925 19926 19927 19928 19929 19930 19931 19932 19933 19934 19935 19936 19937 19938 19939 19940 19941 19942 19943 19944 19945 19946 19947 19948 19949 19950 19951 19952 19953 19954 19955 19956 19957 19958 19959 19960 19961 19962 19963 19964 19965 19966 19967 19968 19969 19970 19971 19972 19973 19974 19975 19976 19977 19978 19979 19980 19981 19982 19983 19984 19985 19986 19987 19988 19989 19990 19991 19992 19993 19994 19995 19996 19997 19998 19999 20000 20001 20002 20003 20004 20005 20006 20007 20008 20009 20010 20011 20012 20013 20014 20015 20016 20017 20018 20019 20020 20021 20022 20023 20024 20025 20026 20027 20028 20029 20030 20031 20032 20033 20034 20035 20036 20037 20038 20039 20040 20041 20042 20043 20044 20045 20046 20047 20048 20049 20050 20051 20052 20053 20054 20055 20056 20057 20058 20059 20060 20061 20062 20063 20064 20065 20066 20067 20068 20069 20070 20071 20072 20073 20074 20075 20076 20077 20078 20079 20080 20081 20082 20083 20084 20085 20086 20087 20088 20089 20090 20091 20092 20093 20094 20095 20096 20097 20098 20099 20100 20101 20102 20103 20104 20105 20106 20107 20108 20109 20110 20111 20112 20113 20114 20115 20116 20117 20118 20119 20120 20121 20122 20123 20124 20125 20126 20127 20128 20129 20130 20131 20132 20133 20134 20135 20136 20137 20138 20139 20140 20141 20142 20143 20144 20145 20146 20147 20148 20149 20150 20151 20152 20153 20154 20155 20156 20157 20158 20159 20160 20161 20162 20163 20164 20165 20166 20167 20168 20169 20170 20171 20172 20173 20174 20175 20176 20177 20178 20179 20180 20181 20182 20183 20184 20185 20186 20187 20188 20189 20190 20191 20192 20193 20194 20195 20196 20197 20198 20199 20200 20201 20202 20203 20204 20205 20206 20207 20208 20209 20210 20211 20212 20213 20214 20215 20216 20217 20218 20219 20220 20221 20222 20223 20224 20225 20226 20227 20228 20229 20230 20231 20232 20233 20234 20235 20236 20237 20238 20239 20240 20241 20242 20243 20244 20245 20246 20247 20248 20249 20250 20251 20252 20253 20254 20255 20256 20257 20258 20259 20260 20261 20262 20263 20264 20265 20266 20267 20268 20269 20270 20271 20272 20273 20274 20275 20276 20277 20278 20279 20280 20281 20282 20283 20284 20285 20286 20287 20288 20289 20290 20291 20292 20293 20294 20295 20296 20297 20298 20299 20300 20301 20302 20303 20304 20305 20306 20307 20308 20309 20310 20311 20312 20313 20314 20315 20316 20317 20318 20319 20320 20321 20322 20323 20324 20325 20326 20327 20328 20329 20330 20331 20332 20333 20334 20335 20336 20337 20338 20339 20340 20341 20342 20343 20344 20345 20346 20347 20348 20349 20350 20351 20352 20353 20354 20355 20356 20357 20358 20359 20360 20361 20362 20363 20364 20365 20366 20367 20368 20369 20370 20371 20372 20373 20374 20375 20376 20377 20378 20379 20380 20381 20382 20383 20384 20385 20386 20387 20388 20389 20390 20391 20392 20393 20394 20395 20396 20397 20398 20399 20400 20401 20402 20403 20404 20405 20406 20407 20408 20409 20410 20411 20412 20413 20414 20415 20416 20417 20418 20419 20420 20421 20422 20423 20424 20425 20426 20427 20428 20429 20430 20431 20432 20433 20434 20435 20436 20437 20438 20439 20440 20441 20442 20443 20444 20445 20446 20447 20448 20449 20450 20451 20452 20453 20454 20455 20456 20457 20458 20459 20460 20461 20462 20463 20464 20465 20466 20467 20468 20469 20470 20471 20472 20473 20474 20475 20476 20477 20478 20479 20480 20481 20482 20483 20484 20485 20486 20487 20488 20489 20490 20491 20492 20493 20494 20495 20496 20497 20498 20499 20500 20501 20502 20503 20504 20505 20506 20507 20508 20509 20510 20511 20512 20513 20514 20515 20516 20517 20518 20519 20520 20521 20522 20523 20524 20525 20526 20527 20528 20529 20530 20531 20532 20533 20534 20535 20536 20537 20538 20539 20540 20541 20542 20543 20544 20545 20546 20547 20548 20549 20550 20551 20552 20553 20554 20555 20556 20557 20558 20559 20560 20561 20562 20563 20564 20565 20566 20567 20568 20569 20570 20571 20572 20573 20574 20575 20576 20577 20578 20579 20580 20581 20582 20583 20584 20585 20586 20587 20588 20589 20590 20591 20592 20593 20594 20595 20596 20597 20598 20599 20600 20601 20602 20603 20604 20605 20606 20607 20608 20609 20610 20611 20612 20613 20614 20615 20616 20617 20618 20619 20620 20621 20622 20623 20624 20625 20626 20627 20628 20629 20630 20631 20632 20633 20634 20635 20636 20637 20638 20639 20640 20641 20642 20643 20644 20645 20646 20647 20648 20649 20650 20651 20652 20653 20654 20655 20656 20657 20658 20659 20660 20661 20662 20663 20664 20665 20666 20667 20668 20669 20670 20671 20672 20673 20674 20675 20676 20677 20678 20679 20680 20681 20682 20683 20684 20685 20686 20687 20688 20689 20690 20691 20692 20693 20694 20695 20696 20697 20698 20699 20700 20701 20702 20703 20704 20705 20706 20707 20708 20709 20710 20711 20712 20713 20714 20715 20716 20717 20718 20719 20720 20721 20722 20723 20724 20725 20726 20727 20728 20729 20730 20731 20732 20733 20734 20735 20736 20737 20738 20739 20740 20741 20742 20743 20744 20745 20746 20747 20748 20749 20750 20751 20752 20753 20754 20755 20756 20757 20758 20759 20760 20761 20762 20763 20764 20765 20766 20767 20768 20769 20770 20771 20772 20773 20774 20775 20776 20777 20778 20779 20780 20781 20782 20783 20784 20785 20786 20787 20788 20789 20790 20791 20792 20793 20794 20795 20796 20797 20798 20799 20800 20801 20802 20803 20804 20805 20806 20807 20808 20809 20810 20811 20812 20813 20814 20815 20816 20817 20818 20819 20820 20821 20822 20823 20824 20825 20826 20827 20828 20829 20830 20831 20832 20833 20834 20835 20836 20837 20838 20839 20840 20841 20842 20843 20844 20845 20846 20847 20848 20849 20850 20851 20852 20853 20854 20855 20856 20857 20858 20859 20860 20861 20862 20863 20864 20865 20866 20867 20868 20869 20870 20871 20872 20873 20874 20875 20876 20877 20878 20879 20880 20881 20882 20883 20884 20885 20886 20887 20888 20889 20890 20891 20892 20893 20894 20895 20896 20897 20898 20899 20900 20901 20902 20903 20904 20905 20906 20907 20908 20909 20910 20911 20912 20913 20914 20915 20916 20917 20918 20919 20920 20921 20922 20923 20924 20925 20926 20927 20928 20929 20930 20931 20932 20933 20934 20935 20936 20937 20938 20939 20940 20941 20942 20943 20944 20945 20946 20947 20948 20949 20950 20951 20952 20953 20954 20955 20956 20957 20958 20959 20960 20961 20962 20963 20964 20965 20966 20967 20968 20969 20970 20971 20972 20973 20974 20975 20976 20977 20978 20979 20980 20981 20982 20983 20984 20985 20986 20987 20988 20989 20990 20991 20992 20993 20994 20995 20996 20997 20998 20999 21000 21001 21002 21003 21004 21005 21006 21007 21008 21009 21010 21011 21012 21013 21014 21015 21016 21017 21018 21019 21020 21021 21022 21023 21024 21025 21026 21027 21028 21029 21030 21031 21032 21033 21034 21035 21036 21037 21038 21039 21040 21041 21042 21043 21044 21045 21046 21047 21048 21049 21050 21051 21052 21053 21054 21055 21056 21057 21058 21059 21060 21061 21062 21063 21064 21065 21066 21067 21068 21069 21070 21071 21072 21073 21074 21075 21076 21077 21078 21079 21080 21081 21082 21083 21084 21085 21086 21087 21088 21089 21090 21091 21092 21093 21094 21095 21096 21097 21098 21099 21100 21101 21102 21103 21104 21105 21106 21107 21108 21109 21110 21111 21112 21113 21114 21115 21116 21117 21118 21119 21120 21121 21122 21123 21124 21125 21126 21127 21128 21129 21130 21131 21132 21133 21134 21135 21136 21137 21138 21139 21140 21141 21142 21143 21144 21145 21146 21147 21148 21149 21150 21151 21152 21153 21154 21155 21156 21157 21158 21159 21160 21161 21162 21163 21164 21165 21166 21167 21168 21169 21170 21171 21172 21173 21174 21175 21176 21177 21178 21179 21180 21181 21182 21183 21184 21185 21186 21187 21188 21189 21190 21191 21192 21193 21194 21195 21196 21197 21198 21199 21200 21201 21202 21203 21204 21205 21206 21207 21208 21209 21210 21211 21212 21213 21214 21215 21216 21217 21218 21219 21220 21221 21222 21223 21224 21225 21226 21227 21228 21229 21230 21231 21232 21233 21234 21235 21236 21237 21238 21239 21240 21241 21242 21243 21244 21245 21246 21247 21248 21249 21250 21251 21252 21253 21254 21255 21256 21257 21258 21259 21260 21261 21262 21263 21264 21265 21266 21267 21268 21269 21270 21271 21272 21273 21274 21275 21276 21277 21278 21279 21280 21281 21282 21283 21284 21285 21286 21287 21288 21289 21290 21291 21292 21293 21294 21295 21296 21297 21298 21299 21300 21301 21302 21303 21304 21305 21306 21307 21308 21309 21310 21311 21312 21313 21314 21315 21316 21317 21318 21319 21320 21321 21322 21323 21324 21325 21326 21327 21328 21329 21330 21331 21332 21333 21334 21335 21336 21337 21338 21339 21340 21341 21342 21343 21344 21345 21346 21347 21348 21349 21350 21351 21352 21353 21354 21355 21356 21357 21358 21359 21360 21361 21362 21363 21364 21365 21366 21367 21368 21369 21370 21371 21372 21373 21374 21375 21376 21377 21378 21379 21380 21381 21382 21383 21384 21385 21386 21387 21388 21389 21390 21391 21392 21393 21394 21395 21396 21397 21398 21399 21400 21401 21402 21403 21404 21405 21406 21407 21408 21409 21410 21411 21412 21413 21414 21415 21416 21417 21418 21419 21420 21421 21422 21423 21424 21425 21426 21427 21428 21429 21430 21431 21432 21433 21434 21435 21436 21437 21438 21439 21440 21441 21442 21443 21444 21445 21446 21447 21448 21449 21450 21451 21452 21453 21454 21455 21456 21457 21458 21459 21460 21461 21462 21463 21464 21465 21466 21467 21468 21469 21470 21471 21472 21473 21474 21475 21476 21477 21478 21479 21480 21481 21482 21483 21484 21485 21486 21487 21488 21489 21490 21491 21492 21493 21494 21495 21496 21497 21498 21499 21500 21501 21502 21503 21504 21505 21506 21507 21508 21509 21510 21511 21512 21513 21514 21515 21516 21517 21518 21519 21520 21521 21522 21523 21524 21525 21526 21527 21528 21529 21530 21531 21532 21533 21534 21535 21536 21537 21538 21539 21540 21541 21542 21543 21544 21545 21546 21547 21548 21549 21550 21551 21552 21553 21554 21555 21556 21557 21558 21559 21560 21561 21562 21563 21564 21565 21566 21567 21568 21569 21570 21571 21572 21573 21574 21575 21576 21577 21578 21579 21580 21581 21582 21583 21584 21585 21586 21587 21588 21589 21590 21591 21592 21593 21594 21595 21596 21597 21598 21599 21600 21601 21602 21603 21604 21605 21606 21607 21608 21609 21610 21611 21612 21613 21614 21615 21616 21617 21618 21619 21620 21621 21622 21623 21624 21625 21626 21627 21628 21629 21630 21631 21632 21633 21634 21635 21636 21637 21638 21639 21640 21641 21642 21643 21644 21645 21646 21647 21648 21649 21650 21651 21652 21653 21654 21655 21656 21657 21658 21659 21660 21661 21662 21663 21664 21665 21666 21667 21668 21669 21670 21671 21672 21673 21674 21675 21676 21677 21678 21679 21680 21681 21682 21683 21684 21685 21686 21687 21688 21689 21690 21691 21692 21693 21694 21695 21696 21697 21698 21699 21700 21701 21702 21703 21704 21705 21706 21707 21708 21709 21710 21711 21712 21713 21714 21715 21716 21717 21718 21719 21720 21721 21722 21723 21724 21725 21726 21727 21728 21729 21730 21731 21732 21733 21734 21735 21736 21737 21738 21739 21740 21741 21742 21743 21744 21745 21746 21747 21748 21749 21750 21751 21752 21753 21754 21755 21756 21757 21758 21759 21760 21761 21762 21763 21764 21765 21766 21767 21768 21769 21770 21771 21772 21773 21774 21775 21776 21777 21778 21779 21780 21781 21782 21783 21784 21785 21786 21787 21788 21789 21790 21791 21792 21793 21794 21795 21796 21797 21798 21799 21800 21801 21802 21803 21804 21805 21806 21807 21808 21809 21810 21811 21812 21813 21814 21815 21816 21817 21818 21819 21820 21821 21822 21823 21824 21825 21826 21827 21828 21829 21830 21831 21832 21833 21834 21835 21836 21837 21838 21839 21840 21841 21842 21843 21844 21845 21846 21847 21848 21849 21850 21851 21852 21853 21854 21855 21856 21857 21858 21859 21860 21861 21862 21863 21864 21865 21866 21867 21868 21869 21870 21871 21872 21873 21874 21875 21876 21877 21878 21879 21880 21881 21882 21883 21884 21885 21886 21887 21888 21889 21890 21891 21892 21893 21894 21895 21896 21897 21898 21899 21900 21901 21902 21903 21904 21905 21906 21907 21908 21909 21910 21911 21912 21913 21914 21915 21916 21917 21918 21919 21920 21921 21922 21923 21924 21925 21926 21927 21928 21929 21930 21931 21932 21933 21934 21935 21936 21937 21938 21939 21940 21941 21942 21943 21944 21945 21946 21947 21948 21949 21950 21951 21952 21953 21954 21955 21956 21957 21958 21959 21960 21961 21962 21963 21964 21965 21966 21967 21968 21969 21970 21971 21972 21973 21974 21975 21976 21977 21978 21979 21980 21981 21982 21983 21984 21985 21986 21987 21988 21989 21990 21991 21992 21993 21994 21995 21996 21997 21998 21999 22000 22001 22002 22003 22004 22005 22006 22007 22008 22009 22010 22011 22012 22013 22014 22015 22016 22017 22018 22019 22020 22021 22022 22023 22024 22025 22026 22027 22028 22029 22030 22031 22032 22033 22034 22035 22036 22037 22038 22039 22040 22041 22042 22043 22044 22045 22046 22047 22048 22049 22050 22051 22052 22053 22054 22055 22056 22057 22058 22059 22060 22061 22062 22063 22064 22065 22066 22067 22068 22069 22070 22071 22072 22073 22074 22075 22076 22077 22078 22079 22080 22081 22082 22083 22084 22085 22086 22087 22088 22089 22090 22091 22092 22093 22094 22095 22096 22097 22098 22099 22100 22101 22102 22103 22104 22105 22106 22107 22108 22109 22110 22111 22112 22113 22114 22115 22116 22117 22118 22119 22120 22121 22122 22123 22124 22125 22126 22127 22128 22129 22130 22131 22132 22133 22134 22135 22136 22137 22138 22139 22140 22141 22142 22143 22144 22145 22146 22147 22148 22149 22150 22151 22152 22153 22154 22155 22156 22157 22158 22159 22160 22161 22162 22163 22164 22165 22166 22167 22168 22169 22170 22171 22172 22173 22174 22175 22176 22177 22178 22179 22180 22181 22182 22183 22184 22185 22186 22187 22188 22189 22190 22191 22192 22193 22194 22195 22196 22197 22198 22199 22200 22201 22202 22203 22204 22205 22206 22207 22208 22209 22210 22211 22212 22213 22214 22215 22216 22217 22218 22219 22220 22221 22222 22223 22224 22225 22226 22227 22228 22229 22230 22231 22232 22233 22234 22235 22236 22237 22238 22239 22240 22241 22242 22243 22244 22245 22246 22247 22248 22249 22250 22251 22252 22253 22254 22255 22256 22257 22258 22259 22260 22261 22262 22263 22264 22265 22266 22267 22268 22269 22270 22271 22272 22273 22274 22275 22276 22277 22278 22279 22280 22281 22282 22283 22284 22285 22286 22287 22288 22289 22290 22291 22292 22293 22294 22295 22296 22297 22298 22299 22300 22301 22302 22303 22304 22305 22306 22307 22308 22309 22310 22311 22312 22313 22314 22315 22316 22317 22318 22319 22320 22321 22322 22323 22324 22325 22326 22327 22328 22329 22330 22331 22332 22333 22334 22335 22336 22337 22338 22339 22340 22341 22342 22343 22344 22345 22346 22347 22348 22349 22350 22351 22352 22353 22354 22355 22356 22357 22358 22359 22360 22361 22362 22363 22364 22365 22366 22367 22368 22369 22370 22371 22372 22373 22374 22375 22376 22377 22378 22379 22380 22381 22382 22383 22384 22385 22386 22387 22388 22389 22390 22391 22392 22393 22394 22395 22396 22397 22398 22399 22400 22401 22402 22403 22404 22405 22406 22407 22408 22409 22410 22411 22412 22413 22414 22415 22416 22417 22418 22419 22420 22421 22422 22423 22424 22425 22426 22427 22428 22429 22430 22431 22432 22433 22434 22435 22436 22437 22438 22439 22440 22441 22442 22443 22444 22445 22446 22447 22448 22449 22450 22451 22452 22453 22454 22455 22456 22457 22458 22459 22460 22461 22462 22463 22464 22465 22466 22467 22468 22469 22470 22471 22472 22473 22474 22475 22476 22477 22478 22479 22480 22481 22482 22483 22484 22485 22486 22487 22488 22489 22490 22491 22492 22493 22494 22495 22496 22497 22498 22499 22500 22501 22502 22503 22504 22505 22506 22507 22508 22509 22510 22511 22512 22513 22514 22515 22516 22517 22518 22519 22520 22521 22522 22523 22524 22525 22526 22527 22528 22529 22530 22531 22532 22533 22534 22535 22536 22537 22538 22539 22540 22541 22542 22543 22544 22545 22546 22547 22548 22549 22550 22551 22552 22553 22554 22555 22556 22557 22558 22559 22560 22561 22562 22563 22564 22565 22566 22567 22568 22569 22570 22571 22572 22573 22574 22575 22576 22577 22578 22579 22580 22581 22582 22583 22584 22585 22586 22587 22588 22589 22590 22591 22592 22593 22594 22595 22596 22597 22598 22599 22600 22601 22602 22603 22604 22605 22606 22607 22608 22609 22610 22611 22612 22613 22614 22615 22616 22617 22618 22619 22620 22621 22622 22623 22624 22625 22626 22627 22628 22629 22630 22631 22632 22633 22634 22635 22636 22637 22638 22639 22640 22641 22642 22643 22644 22645 22646 22647 22648 22649 22650 22651 22652 22653 22654 22655 22656 22657 22658 22659 22660 22661 22662 22663 22664 22665 22666 22667 22668 22669 22670 22671 22672 22673 22674 22675 22676 22677 22678 22679 22680 22681 22682 22683 22684 22685 22686 22687 22688 22689 22690 22691 22692 22693 22694 22695 22696 22697 22698 22699 22700 22701 22702 22703 22704 22705 22706 22707 22708 22709 22710 22711 22712 22713 22714 22715 22716 22717 22718 22719 22720 22721 22722 22723 22724 22725 22726 22727 22728 22729 22730 22731 22732 22733 22734 22735 22736 22737 22738 22739 22740 22741 22742 22743 22744 22745 22746 22747 22748 22749 22750 22751 22752 22753 22754 22755 22756 22757 22758 22759 22760 22761 22762 22763 22764 22765 22766 22767 22768 22769 22770 22771 22772 22773 22774 22775 22776 22777 22778 22779 22780 22781 22782 22783 22784 22785 22786 22787 22788 22789 22790 22791 22792 22793 22794 22795 22796 22797 22798 22799 22800 22801 22802 22803 22804 22805 22806 22807 22808 22809 22810 22811 22812 22813 22814 22815 22816 22817 22818 22819 22820 22821 22822 22823 22824 22825 22826 22827 22828 22829 22830 22831 22832 22833 22834 22835 22836 22837 22838 22839 22840 22841 22842 22843 22844 22845 22846 22847 22848 22849 22850 22851 22852 22853 22854 22855 22856 22857 22858 22859 22860 22861 22862 22863 22864 22865 22866 22867 22868 22869 22870 22871 22872 22873 22874 22875 22876 22877 22878 22879 22880 22881 22882 22883 22884 22885 22886 22887 22888 22889 22890 22891 22892 22893 22894 22895 22896 22897 22898 22899 22900 22901 22902 22903 22904 22905 22906 22907 22908 22909 22910 22911 22912 22913 22914 22915 22916 22917 22918 22919 22920 22921 22922 22923 22924 22925 22926 22927 22928 22929 22930 22931 22932 22933 22934 22935 22936 22937 22938 22939 22940 22941 22942 22943 22944 22945 22946 22947 22948 22949 22950 22951 22952 22953 22954 22955 22956 22957 22958 22959 22960 22961 22962 22963 22964 22965 22966 22967 22968 22969 22970 22971 22972 22973 22974 22975 22976 22977 22978 22979 22980 22981 22982 22983 22984 22985 22986 22987 22988 22989 22990 22991 22992 22993 22994 22995 22996 22997 22998 22999 23000 23001 23002 23003 23004 23005 23006 23007 23008 23009 23010 23011 23012 23013 23014 23015 23016 23017 23018 23019 23020 23021 23022 23023 23024 23025 23026 23027 23028 23029 23030 23031 23032 23033 23034 23035 23036 23037 23038 23039 23040 23041 23042 23043 23044 23045 23046 23047 23048 23049 23050 23051 23052 23053 23054 23055 23056 23057 23058 23059 23060 23061 23062 23063 23064 23065 23066 23067 23068 23069 23070 23071 23072 23073 23074 23075 23076 23077 23078 23079 23080 23081 23082 23083 23084 23085 23086 23087 23088 23089 23090 23091 23092 23093 23094 23095 23096 23097 23098 23099 23100 23101 23102 23103 23104 23105 23106 23107 23108 23109 23110 23111 23112 23113 23114 23115 23116 23117 23118 23119 23120 23121 23122 23123 23124 23125 23126 23127 23128 23129 23130 23131 23132 23133 23134 23135 23136 23137 23138 23139 23140 23141 23142 23143 23144 23145 23146 23147 23148 23149 23150 23151 23152 23153 23154 23155 23156 23157 23158 23159 23160 23161 23162 23163 23164 23165 23166 23167 23168 23169 23170 23171 23172 23173 23174 23175 23176 23177 23178 23179 23180 23181 23182 23183 23184 23185 23186 23187 23188 23189 23190 23191 23192 23193 23194 23195 23196 23197 23198 23199 23200 23201 23202 23203 23204 23205 23206 23207 23208 23209 23210 23211 23212 23213 23214 23215 23216 23217 23218 23219 23220 23221 23222 23223 23224 23225 23226 23227 23228 23229 23230 23231 23232 23233 23234 23235 23236 23237 23238 23239 23240 23241 23242 23243 23244 23245 23246 23247 23248 23249 23250 23251 23252 23253 23254 23255 23256 23257 23258 23259 23260 23261 23262 23263 23264 23265 23266 23267 23268 23269 23270 23271 23272 23273 23274 23275 23276 23277 23278 23279 23280 23281 23282 23283 23284 23285 23286 23287 23288 23289 23290 23291 23292 23293 23294 23295 23296 23297 23298 23299 23300 23301 23302 23303 23304 23305 23306 23307 23308 23309 23310 23311 23312 23313 23314 23315 23316 23317 23318 23319 23320 23321 23322 23323 23324 23325 23326 23327 23328 23329 23330 23331 23332 23333 23334 23335 23336 23337 23338 23339 23340 23341 23342 23343 23344 23345 23346 23347 23348 23349 23350 23351 23352 23353 23354 23355 23356 23357 23358 23359 23360 23361 23362 23363 23364 23365 23366 23367 23368 23369 23370 23371 23372 23373 23374 23375 23376 23377 23378 23379 23380 23381 23382 23383 23384 23385 23386 23387 23388 23389 23390 23391 23392 23393 23394 23395 23396 23397 23398 23399 23400 23401 23402 23403 23404 23405 23406 23407 23408 23409 23410 23411 23412 23413 23414 23415 23416 23417 23418 23419 23420 23421 23422 23423 23424 23425 23426 23427 23428 23429 23430 23431 23432 23433 23434 23435 23436 23437 23438 23439 23440 23441 23442 23443 23444 23445 23446 23447 23448 23449 23450 23451 23452 23453 23454 23455 23456 23457 23458 23459 23460 23461 23462 23463 23464 23465 23466 23467 23468 23469 23470 23471 23472 23473 23474 23475 23476 23477 23478 23479 23480 23481 23482 23483 23484 23485 23486 23487 23488 23489 23490 23491 23492 23493 23494 23495 23496 23497 23498 23499 23500 23501 23502 23503 23504 23505 23506 23507 23508 23509 23510 23511 23512 23513 23514 23515 23516 23517 23518 23519 23520 23521 23522 23523 23524 23525 23526 23527 23528 23529 23530 23531 23532 23533 23534 23535 23536 23537 23538 23539 23540 23541 23542 23543 23544 23545 23546 23547 23548 23549 23550 23551 23552 23553 23554 23555 23556 23557 23558 23559 23560 23561 23562 23563 23564 23565 23566 23567 23568 23569 23570 23571 23572 23573 23574 23575 23576 23577 23578 23579 23580 23581 23582 23583 23584 23585 23586 23587 23588 23589 23590 23591 23592 23593 23594 23595 23596 23597 23598 23599 23600 23601 23602 23603 23604 23605 23606 23607 23608 23609 23610 23611 23612 23613 23614 23615 23616 23617 23618 23619 23620 23621 23622 23623 23624 23625 23626 23627 23628 23629 23630 23631 23632 23633 23634 23635 23636 23637 23638 23639 23640 23641 23642 23643 23644 23645 23646 23647 23648 23649 23650 23651 23652 23653 23654 23655 23656 23657 23658 23659 23660 23661 23662 23663 23664 23665 23666 23667 23668 23669 23670 23671 23672 23673 23674 23675 23676 23677 23678 23679 23680 23681 23682 23683 23684 23685 23686 23687 23688 23689 23690 23691 23692 23693 23694 23695 23696 23697 23698 23699 23700 23701 23702 23703 23704 23705 23706 23707 23708 23709 23710 23711 23712 23713 23714 23715 23716 23717 23718 23719 23720 23721 23722 23723 23724 23725 23726 23727 23728 23729 23730 23731 23732 23733 23734 23735 23736 23737 23738 23739 23740 23741 23742 23743 23744 23745 23746 23747 23748 23749 23750 23751 23752 23753 23754 23755 23756 23757 23758 23759 23760 23761 23762 23763 23764 23765 23766 23767 23768 23769 23770 23771 23772 23773 23774 23775 23776 23777 23778 23779 23780 23781 23782 23783 23784 23785 23786 23787 23788 23789 23790 23791 23792 23793 23794 23795 23796 23797 23798 23799 23800 23801 23802 23803 23804 23805 23806 23807 23808 23809 23810 23811 23812 23813 23814 23815 23816 23817 23818 23819 23820 23821 23822 23823 23824 23825 23826 23827 23828 23829 23830 23831 23832 23833 23834 23835 23836 23837 23838 23839 23840 23841 23842 23843 23844 23845 23846 23847 23848 23849 23850 23851 23852 23853 23854 23855 23856 23857 23858 23859 23860 23861 23862 23863 23864 23865 23866 23867 23868 23869 23870 23871 23872 23873 23874 23875 23876 23877 23878 23879 23880 23881 23882 23883 23884 23885 23886 23887 23888 23889 23890 23891 23892 23893 23894 23895 23896 23897 23898 23899 23900 23901 23902 23903 23904 23905 23906 23907 23908 23909 23910 23911 23912 23913 23914 23915 23916 23917 23918 23919 23920 23921 23922 23923 23924 23925 23926 23927 23928 23929 23930 23931 23932 23933 23934 23935 23936 23937 23938 23939 23940 23941 23942 23943 23944 23945 23946 23947 23948 23949 23950 23951 23952 23953 23954 23955 23956 23957 23958 23959 23960 23961 23962 23963 23964 23965 23966 23967 23968 23969 23970 23971 23972 23973 23974 23975 23976 23977 23978 23979 23980 23981 23982 23983 23984 23985 23986 23987 23988 23989 23990 23991 23992 23993 23994 23995 23996 23997 23998 23999 24000 24001 24002 24003 24004 24005 24006 24007 24008 24009 24010 24011 24012 24013 24014 24015 24016 24017 24018 24019 24020 24021 24022 24023 24024 24025 24026 24027 24028 24029 24030 24031 24032 24033 24034 24035 24036 24037 24038 24039 24040 24041 24042 24043 24044 24045 24046 24047 24048 24049 24050 24051 24052 24053 24054 24055 24056 24057 24058 24059 24060 24061 24062 24063 24064 24065 24066 24067 24068 24069 24070 24071 24072 24073 24074 24075 24076 24077 24078 24079 24080 24081 24082 24083 24084 24085 24086 24087 24088 24089 24090 24091 24092 24093 24094 24095 24096 24097 24098 24099 24100 24101 24102 24103 24104 24105 24106 24107 24108 24109 24110 24111 24112 24113 24114 24115 24116 24117 24118 24119 24120 24121 24122 24123 24124 24125 24126 24127 24128 24129 24130 24131 24132 24133 24134 24135 24136 24137 24138 24139 24140 24141 24142 24143 24144 24145 24146 24147 24148 24149 24150 24151 24152 24153 24154 24155 24156 24157 24158 24159 24160 24161 24162 24163 24164 24165 24166 24167 24168 24169 24170 24171 24172 24173 24174 24175 24176 24177 24178 24179 24180 24181 24182 24183 24184 24185 24186 24187 24188 24189 24190 24191 24192 24193 24194 24195 24196 24197 24198 24199 24200 24201 24202 24203 24204 24205 24206 24207 24208 24209 24210 24211 24212 24213 24214 24215 24216 24217 24218 24219 24220 24221 24222 24223 24224 24225 24226 24227 24228 24229 24230 24231 24232 24233 24234 24235 24236 24237 24238 24239 24240 24241 24242 24243 24244 24245 24246 24247 24248 24249 24250 24251 24252 24253 24254 24255 24256 24257 24258 24259 24260 24261 24262 24263 24264 24265 24266 24267 24268 24269 24270 24271 24272 24273 24274 24275 24276 24277 24278 24279 24280 24281 24282 24283 24284 24285 24286 24287 24288 24289 24290 24291 24292 24293 24294 24295 24296 24297 24298 24299 24300 24301 24302 24303 24304 24305 24306 24307 24308 24309 24310 24311 24312 24313 24314 24315 24316 24317 24318 24319 24320 24321 24322 24323 24324 24325 24326 24327 24328 24329 24330 24331 24332 24333 24334 24335 24336 24337 24338 24339 24340 24341 24342 24343 24344 24345 24346 24347 24348 24349 24350 24351 24352 24353 24354 24355 24356 24357 24358 24359 24360 24361 24362 24363 24364 24365 24366 24367 24368 24369 24370 24371 24372 24373 24374 24375 24376 24377 24378 24379 24380 24381 24382 24383 24384 24385 24386 24387 24388 24389 24390 24391 24392 24393 24394 24395 24396 24397 24398 24399 24400 24401 24402 24403 24404 24405 24406 24407 24408 24409 24410 24411 24412 24413 24414 24415 24416 24417 24418 24419 24420 24421 24422 24423 24424 24425 24426 24427 24428 24429 24430 24431 24432 24433 24434 24435 24436 24437 24438 24439 24440 24441 24442 24443 24444 24445 24446 24447 24448 24449 24450 24451 24452 24453 24454 24455 24456 24457 24458 24459 24460 24461 24462 24463 24464 24465 24466 24467 24468 24469 24470 24471 24472 24473 24474 24475 24476 24477 24478 24479 24480 24481 24482 24483 24484 24485 24486 24487 24488 24489 24490 24491 24492 24493 24494 24495 24496 24497 24498 24499 24500 24501 24502 24503 24504 24505 24506 24507 24508 24509 24510 24511 24512 24513 24514 24515 24516 24517 24518 24519 24520 24521 24522 24523 24524 24525 24526 24527 24528 24529 24530 24531 24532 24533 24534 24535 24536 24537 24538 24539 24540 24541 24542 24543 24544 24545 24546 24547 24548 24549 24550 24551 24552 24553 24554 24555 24556 24557 24558 24559 24560 24561 24562 24563 24564 24565 24566 24567 24568 24569 24570 24571 24572 24573 24574 24575 24576 24577 24578 24579 24580 24581 24582 24583 24584 24585 24586 24587 24588 24589 24590 24591 24592 24593 24594 24595 24596 24597 24598 24599 24600 24601 24602 24603 24604 24605 24606 24607 24608 24609 24610 24611 24612 24613 24614 24615 24616 24617 24618 24619 24620 24621 24622 24623 24624 24625 24626 24627 24628 24629 24630 24631 24632 24633 24634 24635 24636 24637 24638 24639 24640 24641 24642 24643 24644 24645 24646 24647 24648 24649 24650 24651 24652 24653 24654 24655 24656 24657 24658 24659 24660 24661 24662 24663 24664 24665 24666 24667 24668 24669 24670 24671 24672 24673 24674 24675 24676 24677 24678 24679 24680 24681 24682 24683 24684 24685 24686 24687 24688 24689 24690 24691 24692 24693 24694 24695 24696 24697 24698 24699 24700 24701 24702 24703 24704 24705 24706 24707 24708 24709 24710 24711 24712 24713 24714 24715 24716 24717 24718 24719 24720 24721 24722 24723 24724 24725 24726 24727 24728 24729 24730 24731 24732 24733 24734 24735 24736 24737 24738 24739 24740 24741 24742 24743 24744 24745 24746 24747 24748 24749 24750 24751 24752 24753 24754 24755 24756 24757 24758 24759 24760 24761 24762 24763 24764 24765 24766 24767 24768 24769 24770 24771 24772 24773 24774 24775 24776 24777 24778 24779 24780 24781 24782 24783 24784 24785 24786 24787 24788 24789 24790 24791 24792 24793 24794 24795 24796 24797 24798 24799 24800 24801 24802 24803 24804 24805 24806 24807 24808 24809 24810 24811 24812 24813 24814 24815 24816 24817 24818 24819 24820 24821 24822 24823 24824 24825 24826 24827 24828 24829 24830 24831 24832 24833 24834 24835 24836 24837 24838 24839 24840 24841 24842 24843 24844 24845 24846 24847 24848 24849 24850 24851 24852 24853 24854 24855 24856 24857 24858 24859 24860 24861 24862 24863 24864 24865 24866 24867 24868 24869 24870 24871 24872 24873 24874 24875 24876 24877 24878 24879 24880 24881 24882 24883 24884 24885 24886 24887 24888 24889 24890 24891 24892 24893 24894 24895 24896 24897 24898 24899 24900 24901 24902 24903 24904 24905 24906 24907 24908 24909 24910 24911 24912 24913 24914 24915 24916 24917 24918 24919 24920 24921 24922 24923 24924 24925 24926 24927 24928 24929 24930 24931 24932 24933 24934 24935 24936 24937 24938 24939 24940 24941 24942 24943 24944 24945 24946 24947 24948 24949 24950 24951 24952 24953 24954 24955 24956 24957 24958 24959 24960 24961 24962 24963 24964 24965 24966 24967 24968 24969 24970 24971 24972 24973 24974 24975 24976 24977 24978 24979 24980 24981 24982 24983 24984 24985 24986 24987 24988 24989 24990 24991 24992 24993 24994 24995 24996 24997 24998 24999 25000 25001 25002 25003 25004 25005 25006 25007 25008 25009 25010 25011 25012 25013 25014 25015 25016 25017 25018 25019 25020 25021 25022 25023 25024 25025 25026 25027 25028 25029 25030 25031 25032 25033 25034 25035 25036 25037 25038 25039 25040 25041 25042 25043 25044 25045 25046 25047 25048 25049 25050 25051 25052 25053 25054 25055 25056 25057 25058 25059 25060 25061 25062 25063 25064 25065 25066 25067 25068 25069 25070 25071 25072 25073 25074 25075 25076 25077 25078 25079 25080 25081 25082 25083 25084 25085 25086 25087 25088 25089 25090 25091 25092 25093 25094 25095 25096 25097 25098 25099 25100 25101 25102 25103 25104 25105 25106 25107 25108 25109 25110 25111 25112 25113 25114 25115 25116 25117 25118 25119 25120 25121 25122 25123 25124 25125 25126 25127 25128 25129 25130 25131 25132 25133 25134 25135 25136 25137 25138 25139 25140 25141 25142 25143 25144 25145 25146 25147 25148 25149 25150 25151 25152 25153 25154 25155 25156 25157 25158 25159 25160 25161 25162 25163 25164 25165 25166 25167 25168 25169 25170 25171 25172 25173 25174 25175 25176 25177 25178 25179 25180 25181 25182 25183 25184 25185 25186 25187 25188 25189 25190 25191 25192 25193 25194 25195 25196 25197 25198 25199 25200 25201 25202 25203 25204 25205 25206 25207 25208 25209 25210 25211 25212 25213 25214 25215 25216 25217 25218 25219 25220 25221 25222 25223 25224 25225 25226 25227 25228 25229 25230 25231 25232 25233 25234 25235 25236 25237 25238 25239 25240 25241 25242 25243 25244 25245 25246 25247 25248 25249 25250 25251 25252 25253 25254 25255 25256 25257 25258 25259 25260 25261 25262 25263 25264 25265 25266 25267 25268 25269 25270 25271 25272 25273 25274 25275 25276 25277 25278 25279 25280 25281 25282 25283 25284 25285 25286 25287 25288 25289 25290 25291 25292 25293 25294 25295 25296 25297 25298 25299 25300 25301 25302 25303 25304 25305 25306 25307 25308 25309 25310 25311 25312 25313 25314 25315 25316 25317 25318 25319 25320 25321 25322 25323 25324 25325 25326 25327 25328 25329 25330 25331 25332 25333 25334 25335 25336 25337 25338 25339 25340 25341 25342 25343 25344 25345 25346 25347 25348 25349 25350 25351 25352 25353 25354 25355 25356 25357 25358 25359 25360 25361 25362 25363 25364 25365 25366 25367 25368 25369 25370 25371 25372 25373 25374 25375 25376 25377 25378 25379 25380 25381 25382 25383 25384 25385 25386 25387 25388 25389 25390 25391 25392 25393 25394 25395 25396 25397 25398 25399 25400 25401 25402 25403 25404 25405 25406 25407 25408 25409 25410 25411 25412 25413 25414 25415 25416 25417 25418 25419 25420 25421 25422 25423 25424 25425 25426 25427 25428 25429 25430 25431 25432 25433 25434 25435 25436 25437 25438 25439 25440 25441 25442 25443 25444 25445 25446 25447 25448 25449 25450 25451 25452 25453 25454 25455 25456 25457 25458 25459 25460 25461 25462 25463 25464 25465 25466 25467 25468 25469 25470 25471 25472 25473 25474 25475 25476 25477 25478 25479 25480 25481 25482 25483 25484 25485 25486 25487 25488 25489 25490 25491 25492 25493 25494 25495 25496 25497 25498 25499 25500 25501 25502 25503 25504 25505 25506 25507 25508 25509 25510 25511 25512 25513 25514 25515 25516 25517 25518 25519 25520 25521 25522 25523 25524 25525 25526 25527 25528 25529 25530 25531 25532 25533 25534 25535 25536 25537 25538 25539 25540 25541 25542 25543 25544 25545 25546 25547 25548 25549 25550 25551 25552 25553 25554 25555 25556 25557 25558 25559 25560 25561 25562 25563 25564 25565 25566 25567 25568 25569 25570 25571 25572 25573 25574 25575 25576 25577 25578 25579 25580 25581 25582 25583 25584 25585 25586 25587 25588 25589 25590 25591 25592 25593 25594 25595 25596 25597 25598 25599 25600 25601 25602 25603 25604 25605 25606 25607 25608 25609 25610 25611 25612 25613 25614 25615 25616 25617 25618 25619 25620 25621 25622 25623 25624 25625 25626 25627 25628 25629 25630 25631 25632 25633 25634 25635 25636 25637 25638 25639 25640 25641 25642 25643 25644 25645 25646 25647 25648 25649 25650 25651 25652 25653 25654 25655 25656 25657 25658 25659 25660 25661 25662 25663 25664 25665 25666 25667 25668 25669 25670 25671 25672 25673 25674 25675 25676 25677 25678 25679 25680 25681 25682 25683 25684 25685 25686 25687 25688 25689 25690 25691 25692 25693 25694 25695 25696 25697 25698 25699 25700 25701 25702 25703 25704 25705 25706 25707 25708 25709 25710 25711 25712 25713 25714 25715 25716 25717 25718 25719 25720 25721 25722 25723 25724 25725 25726 25727 25728 25729 25730 25731 25732 25733 25734 25735 25736 25737 25738 25739 25740 25741 25742 25743 25744 25745 25746 25747 25748 25749 25750 25751 25752 25753 25754 25755 25756 25757 25758 25759 25760 25761 25762 25763 25764 25765 25766 25767 25768 25769 25770 25771 25772 25773 25774 25775 25776 25777 25778 25779 25780 25781 25782 25783 25784 25785 25786 25787 25788 25789 25790 25791 25792 25793 25794 25795 25796 25797 25798 25799 25800 25801 25802 25803 25804 25805 25806 25807 25808 25809 25810 25811 25812 25813 25814 25815 25816 25817 25818 25819 25820 25821 25822 25823 25824 25825 25826 25827 25828 25829 25830 25831 25832 25833 25834 25835 25836 25837 25838 25839 25840 25841 25842 25843 25844 25845 25846 25847 25848 25849 25850 25851 25852 25853 25854 25855 25856 25857 25858 25859 25860 25861 25862 25863 25864 25865 25866 25867 25868 25869 25870 25871 25872 25873 25874 25875 25876 25877 25878 25879 25880 25881 25882 25883 25884 25885 25886 25887 25888 25889 25890 25891 25892 25893 25894 25895 25896 25897 25898 25899 25900 25901 25902 25903 25904 25905 25906 25907 25908 25909 25910 25911 25912 25913 25914 25915 25916 25917 25918 25919 25920 25921 25922 25923 25924 25925 25926 25927 25928 25929 25930 25931 25932 25933 25934 25935 25936 25937 25938 25939 25940 25941 25942 25943 25944 25945 25946 25947 25948 25949 25950 25951 25952 25953 25954 25955 25956 25957 25958 25959 25960 25961 25962 25963 25964 25965 25966 25967 25968 25969 25970 25971 25972 25973 25974 25975 25976 25977 25978 25979 25980 25981 25982 25983 25984 25985 25986 25987 25988 25989 25990 25991 25992 25993 25994 25995 25996 25997 25998 25999 26000 26001 26002 26003 26004 26005 26006 26007 26008 26009 26010 26011 26012 26013 26014 26015 26016 26017 26018 26019 26020 26021 26022 26023 26024 26025 26026 26027 26028 26029 26030 26031 26032 26033 26034 26035 26036 26037 26038 26039 26040 26041 26042 26043 26044 26045 26046 26047 26048 26049 26050 26051 26052 26053 26054 26055 26056 26057 26058 26059 26060 26061 26062 26063 26064 26065 26066 26067 26068 26069 26070 26071 26072 26073 26074 26075 26076 26077 26078 26079 26080 26081 26082 26083 26084 26085 26086 26087 26088 26089 26090 26091 26092 26093 26094 26095 26096 26097 26098 26099 26100 26101 26102 26103 26104 26105 26106 26107 26108 26109 26110 26111 26112 26113 26114 26115 26116 26117 26118 26119 26120 26121 26122 26123 26124 26125 26126 26127 26128 26129 26130 26131 26132 26133 26134 26135 26136 26137 26138 26139 26140 26141 26142 26143 26144 26145 26146 26147 26148 26149 26150 26151 26152 26153 26154 26155 26156 26157 26158 26159 26160 26161 26162 26163 26164 26165 26166 26167 26168 26169 26170 26171 26172 26173 26174 26175 26176 26177 26178 26179 26180 26181 26182 26183 26184 26185 26186 26187 26188 26189 26190 26191 26192 26193 26194 26195 26196 26197 26198 26199 26200 26201 26202 26203 26204 26205 26206 26207 26208 26209 26210 26211 26212 26213 26214 26215 26216 26217 26218 26219 26220 26221 26222 26223 26224 26225 26226 26227 26228 26229 26230 26231 26232 26233 26234 26235 26236 26237 26238 26239 26240 26241 26242 26243 26244 26245 26246 26247 26248 26249 26250 26251 26252 26253 26254 26255 26256 26257 26258 26259 26260 26261 26262 26263 26264 26265 26266 26267 26268 26269 26270 26271 26272 26273 26274 26275 26276 26277 26278 26279 26280 26281 26282 26283 26284 26285 26286 26287 26288 26289 26290 26291 26292 26293 26294 26295 26296 26297 26298 26299 26300 26301 26302 26303 26304 26305 26306 26307 26308 26309 26310 26311 26312 26313 26314 26315 26316 26317 26318 26319 26320 26321 26322 26323 26324 26325 26326 26327 26328 26329 26330 26331 26332 26333 26334 26335 26336 26337 26338 26339 26340 26341 26342 26343 26344 26345 26346 26347 26348 26349 26350 26351 26352 26353 26354 26355 26356 26357 26358 26359 26360 26361 26362 26363 26364 26365 26366 26367 26368 26369 26370 26371 26372 26373 26374 26375 26376 26377 26378 26379 26380 26381 26382 26383 26384 26385 26386 26387 26388 26389 26390 26391 26392 26393 26394 26395 26396 26397 26398 26399 26400 26401 26402 26403 26404 26405 26406 26407 26408 26409 26410 26411 26412 26413 26414 26415 26416 26417 26418 26419 26420 26421 26422 26423 26424 26425 26426 26427 26428 26429 26430 26431 26432 26433 26434 26435 26436 26437 26438 26439 26440 26441 26442 26443 26444 26445 26446 26447 26448 26449 26450 26451 26452 26453 26454 26455 26456 26457 26458 26459 26460 26461 26462 26463 26464 26465 26466 26467 26468 26469 26470 26471 26472 26473 26474 26475 26476 26477 26478 26479 26480 26481 26482 26483 26484 26485 26486 26487 26488 26489 26490 26491 26492 26493 26494 26495 26496 26497 26498 26499 26500 26501 26502 26503 26504 26505 26506 26507 26508 26509 26510 26511 26512 26513 26514 26515 26516 26517 26518 26519 26520 26521 26522 26523 26524 26525 26526 26527 26528 26529 26530 26531 26532 26533 26534 26535 26536 26537 26538 26539 26540 26541 26542 26543 26544 26545 26546 26547 26548 26549 26550 26551 26552 26553 26554 26555 26556 26557 26558 26559 26560 26561 26562 26563 26564 26565 26566 26567 26568 26569 26570 26571 26572 26573 26574 26575 26576 26577 26578 26579 26580 26581 26582 26583 26584 26585 26586 26587 26588 26589 26590 26591 26592 26593 26594 26595 26596 26597 26598 26599 26600 26601 26602 26603 26604 26605 26606 26607 26608 26609 26610 26611 26612 26613 26614 26615 26616 26617 26618 26619 26620 26621 26622 26623 26624 26625 26626 26627 26628 26629 26630 26631 26632 26633 26634 26635 26636 26637 26638 26639 26640 26641 26642 26643 26644 26645 26646 26647 26648 26649 26650 26651 26652 26653 26654 26655 26656 26657 26658 26659 26660 26661 26662 26663 26664 26665 26666 26667 26668 26669 26670 26671 26672 26673 26674 26675 26676 26677 26678 26679 26680 26681 26682 26683 26684 26685 26686 26687 26688 26689 26690 26691 26692 26693 26694 26695 26696 26697 26698 26699 26700 26701 26702 26703 26704 26705 26706 26707 26708 26709 26710 26711 26712 26713 26714 26715 26716 26717 26718 26719 26720 26721 26722 26723 26724 26725 26726 26727 26728 26729 26730 26731 26732 26733 26734 26735 26736 26737 26738 26739 26740 26741 26742 26743 26744 26745 26746 26747 26748 26749 26750 26751 26752 26753 26754 26755 26756 26757 26758 26759 26760 26761 26762 26763 26764 26765 26766 26767 26768 26769 26770 26771 26772 26773 26774 26775 26776 26777 26778 26779 26780 26781 26782 26783 26784 26785 26786 26787 26788 26789 26790 26791 26792 26793 26794 26795 26796 26797 26798 26799 26800 26801 26802 26803 26804 26805 26806 26807 26808 26809 26810 26811 26812 26813 26814 26815 26816 26817 26818 26819 26820 26821 26822 26823 26824 26825 26826 26827 26828 26829 26830 26831 26832 26833 26834 26835 26836 26837 26838 26839 26840 26841 26842 26843 26844 26845 26846 26847 26848 26849 26850 26851 26852 26853 26854 26855 26856 26857 26858 26859 26860 26861 26862 26863 26864 26865 26866 26867 26868 26869 26870 26871 26872 26873 26874 26875 26876 26877 26878 26879 26880 26881 26882 26883 26884 26885 26886 26887 26888 26889 26890 26891 26892 26893 26894 26895 26896 26897 26898 26899 26900 26901 26902 26903 26904 26905 26906 26907 26908 26909 26910 26911 26912 26913 26914 26915 26916 26917 26918 26919 26920 26921 26922 26923 26924 26925 26926 26927 26928 26929 26930 26931 26932 26933 26934 26935 26936 26937 26938 26939 26940 26941 26942 26943 26944 26945 26946 26947 26948 26949 26950 26951 26952 26953 26954 26955 26956 26957 26958 26959 26960 26961 26962 26963 26964 26965 26966 26967 26968 26969 26970 26971 26972 26973 26974 26975 26976 26977 26978 26979 26980 26981 26982 26983 26984 26985 26986 26987 26988 26989 26990 26991 26992 26993 26994 26995 26996 26997 26998 26999 27000 27001 27002 27003 27004 27005 27006 27007 27008 27009 27010 27011 27012 27013 27014 27015 27016 27017 27018 27019 27020 27021 27022 27023 27024 27025 27026 27027 27028 27029 27030 27031 27032 27033 27034 27035 27036 27037 27038 27039 27040 27041 27042 27043 27044 27045 27046 27047 27048 27049 27050 27051 27052 27053 27054 27055 27056 27057 27058 27059 27060 27061 27062 27063 27064 27065 27066 27067 27068 27069 27070 27071 27072 27073 27074 27075 27076 27077 27078 27079 27080 27081 27082 27083 27084 27085 27086 27087 27088 27089 27090 27091 27092 27093 27094 27095 27096 27097 27098 27099 27100 27101 27102 27103 27104 27105 27106 27107 27108 27109 27110 27111 27112 27113 27114 27115 27116 27117 27118 27119 27120 27121 27122 27123 27124 27125 27126 27127 27128 27129 27130 27131 27132 27133 27134 27135 27136 27137 27138 27139 27140 27141 27142 27143 27144 27145 27146 27147 27148 27149 27150 27151 27152 27153 27154 27155 27156 27157 27158 27159 27160 27161 27162 27163 27164 27165 27166 27167 27168 27169 27170 27171 27172 27173 27174 27175 27176 27177 27178 27179 27180 27181 27182 27183 27184 27185 27186 27187 27188 27189 27190 27191 27192 27193 27194 27195 27196 27197 27198 27199 27200 27201 27202 27203 27204 27205 27206 27207 27208 27209 27210 27211 27212 27213 27214 27215 27216 27217 27218 27219 27220 27221 27222 27223 27224 27225 27226 27227 27228 27229 27230 27231 27232 27233 27234 27235 27236 27237 27238 27239 27240 27241 27242 27243 27244 27245 27246 27247 27248 27249 27250 27251 27252 27253 27254 27255 27256 27257 27258 27259 27260 27261 27262 27263 27264 27265 27266 27267 27268 27269 27270 27271 27272 27273 27274 27275 27276 27277 27278 27279 27280 27281 27282 27283 27284 27285 27286 27287 27288 27289 27290 27291 27292 27293 27294 27295 27296 27297 27298 27299 27300 27301 27302 27303 27304 27305 27306 27307 27308 27309 27310 27311 27312 27313 27314 27315 27316 27317 27318 27319 27320 27321 27322 27323 27324 27325 27326 27327 27328 27329 27330 27331 27332 27333 27334 27335 27336 27337 27338 27339 27340 27341 27342 27343 27344 27345 27346 27347 27348 27349 27350 27351 27352 27353 27354 27355 27356 27357 27358 27359 27360 27361 27362 27363 27364 27365 27366 27367 27368 27369 27370 27371 27372 27373 27374 27375 27376 27377 27378 27379 27380 27381 27382 27383 27384 27385 27386 27387 27388 27389 27390 27391 27392 27393 27394 27395 27396 27397 27398 27399 27400 27401 27402 27403 27404 27405 27406 27407 27408 27409 27410 27411 27412 27413 27414 27415 27416 27417 27418 27419 27420 27421 27422 27423 27424 27425 27426 27427 27428 27429 27430 27431 27432 27433 27434 27435 27436 27437 27438 27439 27440 27441 27442 27443 27444 27445 27446 27447 27448 27449 27450 27451 27452 27453 27454 27455 27456 27457 27458 27459 27460 27461 27462 27463 27464 27465 27466 27467 27468 27469 27470 27471 27472 27473 27474 27475 27476 27477 27478 27479 27480 27481 27482 27483 27484 27485 27486 27487 27488 27489 27490 27491 27492 27493 27494 27495 27496 27497 27498 27499 27500 27501 27502 27503 27504 27505 27506 27507 27508 27509 27510 27511 27512 27513 27514 27515 27516 27517 27518 27519 27520 27521 27522 27523 27524 27525 27526 27527 27528 27529 27530 27531 27532 27533 27534 27535 27536 27537 27538 27539 27540 27541 27542 27543 27544 27545 27546 27547 27548 27549 27550 27551 27552 27553 27554 27555 27556 27557 27558 27559 27560 27561 27562 27563 27564 27565 27566 27567 27568 27569 27570 27571 27572 27573 27574 27575 27576 27577 27578 27579 27580 27581 27582 27583 27584 27585 27586 27587 27588 27589 27590 27591 27592 27593 27594 27595 27596 27597 27598 27599 27600 27601 27602 27603 27604 27605 27606 27607 27608 27609 27610 27611 27612 27613 27614 27615 27616 27617 27618 27619 27620 27621 27622 27623 27624 27625 27626 27627 27628 27629 27630 27631 27632 27633 27634 27635 27636 27637 27638 27639 27640 27641 27642 27643 27644 27645 27646 27647 27648 27649 27650 27651 27652 27653 27654 27655 27656 27657 27658 27659 27660 27661 27662 27663 27664 27665 27666 27667 27668 27669 27670 27671 27672 27673 27674 27675 27676 27677 27678 27679 27680 27681 27682 27683 27684 27685 27686 27687 27688 27689 27690 27691 27692 27693 27694 27695 27696 27697 27698 27699 27700 27701 27702 27703 27704 27705 27706 27707 27708 27709 27710 27711 27712 27713 27714 27715 27716 27717 27718 27719 27720 27721 27722 27723 27724 27725 27726 27727 27728 27729 27730 27731 27732 27733 27734 27735 27736 27737 27738 27739 27740 27741 27742 27743 27744 27745 27746 27747 27748 27749 27750 27751 27752 27753 27754 27755 27756 27757 27758 27759 27760 27761 27762 27763 27764 27765 27766 27767 27768 27769 27770 27771 27772 27773 27774 27775 27776 27777 27778 27779 27780 27781 27782 27783 27784 27785 27786 27787 27788 27789 27790 27791 27792 27793 27794 27795 27796 27797 27798 27799 27800 27801 27802 27803 27804 27805 27806 27807 27808 27809 27810 27811 27812 27813 27814 27815 27816 27817 27818 27819 27820 27821 27822 27823 27824 27825 27826 27827 27828 27829 27830 27831 27832 27833 27834 27835 27836 27837 27838 27839 27840 27841 27842 27843 27844 27845 27846 27847 27848 27849 27850 27851 27852 27853 27854 27855 27856 27857 27858 27859 27860 27861 27862 27863 27864 27865 27866 27867 27868 27869 27870 27871 27872 27873 27874 27875 27876 27877 27878 27879 27880 27881 27882 27883 27884 27885 27886 27887 27888 27889 27890 27891 27892 27893 27894 27895 27896 27897 27898 27899 27900 27901 27902 27903 27904 27905 27906 27907 27908 27909 27910 27911 27912 27913 27914 27915 27916 27917 27918 27919 27920 27921 27922 27923 27924 27925 27926 27927 27928 27929 27930 27931 27932 27933 27934 27935 27936 27937 27938 27939 27940 27941 27942 27943 27944 27945 27946 27947 27948 27949 27950 27951 27952 27953 27954 27955 27956 27957 27958 27959 27960 27961 27962 27963 27964 27965 27966 27967 27968 27969 27970 27971 27972 27973 27974 27975 27976 27977 27978 27979 27980 27981 27982 27983 27984 27985 27986 27987 27988 27989 27990 27991 27992 27993 27994 27995 27996 27997 27998 27999 28000 28001 28002 28003 28004 28005 28006 28007 28008 28009 28010 28011 28012 28013 28014 28015 28016 28017 28018 28019 28020 28021 28022 28023 28024 28025 28026 28027 28028 28029 28030 28031 28032 28033 28034 28035 28036 28037 28038 28039 28040 28041 28042 28043 28044 28045 28046 28047 28048 28049 28050 28051 28052 28053 28054 28055 28056 28057 28058 28059 28060 28061 28062 28063 28064 28065 28066 28067 28068 28069 28070 28071 28072 28073 28074 28075 28076 28077 28078 28079 28080 28081 28082 28083 28084 28085 28086 28087 28088 28089 28090 28091 28092 28093 28094 28095 28096 28097 28098 28099 28100 28101 28102 28103 28104 28105 28106 28107 28108 28109 28110 28111 28112 28113 28114 28115 28116 28117 28118 28119 28120 28121 28122 28123 28124 28125 28126 28127 28128 28129 28130 28131 28132 28133 28134 28135 28136 28137 28138 28139 28140 28141 28142 28143 28144 28145 28146 28147 28148 28149 28150 28151 28152 28153 28154 28155 28156 28157 28158 28159 28160 28161 28162 28163 28164 28165 28166 28167 28168 28169 28170 28171 28172 28173 28174 28175 28176 28177 28178 28179 28180 28181 28182 28183 28184 28185 28186 28187 28188 28189 28190 28191 28192 28193 28194 28195 28196 28197 28198 28199 28200 28201 28202 28203 28204 28205 28206 28207 28208 28209 28210 28211 28212 28213 28214 28215 28216 28217 28218 28219 28220 28221 28222 28223 28224 28225 28226 28227 28228 28229 28230 28231 28232 28233 28234 28235 28236 28237 28238 28239 28240 28241 28242 28243 28244 28245 28246 28247 28248 28249 28250 28251 28252 28253 28254 28255 28256 28257 28258 28259 28260 28261 28262 28263 28264 28265 28266 28267 28268 28269 28270 28271 28272 28273 28274 28275 28276 28277 28278 28279 28280 28281 28282 28283 28284 28285 28286 28287 28288 28289 28290 28291 28292 28293 28294 28295 28296 28297 28298 28299 28300 28301 28302 28303 28304 28305 28306 28307 28308 28309 28310 28311 28312 28313 28314 28315 28316 28317 28318 28319 28320 28321 28322 28323 28324 28325 28326 28327 28328 28329 28330 28331 28332 28333 28334 28335 28336 28337 28338 28339 28340 28341 28342 28343 28344 28345 28346 28347 28348 28349 28350 28351 28352 28353 28354 28355 28356 28357 28358 28359 28360 28361 28362 28363 28364 28365 28366 28367 28368 28369 28370 28371 28372 28373 28374 28375 28376 28377 28378 28379 28380 28381 28382 28383 28384 28385 28386 28387 28388 28389 28390 28391 28392 28393 28394 28395 28396 28397 28398 28399 28400 28401 28402 28403 28404 28405 28406 28407 28408 28409 28410 28411 28412 28413 28414 28415 28416 28417 28418 28419 28420 28421 28422 28423 28424 28425 28426 28427 28428 28429 28430 28431 28432 28433 28434 28435 28436 28437 28438 28439 28440 28441 28442 28443 28444 28445 28446 28447 28448 28449 28450 28451 28452 28453 28454 28455 28456 28457 28458 28459 28460 28461 28462 28463 28464 28465 28466 28467 28468 28469 28470 28471 28472 28473 28474 28475 28476 28477 28478 28479 28480 28481 28482 28483 28484 28485 28486 28487 28488 28489 28490 28491 28492 28493 28494 28495 28496 28497 28498 28499 28500 28501 28502 28503 28504 28505 28506 28507 28508 28509 28510 28511 28512 28513 28514 28515 28516 28517 28518 28519 28520 28521 28522 28523 28524 28525 28526 28527 28528 28529 28530 28531 28532 28533 28534 28535 28536 28537 28538 28539 28540 28541 28542 28543 28544 28545 28546 28547 28548 28549 28550 28551 28552 28553 28554 28555 28556 28557 28558 28559 28560 28561 28562 28563 28564 28565 28566 28567 28568 28569 28570 28571 28572 28573 28574 28575 28576 28577 28578 28579 28580 28581 28582 28583 28584 28585 28586 28587 28588 28589 28590 28591 28592 28593 28594 28595 28596 28597 28598 28599 28600 28601 28602 28603 28604 28605 28606 28607 28608 28609 28610 28611 28612 28613 28614 28615 28616 28617 28618 28619 28620 28621 28622 28623 28624 28625 28626 28627 28628 28629 28630 28631 28632 28633 28634 28635 28636 28637 28638 28639 28640 28641 28642 28643 28644 28645 28646 28647 28648 28649 28650 28651 28652 28653 28654 28655 28656 28657 28658 28659 28660 28661 28662 28663 28664 28665 28666 28667 28668 28669 28670 28671 28672 28673 28674 28675 28676 28677 28678 28679 28680 28681 28682 28683 28684 28685 28686 28687 28688 28689 28690 28691 28692 28693 28694 28695 28696 28697 28698 28699 28700 28701 28702 28703 28704 28705 28706 28707 28708 28709 28710 28711 28712 28713 28714 28715 28716 28717 28718 28719 28720 28721 28722 28723 28724 28725 28726 28727 28728 28729 28730 28731 28732 28733 28734 28735 28736 28737 28738 28739 28740 28741 28742 28743 28744 28745 28746 28747 28748 28749 28750 28751 28752 28753 28754 28755 28756 28757 28758 28759 28760 28761 28762 28763 28764 28765 28766 28767 28768 28769 28770 28771 28772 28773 28774 28775 28776 28777 28778 28779 28780 28781 28782 28783 28784 28785 28786 28787 28788 28789 28790 28791 28792 28793 28794 28795 28796 28797 28798 28799 28800 28801 28802 28803 28804 28805 28806 28807 28808 28809 28810 28811 28812 28813 28814 28815 28816 28817 28818 28819 28820 28821 28822 28823 28824 28825 28826 28827 28828 28829 28830 28831 28832 28833 28834 28835 28836 28837 28838 28839 28840 28841 28842 28843 28844 28845 28846 28847 28848 28849 28850 28851 28852 28853 28854 28855 28856 28857 28858 28859 28860 28861 28862 28863 28864 28865 28866 28867 28868 28869 28870 28871 28872 28873 28874 28875 28876 28877 28878 28879 28880 28881 28882 28883 28884 28885 28886 28887 28888 28889 28890 28891 28892 28893 28894 28895 28896 28897 28898 28899 28900 28901 28902 28903 28904 28905 28906 28907 28908 28909 28910 28911 28912 28913 28914 28915 28916 28917 28918 28919 28920 28921 28922 28923 28924 28925 28926 28927 28928 28929 28930 28931 28932 28933 28934 28935 28936 28937 28938 28939 28940 28941 28942 28943 28944 28945 28946 28947 28948 28949 28950 28951 28952 28953 28954 28955 28956 28957 28958 28959 28960 28961 28962 28963 28964 28965 28966 28967 28968 28969 28970 28971 28972 28973 28974 28975 28976 28977 28978 28979 28980 28981 28982 28983 28984 28985 28986 28987 28988 28989 28990 28991 28992 28993 28994 28995 28996 28997 28998 28999 29000 29001 29002 29003 29004 29005 29006 29007 29008 29009 29010 29011 29012 29013 29014 29015 29016 29017 29018 29019 29020 29021 29022 29023 29024 29025 29026 29027 29028 29029 29030 29031 29032 29033 29034 29035 29036 29037 29038 29039 29040 29041 29042 29043 29044 29045 29046 29047 29048 29049 29050 29051 29052 29053 29054 29055 29056 29057 29058 29059 29060 29061 29062 29063 29064 29065 29066 29067 29068 29069 29070 29071 29072 29073 29074 29075 29076 29077 29078 29079 29080 29081 29082 29083 29084 29085 29086 29087 29088 29089 29090 29091 29092 29093 29094 29095 29096 29097 29098 29099 29100 29101 29102 29103 29104 29105 29106 29107 29108 29109 29110 29111 29112 29113 29114 29115 29116 29117 29118 29119 29120 29121 29122 29123 29124 29125 29126 29127 29128 29129 29130 29131 29132 29133 29134 29135 29136 29137 29138 29139 29140 29141 29142 29143 29144 29145 29146 29147 29148 29149 29150 29151 29152 29153 29154 29155 29156 29157 29158 29159 29160 29161 29162 29163 29164 29165 29166 29167 29168 29169 29170 29171 29172 29173 29174 29175 29176 29177 29178 29179 29180 29181 29182 29183 29184 29185 29186 29187 29188 29189 29190 29191 29192 29193 29194 29195 29196 29197 29198 29199 29200 29201 29202 29203 29204 29205 29206 29207 29208 29209 29210 29211 29212 29213 29214 29215 29216 29217 29218 29219 29220 29221 29222 29223 29224 29225 29226 29227 29228 29229 29230 29231 29232 29233 29234 29235 29236 29237 29238 29239 29240 29241 29242 29243 29244 29245 29246 29247 29248 29249 29250 29251 29252 29253 29254 29255 29256 29257 29258 29259 29260 29261 29262 29263 29264 29265 29266 29267 29268 29269 29270 29271 29272 29273 29274 29275 29276 29277 29278 29279 29280 29281 29282 29283 29284 29285 29286 29287 29288 29289 29290 29291 29292 29293 29294 29295 29296 29297 29298 29299 29300 29301 29302 29303 29304 29305 29306 29307 29308 29309 29310 29311 29312 29313 29314 29315 29316 29317 29318 29319 29320 29321 29322 29323 29324 29325 29326 29327 29328 29329 29330 29331 29332 29333 29334 29335 29336 29337 29338 29339 29340 29341 29342 29343 29344 29345 29346 29347 29348 29349 29350 29351 29352 29353 29354 29355 29356 29357 29358 29359 29360 29361 29362 29363 29364 29365 29366 29367 29368 29369 29370 29371 29372 29373 29374 29375 29376 29377 29378 29379 29380 29381 29382 29383 29384 29385 29386 29387 29388 29389 29390 29391 29392 29393 29394 29395 29396 29397 29398 29399 29400 29401 29402 29403 29404 29405 29406 29407 29408 29409 29410 29411 29412 29413 29414 29415 29416 29417 29418 29419 29420 29421 29422 29423 29424 29425 29426 29427 29428 29429 29430 29431 29432 29433 29434 29435 29436 29437 29438 29439 29440 29441 29442 29443 29444 29445 29446 29447 29448 29449 29450 29451 29452 29453 29454 29455 29456 29457 29458 29459 29460 29461 29462 29463 29464 29465 29466 29467 29468 29469 29470 29471 29472 29473 29474 29475 29476 29477 29478 29479 29480 29481 29482 29483 29484 29485 29486 29487 29488 29489 29490 29491 29492 29493 29494 29495 29496 29497 29498 29499 29500 29501 29502 29503 29504 29505 29506 29507 29508 29509 29510 29511 29512 29513 29514 29515 29516 29517 29518 29519 29520 29521 29522 29523 29524 29525 29526 29527 29528 29529 29530 29531 29532 29533 29534 29535 29536 29537 29538 29539 29540 29541 29542 29543 29544 29545 29546 29547 29548 29549 29550 29551 29552 29553 29554 29555 29556 29557 29558 29559 29560 29561 29562 29563 29564 29565 29566 29567 29568 29569 29570 29571 29572 29573 29574 29575 29576 29577 29578 29579 29580 29581 29582 29583 29584 29585 29586 29587 29588 29589 29590 29591 29592 29593 29594 29595 29596 29597 29598 29599 29600 29601 29602 29603 29604 29605 29606 29607 29608 29609 29610 29611 29612 29613 29614 29615 29616 29617 29618 29619 29620 29621 29622 29623 29624 29625 29626 29627 29628 29629 29630 29631 29632 29633 29634 29635 29636 29637 29638 29639 29640 29641 29642 29643 29644 29645 29646 29647 29648 29649 29650 29651 29652 29653 29654 29655 29656 29657 29658 29659 29660 29661 29662 29663 29664 29665 29666 29667 29668 29669 29670 29671 29672 29673 29674 29675 29676 29677 29678 29679 29680 29681 29682 29683 29684 29685 29686 29687 29688 29689 29690 29691 29692 29693 29694 29695 29696 29697 29698 29699 29700 29701 29702 29703 29704 29705 29706 29707 29708 29709 29710 29711 29712 29713 29714 29715 29716 29717 29718 29719 29720 29721 29722 29723 29724 29725 29726 29727 29728 29729 29730 29731 29732 29733 29734 29735 29736 29737 29738 29739 29740 29741 29742 29743 29744 29745 29746 29747 29748 29749 29750 29751 29752 29753 29754 29755 29756 29757 29758 29759 29760 29761 29762 29763 29764 29765 29766 29767 29768 29769 29770 29771 29772 29773 29774 29775 29776 29777 29778 29779 29780 29781 29782 29783 29784 29785 29786 29787 29788 29789 29790 29791 29792 29793 29794 29795 29796 29797 29798 29799 29800 29801 29802 29803 29804 29805 29806 29807 29808 29809 29810 29811 29812 29813 29814 29815 29816 29817 29818 29819 29820 29821 29822 29823 29824 29825 29826 29827 29828 29829 29830 29831 29832 29833 29834 29835 29836 29837 29838 29839 29840 29841 29842 29843 29844 29845 29846 29847 29848 29849 29850 29851 29852 29853 29854 29855 29856 29857 29858 29859 29860 29861 29862 29863 29864 29865 29866 29867 29868 29869 29870 29871 29872 29873 29874 29875 29876 29877 29878 29879 29880 29881 29882 29883 29884 29885 29886 29887 29888 29889 29890 29891 29892 29893 29894 29895 29896 29897 29898 29899 29900 29901 29902 29903 29904 29905 29906 29907 29908 29909 29910 29911 29912 29913 29914 29915 29916 29917 29918 29919 29920 29921 29922 29923 29924 29925 29926 29927 29928 29929 29930 29931 29932 29933 29934 29935 29936 29937 29938 29939 29940 29941 29942 29943 29944 29945 29946 29947 29948 29949 29950 29951 29952 29953 29954 29955 29956 29957 29958 29959 29960 29961 29962 29963 29964 29965 29966 29967 29968 29969 29970 29971 29972 29973 29974 29975 29976 29977 29978 29979 29980 29981 29982 29983 29984 29985 29986 29987 29988 29989 29990 29991 29992 29993 29994 29995 29996 29997 29998 29999 30000 30001 30002 30003 30004 30005 30006 30007 30008 30009 30010 30011 30012 30013 30014 30015 30016 30017 30018 30019 30020 30021 30022 30023 30024 30025 30026 30027 30028 30029 30030 30031 30032 30033 30034 30035 30036 30037 30038 30039 30040 30041 30042 30043 30044 30045 30046 30047 30048 30049 30050 30051 30052 30053 30054 30055 30056 30057 30058 30059 30060 30061 30062 30063 30064 30065 30066 30067 30068 30069 30070 30071 30072 30073 30074 30075 30076 30077 30078 30079 30080 30081 30082 30083 30084 30085 30086 30087 30088 30089 30090 30091 30092 30093 30094 30095 30096 30097 30098 30099 30100 30101 30102 30103 30104 30105 30106 30107 30108 30109 30110 30111 30112 30113 30114 30115 30116 30117 30118 30119 30120 30121 30122 30123 30124 30125 30126 30127 30128 30129 30130 30131 30132 30133 30134 30135 30136 30137 30138 30139 30140 30141 30142 30143 30144 30145 30146 30147 30148 30149 30150 30151 30152 30153 30154 30155 30156 30157 30158 30159 30160 30161 30162 30163 30164 30165 30166 30167 30168 30169 30170 30171 30172 30173 30174 30175 30176 30177 30178 30179 30180 30181 30182 30183 30184 30185 30186 30187 30188 30189 30190 30191 30192 30193 30194 30195 30196 30197 30198 30199 30200 30201 30202 30203 30204 30205 30206 30207 30208 30209 30210 30211 30212 30213 30214 30215 30216 30217 30218 30219 30220 30221 30222 30223 30224 30225 30226 30227 30228 30229 30230 30231 30232 30233 30234 30235 30236 30237 30238 30239 30240 30241 30242 30243 30244 30245 30246 30247 30248 30249 30250 30251 30252 30253 30254 30255 30256 30257 30258 30259 30260 30261 30262 30263 30264 30265 30266 30267 30268 30269 30270 30271 30272 30273 30274 30275 30276 30277 30278 30279 30280 30281 30282 30283 30284 30285 30286 30287 30288 30289 30290 30291 30292 30293 30294 30295 30296 30297 30298 30299 30300 30301 30302 30303 30304 30305 30306 30307 30308 30309 30310 30311 30312 30313 30314 30315 30316 30317 30318 30319 30320 30321 30322 30323 30324 30325 30326 30327 30328 30329 30330 30331 30332 30333 30334 30335 30336 30337 30338 30339 30340 30341 30342 30343 30344 30345 30346 30347 30348 30349 30350 30351 30352 30353 30354 30355 30356 30357 30358 30359 30360 30361 30362 30363 30364 30365 30366 30367 30368 30369 30370 30371 30372 30373 30374 30375 30376 30377 30378 30379 30380 30381 30382 30383 30384 30385 30386 30387 30388 30389 30390 30391 30392 30393 30394 30395 30396 30397 30398 30399 30400 30401 30402 30403 30404 30405 30406 30407 30408 30409 30410 30411 30412 30413 30414 30415 30416 30417 30418 30419 30420 30421 30422 30423 30424 30425 30426 30427 30428 30429 30430 30431 30432 30433 30434 30435 30436 30437 30438 30439 30440 30441 30442 30443 30444 30445 30446 30447 30448 30449 30450 30451 30452 30453 30454 30455 30456 30457 30458 30459 30460 30461 30462 30463 30464 30465 30466 30467 30468 30469 30470 30471 30472 30473 30474 30475 30476 30477 30478 30479 30480 30481 30482 30483 30484 30485 30486 30487 30488 30489 30490 30491 30492 30493 30494 30495 30496 30497 30498 30499 30500 30501 30502 30503 30504 30505 30506 30507 30508 30509 30510 30511 30512 30513 30514 30515 30516 30517 30518 30519 30520 30521 30522 30523 30524 30525 30526 30527 30528 30529 30530 30531 30532 30533 30534 30535 30536 30537 30538 30539 30540 30541 30542 30543 30544 30545 30546 30547 30548 30549 30550 30551 30552 30553 30554 30555 30556 30557 30558 30559 30560 30561 30562 30563 30564 30565 30566 30567 30568 30569 30570 30571 30572 30573 30574 30575 30576 30577 30578 30579 30580 30581 30582 30583 30584 30585 30586 30587 30588 30589 30590 30591 30592 30593 30594 30595 30596 30597 30598 30599 30600 30601 30602 30603 30604 30605 30606 30607 30608 30609 30610 30611 30612 30613 30614 30615 30616 30617 30618 30619 30620 30621 30622 30623 30624 30625 30626 30627 30628 30629 30630 30631 30632 30633 30634 30635 30636 30637 30638 30639 30640 30641 30642 30643 30644 30645 30646 30647 30648 30649 30650 30651 30652 30653 30654 30655 30656 30657 30658 30659 30660 30661 30662 30663 30664 30665 30666 30667 30668 30669 30670 30671 30672 30673 30674 30675 30676 30677 30678 30679 30680 30681 30682 30683 30684 30685 30686 30687 30688 30689 30690 30691 30692 30693 30694 30695 30696 30697 30698 30699 30700 30701 30702 30703 30704 30705 30706 30707 30708 30709 30710 30711 30712 30713 30714 30715 30716 30717 30718 30719 30720 30721 30722 30723 30724 30725 30726 30727 30728 30729 30730 30731 30732 30733 30734 30735 30736 30737 30738 30739 30740 30741 30742 30743 30744 30745 30746 30747 30748 30749 30750 30751 30752 30753 30754 30755 30756 30757 30758 30759 30760 30761 30762 30763 30764 30765 30766 30767 30768 30769 30770 30771 30772 30773 30774 30775 30776 30777 30778 30779 30780 30781 30782 30783 30784 30785 30786 30787 30788 30789 30790 30791 30792 30793 30794 30795 30796 30797 30798 30799 30800 30801 30802 30803 30804 30805 30806 30807 30808 30809 30810 30811 30812 30813 30814 30815 30816 30817 30818 30819 30820 30821 30822 30823 30824 30825 30826 30827 30828 30829 30830 30831 30832 30833 30834 30835 30836 30837 30838 30839 30840 30841 30842 30843 30844 30845 30846 30847 30848 30849 30850 30851 30852 30853 30854 30855 30856 30857 30858 30859 30860 30861 30862 30863 30864 30865 30866 30867 30868 30869 30870 30871 30872 30873 30874 30875 30876 30877 30878 30879 30880 30881 30882 30883 30884 30885 30886 30887 30888 30889 30890 30891 30892 30893 30894 30895 30896 30897 30898 30899 30900 30901 30902 30903 30904 30905 30906 30907 30908 30909 30910 30911 30912 30913 30914 30915 30916 30917 30918 30919 30920 30921 30922 30923 30924 30925 30926 30927 30928 30929 30930 30931 30932 30933 30934 30935 30936 30937 30938 30939 30940 30941 30942 30943 30944 30945 30946 30947 30948 30949 30950 30951 30952 30953 30954 30955 30956 30957 30958 30959 30960 30961 30962 30963 30964 30965 30966 30967 30968 30969 30970 30971 30972 30973 30974 30975 30976 30977 30978 30979 30980 30981 30982 30983 30984 30985 30986 30987 30988 30989 30990 30991 30992 30993 30994 30995 30996 30997 30998 30999 31000 31001 31002 31003 31004 31005 31006 31007 31008 31009 31010 31011 31012 31013 31014 31015 31016 31017 31018 31019 31020 31021 31022 31023 31024 31025 31026 31027 31028 31029 31030 31031 31032 31033 31034 31035 31036 31037 31038 31039 31040 31041 31042 31043 31044 31045 31046 31047 31048 31049 31050 31051 31052 31053 31054 31055 31056 31057 31058 31059 31060 31061 31062 31063 31064 31065 31066 31067 31068 31069 31070 31071 31072 31073 31074 31075 31076 31077 31078 31079 31080 31081 31082 31083 31084 31085 31086 31087 31088 31089 31090 31091 31092 31093 31094 31095 31096 31097 31098 31099 31100 31101 31102 31103 31104 31105 31106 31107 31108 31109 31110 31111 31112 31113 31114 31115 31116 31117 31118 31119 31120 31121 31122 31123 31124 31125 31126 31127 31128 31129 31130 31131 31132 31133 31134 31135 31136 31137 31138 31139 31140 31141 31142 31143 31144 31145 31146 31147 31148 31149 31150 31151 31152 31153 31154 31155 31156 31157 31158 31159 31160 31161 31162 31163 31164 31165 31166 31167 31168 31169 31170 31171 31172 31173 31174 31175 31176 31177 31178 31179 31180 31181 31182 31183 31184 31185 31186 31187 31188 31189 31190 31191 31192 31193 31194 31195 31196 31197 31198 31199 31200 31201 31202 31203 31204 31205 31206 31207 31208 31209 31210 31211 31212 31213 31214 31215 31216 31217 31218 31219 31220 31221 31222 31223 31224 31225 31226 31227 31228 31229 31230 31231 31232 31233 31234 31235 31236 31237 31238 31239 31240 31241 31242 31243 31244 31245 31246 31247 31248 31249 31250 31251 31252 31253 31254 31255 31256 31257 31258 31259 31260 31261 31262 31263 31264 31265 31266 31267 31268 31269 31270 31271 31272 31273 31274 31275 31276 31277 31278 31279 31280 31281 31282 31283 31284 31285 31286 31287 31288 31289 31290 31291 31292 31293 31294 31295 31296 31297 31298 31299 31300 31301 31302 31303 31304 31305 31306 31307 31308 31309 31310 31311 31312 31313 31314 31315 31316 31317 31318 31319 31320 31321 31322 31323 31324 31325 31326 31327 31328 31329 31330 31331 31332 31333 31334 31335 31336 31337 31338 31339 31340 31341 31342 31343 31344 31345 31346 31347 31348 31349 31350 31351 31352 31353 31354 31355 31356 31357 31358 31359 31360 31361 31362 31363 31364 31365 31366 31367 31368 31369 31370 31371 31372 31373 31374 31375 31376 31377 31378 31379 31380 31381 31382 31383 31384 31385 31386 31387 31388 31389 31390 31391 31392 31393 31394 31395 31396 31397 31398 31399 31400 31401 31402 31403 31404 31405 31406 31407 31408 31409 31410 31411 31412 31413 31414 31415 31416 31417 31418 31419 31420 31421 31422 31423 31424 31425 31426 31427 31428 31429 31430 31431 31432 31433 31434 31435 31436 31437 31438 31439 31440 31441 31442 31443 31444 31445 31446 31447 31448 31449 31450 31451 31452 31453 31454 31455 31456 31457 31458 31459 31460 31461 31462 31463 31464 31465 31466 31467 31468 31469 31470 31471 31472 31473 31474 31475 31476 31477 31478 31479 31480 31481 31482 31483 31484 31485 31486 31487 31488 31489 31490 31491 31492 31493 31494 31495 31496 31497 31498 31499 31500 31501 31502 31503 31504 31505 31506 31507 31508 31509 31510 31511 31512 31513 31514 31515 31516 31517 31518 31519 31520 31521 31522 31523 31524 31525 31526 31527 31528 31529 31530 31531 31532 31533 31534 31535 31536 31537 31538 31539 31540 31541 31542 31543 31544 31545 31546 31547 31548 31549 31550 31551 31552 31553 31554 31555 31556 31557 31558 31559 31560 31561 31562 31563 31564 31565 31566 31567 31568 31569 31570 31571 31572 31573 31574 31575 31576 31577 31578 31579 31580 31581 31582 31583 31584 31585 31586 31587 31588 31589 31590 31591 31592 31593 31594 31595 31596 31597 31598 31599 31600 31601 31602 31603 31604 31605 31606 31607 31608 31609 31610 31611 31612 31613 31614 31615 31616 31617 31618 31619 31620 31621 31622 31623 31624 31625 31626 31627 31628 31629 31630 31631 31632 31633 31634 31635 31636 31637 31638 31639 31640 31641 31642 31643 31644 31645 31646 31647 31648 31649 31650 31651 31652 31653 31654 31655 31656 31657 31658 31659 31660 31661 31662 31663 31664 31665 31666 31667 31668 31669 31670 31671 31672 31673 31674 31675 31676 31677 31678 31679 31680 31681 31682 31683 31684 31685 31686 31687 31688 31689 31690 31691 31692 31693 31694 31695 31696 31697 31698 31699 31700 31701 31702 31703 31704 31705 31706 31707 31708 31709 31710 31711 31712 31713 31714 31715 31716 31717 31718 31719 31720 31721 31722 31723 31724 31725 31726 31727 31728 31729 31730 31731 31732 31733 31734 31735 31736 31737 31738 31739 31740 31741 31742 31743 31744 31745 31746 31747 31748 31749 31750 31751 31752 31753 31754 31755 31756 31757 31758 31759 31760 31761 31762 31763 31764 31765 31766 31767 31768 31769 31770 31771 31772 31773 31774 31775 31776 31777 31778 31779 31780 31781 31782 31783 31784 31785 31786 31787 31788 31789 31790 31791 31792 31793 31794 31795 31796 31797 31798 31799 31800 31801 31802 31803 31804 31805 31806 31807 31808 31809 31810 31811 31812 31813 31814 31815 31816 31817 31818 31819 31820 31821 31822 31823 31824 31825 31826 31827 31828 31829 31830 31831 31832 31833 31834 31835 31836 31837 31838 31839 31840 31841 31842 31843 31844 31845 31846 31847 31848 31849 31850 31851 31852 31853 31854 31855 31856 31857 31858 31859 31860 31861 31862 31863 31864 31865 31866 31867 31868 31869 31870 31871 31872 31873 31874 31875 31876 31877 31878 31879 31880 31881 31882 31883 31884 31885 31886 31887 31888 31889 31890 31891 31892 31893 31894 31895 31896 31897 31898 31899 31900 31901 31902 31903 31904 31905 31906 31907 31908 31909 31910 31911 31912 31913 31914 31915 31916 31917 31918 31919 31920 31921 31922 31923 31924 31925 31926 31927 31928 31929 31930 31931 31932 31933 31934 31935 31936 31937 31938 31939 31940 31941 31942 31943 31944 31945 31946 31947 31948 31949 31950 31951 31952 31953 31954 31955 31956 31957 31958 31959 31960 31961 31962 31963 31964 31965 31966 31967 31968 31969 31970 31971 31972 31973 31974 31975 31976 31977 31978 31979 31980 31981 31982 31983 31984 31985 31986 31987 31988 31989 31990 31991 31992 31993 31994 31995 31996 31997 31998 31999 32000 32001 32002 32003 32004 32005 32006 32007 32008 32009 32010 32011 32012 32013 32014 32015 32016 32017 32018 32019 32020 32021 32022 32023 32024 32025 32026 32027 32028 32029 32030 32031 32032 32033 32034 32035 32036 32037 32038 32039 32040 32041 32042 32043 32044 32045 32046 32047 32048 32049 32050 32051 32052 32053 32054 32055 32056 32057 32058 32059 32060 32061 32062 32063 32064 32065 32066 32067 32068 32069 32070 32071 32072 32073 32074 32075 32076 32077 32078 32079 32080 32081 32082 32083 32084 32085 32086 32087 32088 32089 32090 32091 32092 32093 32094 32095 32096 32097 32098 32099 32100 32101 32102 32103 32104 32105 32106 32107 32108 32109 32110 32111 32112 32113 32114 32115 32116 32117 32118 32119 32120 32121 32122 32123 32124 32125 32126 32127 32128 32129 32130 32131 32132 32133 32134 32135 32136 32137 32138 32139 32140 32141 32142 32143 32144 32145 32146 32147 32148 32149 32150 32151 32152 32153 32154 32155 32156 32157 32158 32159 32160 32161 32162 32163 32164 32165 32166 32167 32168 32169 32170 32171 32172 32173 32174 32175 32176 32177 32178 32179 32180 32181 32182 32183 32184 32185 32186 32187 32188 32189 32190 32191 32192 32193 32194 32195 32196 32197 32198 32199 32200 32201 32202 32203 32204 32205 32206 32207 32208 32209 32210 32211 32212 32213 32214 32215 32216 32217 32218 32219 32220 32221 32222 32223 32224 32225 32226 32227 32228 32229 32230 32231 32232 32233 32234 32235 32236 32237 32238 32239 32240 32241 32242 32243 32244 32245 32246 32247 32248 32249 32250 32251 32252 32253 32254 32255 32256 32257 32258 32259 32260 32261 32262 32263 32264 32265 32266 32267 32268 32269 32270 32271 32272 32273 32274 32275 32276 32277 32278 32279 32280 32281 32282 32283 32284 32285 32286 32287 32288 32289 32290 32291 32292 32293 32294 32295 32296 32297 32298 32299 32300 32301 32302 32303 32304 32305 32306 32307 32308 32309 32310 32311 32312 32313 32314 32315 32316 32317 32318 32319 32320 32321 32322 32323 32324 32325 32326 32327 32328 32329 32330 32331 32332 32333 32334 32335 32336 32337 32338 32339 32340 32341 32342 32343 32344 32345 32346 32347 32348 32349 32350 32351 32352 32353 32354 32355 32356 32357 32358 32359 32360 32361 32362 32363 32364 32365 32366 32367 32368 32369 32370 32371 32372 32373 32374 32375 32376 32377 32378 32379 32380 32381 32382 32383 32384 32385 32386 32387 32388 32389 32390 32391 32392 32393 32394 32395 32396 32397 32398 32399 32400 32401 32402 32403 32404 32405 32406 32407 32408 32409 32410 32411 32412 32413 32414 32415 32416 32417 32418 32419 32420 32421 32422 32423 32424 32425 32426 32427 32428 32429 32430 32431 32432 32433 32434 32435 32436 32437 32438 32439 32440 32441 32442 32443 32444 32445 32446 32447 32448 32449 32450 32451 32452 32453 32454 32455 32456 32457 32458 32459 32460 32461 32462 32463 32464 32465 32466 32467 32468 32469 32470 32471 32472 32473 32474 32475 32476 32477 32478 32479 32480 32481 32482 32483 32484 32485 32486 32487 32488 32489 32490 32491 32492 32493 32494 32495 32496 32497 32498 32499 32500 32501 32502 32503 32504 32505 32506 32507 32508 32509 32510 32511 32512 32513 32514 32515 32516 32517 32518 32519 32520 32521 32522 32523 32524 32525 32526 32527 32528 32529 32530 32531 32532 32533 32534 32535 32536 32537 32538 32539 32540 32541 32542 32543 32544 32545 32546 32547 32548 32549 32550 32551 32552 32553 32554 32555 32556 32557 32558 32559 32560 32561 32562 32563 32564 32565 32566 32567 32568 32569 32570 32571 32572 32573 32574 32575 32576 32577 32578 32579 32580 32581 32582 32583 32584 32585 32586 32587 32588 32589 32590 32591 32592 32593 32594 32595 32596 32597 32598 32599 32600 32601 32602 32603 32604 32605 32606 32607 32608 32609 32610 32611 32612 32613 32614 32615 32616 32617 32618 32619 32620 32621 32622 32623 32624 32625 32626 32627 32628 32629 32630 32631 32632 32633 32634 32635 32636 32637 32638 32639 32640 32641 32642 32643 32644 32645 32646 32647 32648 32649 32650 32651 32652 32653 32654 32655 32656 32657 32658 32659 32660 32661 32662 32663 32664 32665 32666 32667 32668 32669 32670 32671 32672 32673 32674 32675 32676 32677 32678 32679 32680 32681 32682 32683 32684 32685 32686 32687 32688 32689 32690 32691 32692 32693 32694 32695 32696 32697 32698 32699 32700 32701 32702 32703 32704 32705 32706 32707 32708 32709 32710 32711 32712 32713 32714 32715 32716 32717 32718 32719 32720 32721 32722 32723 32724 32725 32726 32727 32728 32729 32730 32731 32732 32733 32734 32735 32736 32737 32738 32739 32740 32741 32742 32743 32744 32745 32746 32747 32748 32749 32750 32751 32752 32753 32754 32755 32756 32757 32758 32759 32760 32761 32762 32763 32764 32765 32766 32767 32768 32769 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779 32780 32781 32782 32783 32784 32785 32786 32787 32788 32789 32790 32791 32792 32793 32794 32795 32796 32797 32798 32799 32800 32801 32802 32803 32804 32805 32806 32807 32808 32809 32810 32811 32812 32813 32814 32815 32816 32817 32818 32819 32820 32821 32822 32823 32824 32825 32826 32827 32828 32829 32830 32831 32832 32833 32834 32835 32836 32837 32838 32839 32840 32841 32842 32843 32844 32845 32846 32847 32848 32849 32850 32851 32852 32853 32854 32855 32856 32857 32858 32859 32860 32861 32862 32863 32864 32865 32866 32867 32868 32869 32870 32871 32872 32873 32874 32875 32876 32877 32878 32879 32880 32881 32882 32883 32884 32885 32886 32887 32888 32889 32890 32891 32892 32893 32894 32895 32896 32897 32898 32899 32900 32901 32902 32903 32904 32905 32906 32907 32908 32909 32910 32911 32912 32913 32914 32915 32916 32917 32918 32919 32920 32921 32922 32923 32924 32925 32926 32927 32928 32929 32930 32931 32932 32933 32934 32935 32936 32937 32938 32939 32940 32941 32942 32943 32944 32945 32946 32947 32948 32949 32950 32951 32952 32953 32954 32955 32956 32957 32958 32959 32960 32961 32962 32963 32964 32965 32966 32967 32968 32969 32970 32971 32972 32973 32974 32975 32976 32977 32978 32979 32980 32981 32982 32983 32984 32985 32986 32987 32988 32989 32990 32991 32992 32993 32994 32995 32996 32997 32998 32999 33000 33001 33002 33003 33004 33005 33006 33007 33008 33009 33010 33011 33012 33013 33014 33015 33016 33017 33018 33019 33020 33021 33022 33023 33024 33025 33026 33027 33028 33029 33030 33031 33032 33033 33034 33035 33036 33037 33038 33039 33040 33041 33042 33043 33044 33045 33046 33047 33048 33049 33050 33051 33052 33053 33054 33055 33056 33057 33058 33059 33060 33061 33062 33063 33064 33065 33066 33067 33068 33069 33070 33071 33072 33073 33074 33075 33076 33077 33078 33079 33080 33081 33082 33083 33084 33085 33086 33087 33088 33089 33090 33091 33092 33093 33094 33095 33096 33097 33098 33099 33100 33101 33102 33103 33104 33105 33106 33107 33108 33109 33110 33111 33112 33113 33114 33115 33116 33117 33118 33119 33120 33121 33122 33123 33124 33125 33126 33127 33128 33129 33130 33131 33132 33133 33134 33135 33136 33137 33138 33139 33140 33141 33142 33143 33144 33145 33146 33147 33148 33149 33150 33151 33152 33153 33154 33155 33156 33157 33158 33159 33160 33161 33162 33163 33164 33165 33166 33167 33168 33169 33170 33171 33172 33173 33174 33175 33176 33177 33178 33179 33180 33181 33182 33183 33184 33185 33186 33187 33188 33189 33190 33191 33192 33193 33194 33195 33196 33197 33198 33199 33200 33201 33202 33203 33204 33205 33206 33207 33208 33209 33210 33211 33212 33213 33214 33215 33216 33217 33218 33219 33220 33221 33222 33223 33224 33225 33226 33227 33228 33229 33230 33231 33232 33233 33234 33235 33236 33237 33238 33239 33240 33241 33242 33243 33244 33245 33246 33247 33248 33249 33250 33251 33252 33253 33254 33255 33256 33257 33258 33259 33260 33261 33262 33263 33264 33265 33266 33267 33268 33269 33270 33271 33272 33273 33274 33275 33276 33277 33278 33279 33280 33281 33282 33283 33284 33285 33286 33287 33288 33289 33290 33291 33292 33293 33294 33295 33296 33297 33298 33299 33300 33301 33302 33303 33304 33305 33306 33307 33308 33309 33310 33311 33312 33313 33314 33315 33316 33317 33318 33319 33320 33321 33322 33323 33324 33325 33326 33327 33328 33329 33330 33331 33332 33333 33334 33335 33336 33337 33338 33339 33340 33341 33342 33343 33344 33345 33346 33347 33348 33349 33350 33351 33352 33353 33354 33355 33356 33357 33358 33359 33360 33361 33362 33363 33364 33365 33366 33367 33368 33369 33370 33371 33372 33373 33374 33375 33376 33377 33378 33379 33380 33381 33382 33383 33384 33385 33386 33387 33388 33389 33390 33391 33392 33393 33394 33395 33396 33397 33398 33399 33400 33401 33402 33403 33404 33405 33406 33407 33408 33409 33410 33411 33412 33413 33414 33415 33416 33417 33418 33419 33420 33421 33422 33423 33424 33425 33426 33427 33428 33429 33430 33431 33432 33433 33434 33435 33436 33437 33438 33439 33440 33441 33442 33443 33444 33445 33446 33447 33448 33449 33450 33451 33452 33453 33454 33455 33456 33457 33458 33459 33460 33461 33462 33463 33464 33465 33466 33467 33468 33469 33470 33471 33472 33473 33474 33475 33476 33477 33478 33479 33480 33481 33482 33483 33484 33485 33486 33487 33488 33489 33490 33491 33492 33493 33494 33495 33496 33497 33498 33499 33500 33501 33502 33503 33504 33505 33506 33507 33508 33509 33510 33511 33512 33513 33514 33515 33516 33517 33518 33519 33520 33521 33522 33523 33524 33525 33526 33527 33528 33529 33530 33531 33532 33533 33534 33535 33536 33537 33538 33539 33540 33541 33542 33543 33544 33545 33546 33547 33548 33549 33550 33551 33552 33553 33554 33555 33556 33557 33558 33559 33560 33561 33562 33563 33564 33565 33566 33567 33568 33569 33570 33571 33572 33573 33574 33575 33576 33577 33578 33579 33580 33581 33582 33583 33584 33585 33586 33587 33588 33589 33590 33591 33592 33593 33594 33595 33596 33597 33598 33599 33600 33601 33602 33603 33604 33605 33606 33607 33608 33609 33610 33611 33612 33613 33614 33615 33616 33617 33618 33619 33620 33621 33622 33623 33624 33625 33626 33627 33628 33629 33630 33631 33632 33633 33634 33635 33636 33637 33638 33639 33640 33641 33642 33643 33644 33645 33646 33647 33648 33649 33650 33651 33652 33653 33654 33655 33656 33657 33658 33659 33660 33661 33662 33663 33664 33665 33666 33667 33668 33669 33670 33671 33672 33673 33674 33675 33676 33677 33678 33679 33680 33681 33682 33683 33684 33685 33686 33687 33688 33689 33690 33691 33692 33693 33694 33695 33696 33697 33698 33699 33700 33701 33702 33703 33704 33705 33706 33707 33708 33709 33710 33711 33712 33713 33714 33715 33716 33717 33718 33719 33720 33721 33722 33723 33724 33725 33726 33727 33728 33729 33730 33731 33732 33733 33734 33735 33736 33737 33738 33739 33740 33741 33742 33743 33744 33745 33746 33747 33748 33749 33750 33751 33752 33753 33754 33755 33756 33757 33758 33759 33760 33761 33762 33763 33764 33765 33766 33767 33768 33769 33770 33771 33772 33773 33774 33775 33776 33777 33778 33779 33780 33781 33782 33783 33784 33785 33786 33787 33788 33789 33790 33791 33792 33793 33794 33795 33796 33797 33798 33799 33800 33801 33802 33803 33804 33805 33806 33807 33808 33809 33810 33811 33812 33813 33814 33815 33816 33817 33818 33819 33820 33821 33822 33823 33824 33825 33826 33827 33828 33829 33830 33831 33832 33833 33834 33835 33836 33837 33838 33839 33840 33841 33842 33843 33844 33845 33846 33847 33848 33849 33850 33851 33852 33853 33854 33855 33856 33857 33858 33859 33860 33861 33862 33863 33864 33865 33866 33867 33868 33869 33870 33871 33872 33873 33874 33875 33876 33877 33878 33879 33880 33881 33882 33883 33884 33885 33886 33887 33888 33889 33890 33891 33892 33893 33894 33895 33896 33897 33898 33899 33900 33901 33902 33903 33904 33905 33906 33907 33908 33909 33910 33911 33912 33913 33914 33915 33916 33917 33918 33919 33920 33921 33922 33923 33924 33925 33926 33927 33928 33929 33930 33931 33932 33933 33934 33935 33936 33937 33938 33939 33940 33941 33942 33943 33944 33945 33946 33947 33948 33949 33950 33951 33952 33953 33954 33955 33956 33957 33958 33959 33960 33961 33962 33963 33964 33965 33966 33967 33968 33969 33970 33971 33972 33973 33974 33975 33976 33977 33978 33979 33980 33981 33982 33983 33984 33985 33986 33987 33988 33989 33990 33991 33992 33993 33994 33995 33996 33997 33998 33999 34000 34001 34002 34003 34004 34005 34006 34007 34008 34009 34010 34011 34012 34013 34014 34015 34016 34017 34018 34019 34020 34021 34022 34023 34024 34025 34026 34027 34028 34029 34030 34031 34032 34033 34034 34035 34036 34037 34038 34039 34040 34041 34042 34043 34044 34045 34046 34047 34048 34049 34050 34051 34052 34053 34054 34055 34056 34057 34058 34059 34060 34061 34062 34063 34064 34065 34066 34067 34068 34069 34070 34071 34072 34073 34074 34075 34076 34077 34078 34079 34080 34081 34082 34083 34084 34085 34086 34087 34088 34089 34090 34091 34092 34093 34094 34095 34096 34097 34098 34099 34100 34101 34102 34103 34104 34105 34106 34107 34108 34109 34110 34111 34112 34113 34114 34115 34116 34117 34118 34119 34120 34121 34122 34123 34124 34125 34126 34127 34128 34129 34130 34131 34132 34133 34134 34135 34136 34137 34138 34139 34140 34141 34142 34143 34144 34145 34146 34147 34148 34149 34150 34151 34152 34153 34154 34155 34156 34157 34158 34159 34160 34161 34162 34163 34164 34165 34166 34167 34168 34169 34170 34171 34172 34173 34174 34175 34176 34177 34178 34179 34180 34181 34182 34183 34184 34185 34186 34187 34188 34189 34190 34191 34192 34193 34194 34195 34196 34197 34198 34199 34200 34201 34202 34203 34204 34205 34206 34207 34208 34209 34210 34211 34212 34213 34214 34215 34216 34217 34218 34219 34220 34221 34222 34223 34224 34225 34226 34227 34228 34229 34230 34231 34232 34233 34234 34235 34236 34237 34238 34239 34240 34241 34242 34243 34244 34245 34246 34247 34248 34249 34250 34251 34252 34253 34254 34255 34256 34257 34258 34259 34260 34261 34262 34263 34264 34265 34266 34267 34268 34269 34270 34271 34272 34273 34274 34275 34276 34277 34278 34279 34280 34281 34282 34283 34284 34285 34286 34287 34288 34289 34290 34291 34292 34293 34294 34295 34296 34297 34298 34299 34300 34301 34302 34303 34304 34305 34306 34307 34308 34309 34310 34311 34312 34313 34314 34315 34316 34317 34318 34319 34320 34321 34322 34323 34324 34325 34326 34327 34328 34329 34330 34331 34332 34333 34334 34335 34336 34337 34338 34339 34340 34341 34342 34343 34344 34345 34346 34347 34348 34349 34350 34351 34352 34353 34354 34355 34356 34357 34358 34359 34360 34361 34362 34363 34364 34365 34366 34367 34368 34369 34370 34371 34372 34373 34374 34375 34376 34377 34378 34379 34380 34381 34382 34383 34384 34385 34386 34387 34388 34389 34390 34391 34392 34393 34394 34395 34396 34397 34398 34399 34400 34401 34402 34403 34404 34405 34406 34407 34408 34409 34410 34411 34412 34413 34414 34415 34416 34417 34418 34419 34420 34421 34422 34423 34424 34425 34426 34427 34428 34429 34430 34431 34432 34433 34434 34435 34436 34437 34438 34439 34440 34441 34442 34443 34444 34445 34446 34447 34448 34449 34450 34451 34452 34453 34454 34455 34456 34457 34458 34459 34460 34461 34462 34463 34464 34465 34466 34467 34468 34469 34470 34471 34472 34473 34474 34475 34476 34477 34478 34479 34480 34481 34482 34483 34484 34485 34486 34487 34488 34489 34490 34491 34492 34493 34494 34495 34496 34497 34498 34499 34500 34501 34502 34503 34504 34505 34506 34507 34508 34509 34510 34511 34512 34513 34514 34515 34516 34517 34518 34519 34520 34521 34522 34523 34524 34525 34526 34527 34528 34529 34530 34531 34532 34533 34534 34535 34536 34537 34538 34539 34540 34541 34542 34543 34544 34545 34546 34547 34548 34549 34550 34551 34552 34553 34554 34555 34556 34557 34558 34559 34560 34561 34562 34563 34564 34565 34566 34567 34568 34569 34570 34571 34572 34573 34574 34575 34576 34577 34578 34579 34580 34581 34582 34583 34584 34585 34586 34587 34588 34589 34590 34591 34592 34593 34594 34595 34596 34597 34598 34599 34600 34601 34602 34603 34604 34605 34606 34607 34608 34609 34610 34611 34612 34613 34614 34615 34616 34617 34618 34619 34620 34621 34622 34623 34624 34625 34626 34627 34628 34629 34630 34631 34632 34633 34634 34635 34636 34637 34638 34639 34640 34641 34642 34643 34644 34645 34646 34647 34648 34649 34650 34651 34652 34653 34654 34655 34656 34657 34658 34659 34660 34661 34662 34663 34664 34665 34666 34667 34668 34669 34670 34671 34672 34673 34674 34675 34676 34677 34678 34679 34680 34681 34682 34683 34684 34685 34686 34687 34688 34689 34690 34691 34692 34693 34694 34695 34696 34697 34698 34699 34700 34701 34702 34703 34704 34705 34706 34707 34708 34709 34710 34711 34712 34713 34714 34715 34716 34717 34718 34719 34720 34721 34722 34723 34724 34725 34726 34727 34728 34729 34730 34731 34732 34733 34734 34735 34736 34737 34738 34739 34740 34741 34742 34743 34744 34745 34746 34747 34748 34749 34750 34751 34752 34753 34754 34755 34756 34757 34758 34759 34760 34761 34762 34763 34764 34765 34766 34767 34768 34769 34770 34771 34772 34773 34774 34775 34776 34777 34778 34779 34780 34781 34782 34783 34784 34785 34786 34787 34788 34789 34790 34791 34792 34793 34794 34795 34796 34797 34798 34799 34800 34801 34802 34803 34804 34805 34806 34807 34808 34809 34810 34811 34812 34813 34814 34815 34816 34817 34818 34819 34820 34821 34822 34823 34824 34825 34826 34827 34828 34829 34830 34831 34832 34833 34834 34835 34836 34837 34838 34839 34840 34841 34842 34843 34844 34845 34846 34847 34848 34849 34850 34851 34852 34853 34854 34855 34856 34857 34858 34859 34860 34861 34862 34863 34864 34865 34866 34867 34868 34869 34870 34871 34872 34873 34874 34875 34876 34877 34878 34879 34880 34881 34882 34883 34884 34885 34886 34887 34888 34889 34890 34891 34892 34893 34894 34895 34896 34897 34898 34899 34900 34901 34902 34903 34904 34905 34906 34907 34908 34909 34910 34911 34912 34913 34914 34915 34916 34917 34918 34919 34920 34921 34922 34923 34924 34925 34926 34927 34928 34929 34930 34931 34932 34933 34934 34935 34936 34937 34938 34939 34940 34941 34942 34943 34944 34945 34946 34947 34948 34949 34950 34951 34952 34953 34954 34955 34956 34957 34958 34959 34960 34961 34962 34963 34964 34965 34966 34967 34968 34969 34970 34971 34972 34973 34974 34975 34976 34977 34978 34979 34980 34981 34982 34983 34984 34985 34986 34987 34988 34989 34990 34991 34992 34993 34994 34995 34996 34997 34998 34999 35000 35001 35002 35003 35004 35005 35006 35007 35008 35009 35010 35011 35012 35013 35014 35015 35016 35017 35018 35019 35020 35021 35022 35023 35024 35025 35026 35027 35028 35029 35030 35031 35032 35033 35034 35035 35036 35037 35038 35039 35040 35041 35042 35043 35044 35045 35046 35047 35048 35049 35050 35051 35052 35053 35054 35055 35056 35057 35058 35059 35060 35061 35062 35063 35064 35065 35066 35067 35068 35069 35070 35071 35072 35073 35074 35075 35076 35077 35078 35079 35080 35081 35082 35083 35084 35085 35086 35087 35088 35089 35090 35091 35092 35093 35094 35095 35096 35097 35098 35099 35100 35101 35102 35103 35104 35105 35106 35107 35108 35109 35110 35111 35112 35113 35114 35115 35116 35117 35118 35119 35120 35121 35122 35123 35124 35125 35126 35127 35128 35129 35130 35131 35132 35133 35134 35135 35136 35137 35138 35139 35140 35141 35142 35143 35144 35145 35146 35147 35148 35149 35150 35151 35152 35153 35154 35155 35156 35157 35158 35159 35160 35161 35162 35163 35164 35165 35166 35167 35168 35169 35170 35171 35172 35173 35174 35175 35176 35177 35178 35179 35180 35181 35182 35183 35184 35185 35186 35187 35188 35189 35190 35191 35192 35193 35194 35195 35196 35197 35198 35199 35200 35201 35202 35203 35204 35205 35206 35207 35208 35209 35210 35211 35212 35213 35214 35215 35216 35217 35218 35219 35220 35221 35222 35223 35224 35225 35226 35227 35228 35229 35230 35231 35232 35233 35234 35235 35236 35237 35238 35239 35240 35241 35242 35243 35244 35245 35246 35247 35248 35249 35250 35251 35252 35253 35254 35255 35256 35257 35258 35259 35260 35261 35262 35263 35264 35265 35266 35267 35268 35269 35270 35271 35272 35273 35274 35275 35276 35277 35278 35279 35280 35281 35282 35283 35284 35285 35286 35287 35288 35289 35290 35291 35292 35293 35294 35295 35296 35297 35298 35299 35300 35301 35302 35303 35304 35305 35306 35307 35308 35309 35310 35311 35312 35313 35314 35315 35316 35317 35318 35319 35320 35321 35322 35323 35324 35325 35326 35327 35328 35329 35330 35331 35332 35333 35334 35335 35336 35337 35338 35339 35340 35341 35342 35343 35344 35345 35346 35347 35348 35349 35350 35351 35352 35353 35354 35355 35356 35357 35358 35359 35360 35361 35362 35363 35364 35365 35366 35367 35368 35369 35370 35371 35372 35373 35374 35375 35376 35377 35378 35379 35380 35381 35382 35383 35384 35385 35386 35387 35388 35389 35390 35391 35392 35393 35394 35395 35396 35397 35398 35399 35400 35401 35402 35403 35404 35405 35406 35407 35408 35409 35410 35411 35412 35413 35414 35415 35416 35417 35418 35419 35420 35421 35422 35423 35424 35425 35426 35427 35428 35429 35430 35431 35432 35433 35434 35435 35436 35437 35438 35439 35440 35441 35442 35443 35444 35445 35446 35447 35448 35449 35450 35451 35452 35453 35454 35455 35456 35457 35458 35459 35460 35461 35462 35463 35464 35465 35466 35467 35468 35469 35470 35471 35472 35473 35474 35475 35476 35477 35478 35479 35480 35481 35482 35483 35484 35485 35486 35487 35488 35489 35490 35491 35492 35493 35494 35495 35496 35497 35498 35499 35500 35501 35502 35503 35504 35505 35506 35507 35508 35509 35510 35511 35512 35513 35514 35515 35516 35517 35518 35519 35520 35521 35522 35523 35524 35525 35526 35527 35528 35529 35530 35531 35532 35533 35534 35535 35536 35537 35538 35539 35540 35541 35542 35543 35544 35545 35546 35547 35548 35549 35550 35551 35552 35553 35554 35555 35556 35557 35558 35559 35560 35561 35562 35563 35564 35565 35566 35567 35568 35569 35570 35571 35572 35573 35574 35575 35576 35577 35578 35579 35580 35581 35582 35583 35584 35585 35586 35587 35588 35589 35590 35591 35592 35593 35594 35595 35596 35597 35598 35599 35600 35601 35602 35603 35604 35605 35606 35607 35608 35609 35610 35611 35612 35613 35614 35615 35616 35617 35618 35619 35620 35621 35622 35623 35624 35625 35626 35627 35628 35629 35630 35631 35632 35633 35634 35635 35636 35637 35638 35639 35640 35641 35642 35643 35644 35645 35646 35647 35648 35649 35650 35651 35652 35653 35654 35655 35656 35657 35658 35659 35660 35661 35662 35663 35664 35665 35666 35667 35668 35669 35670 35671 35672 35673 35674 35675 35676 35677 35678 35679 35680 35681 35682 35683 35684 35685 35686 35687 35688 35689 35690 35691 35692 35693 35694 35695 35696 35697 35698 35699 35700 35701 35702 35703 35704 35705 35706 35707 35708 35709 35710 35711 35712 35713 35714 35715 35716 35717 35718 35719 35720 35721 35722 35723 35724 35725 35726 35727 35728 35729 35730 35731 35732 35733 35734 35735 35736 35737 35738 35739 35740 35741 35742 35743 35744 35745 35746 35747 35748 35749 35750 35751 35752 35753 35754 35755 35756 35757 35758 35759 35760 35761 35762 35763 35764 35765 35766 35767 35768 35769 35770 35771 35772 35773 35774 35775 35776 35777 35778 35779 35780 35781 35782 35783 35784 35785 35786 35787 35788 35789 35790 35791 35792 35793 35794 35795 35796 35797 35798 35799 35800 35801 35802 35803 35804 35805 35806 35807 35808 35809 35810 35811 35812 35813 35814 35815 35816 35817 35818 35819 35820 35821 35822 35823 35824 35825 35826 35827 35828 35829 35830 35831 35832 35833 35834 35835 35836 35837 35838 35839 35840 35841 35842 35843 35844 35845 35846 35847 35848 35849 35850 35851 35852 35853 35854 35855 35856 35857 35858 35859 35860 35861 35862 35863 35864 35865 35866 35867 35868 35869 35870 35871 35872 35873 35874 35875 35876 35877 35878 35879 35880 35881 35882 35883 35884 35885 35886 35887 35888 35889 35890 35891 35892 35893 35894 35895 35896 35897 35898 35899 35900 35901 35902 35903 35904 35905 35906 35907 35908 35909 35910 35911 35912 35913 35914 35915 35916 35917 35918 35919 35920 35921 35922 35923 35924 35925 35926 35927 35928 35929 35930 35931 35932 35933 35934 35935 35936 35937 35938 35939 35940 35941 35942 35943 35944 35945 35946 35947 35948 35949 35950 35951 35952 35953 35954 35955 35956 35957 35958 35959 35960 35961 35962 35963 35964 35965 35966 35967 35968 35969 35970 35971 35972 35973 35974 35975 35976 35977 35978 35979 35980 35981 35982 35983 35984 35985 35986 35987 35988 35989 35990 35991 35992 35993 35994 35995 35996 35997 35998 35999 36000 36001 36002 36003 36004 36005 36006 36007 36008 36009 36010 36011 36012 36013 36014 36015 36016 36017 36018 36019 36020 36021 36022 36023 36024 36025 36026 36027 36028 36029 36030 36031 36032 36033 36034 36035 36036 36037 36038 36039 36040 36041 36042 36043 36044 36045 36046 36047 36048 36049 36050 36051 36052 36053 36054 36055 36056 36057 36058 36059 36060 36061 36062 36063 36064 36065 36066 36067 36068 36069 36070 36071 36072 36073 36074 36075 36076 36077 36078 36079 36080 36081 36082 36083 36084 36085 36086 36087 36088 36089 36090 36091 36092 36093 36094 36095 36096 36097 36098 36099 36100 36101 36102 36103 36104 36105 36106 36107 36108 36109 36110 36111 36112 36113 36114 36115 36116 36117 36118 36119 36120 36121 36122 36123 36124 36125 36126 36127 36128 36129 36130 36131 36132 36133 36134 36135 36136 36137 36138 36139 36140 36141 36142 36143 36144 36145 36146 36147 36148 36149 36150 36151 36152 36153 36154 36155 36156 36157 36158 36159 36160 36161 36162 36163 36164 36165 36166 36167 36168 36169 36170 36171 36172 36173 36174 36175 36176 36177 36178 36179 36180 36181 36182 36183 36184 36185 36186 36187 36188 36189 36190 36191 36192 36193 36194 36195 36196 36197 36198 36199 36200 36201 36202 36203 36204 36205 36206 36207 36208 36209 36210 36211 36212 36213 36214 36215 36216 36217 36218 36219 36220 36221 36222 36223 36224 36225 36226 36227 36228 36229 36230 36231 36232 36233 36234 36235 36236 36237 36238 36239 36240 36241 36242 36243 36244 36245 36246 36247 36248 36249 36250 36251 36252 36253 36254 36255 36256 36257 36258 36259 36260 36261 36262 36263 36264 36265 36266 36267 36268 36269 36270 36271 36272 36273 36274 36275 36276 36277 36278 36279 36280 36281 36282 36283 36284 36285 36286 36287 36288 36289 36290 36291 36292 36293 36294 36295 36296 36297 36298 36299 36300 36301 36302 36303 36304 36305 36306 36307 36308 36309 36310 36311 36312 36313 36314 36315 36316 36317 36318 36319 36320 36321 36322 36323 36324 36325 36326 36327 36328 36329 36330 36331 36332 36333 36334 36335 36336 36337 36338 36339 36340 36341 36342 36343 36344 36345 36346 36347 36348 36349 36350 36351 36352 36353 36354 36355 36356 36357 36358 36359 36360 36361 36362 36363 36364 36365 36366 36367 36368 36369 36370 36371 36372 36373 36374 36375 36376 36377 36378 36379 36380 36381 36382 36383 36384 36385 36386 36387 36388 36389 36390 36391 36392 36393 36394 36395 36396 36397 36398 36399 36400 36401 36402 36403 36404 36405 36406 36407 36408 36409 36410 36411 36412 36413 36414 36415 36416 36417 36418 36419 36420 36421 36422 36423 36424 36425 36426 36427 36428 36429 36430 36431 36432 36433 36434 36435 36436 36437 36438 36439 36440 36441 36442 36443 36444 36445 36446 36447 36448 36449 36450 36451 36452 36453 36454 36455 36456 36457 36458 36459 36460 36461 36462 36463 36464 36465 36466 36467 36468 36469 36470 36471 36472 36473 36474 36475 36476 36477 36478 36479 36480 36481 36482 36483 36484 36485 36486 36487 36488 36489 36490 36491 36492 36493 36494 36495 36496 36497 36498 36499 36500 36501 36502 36503 36504 36505 36506 36507 36508 36509 36510 36511 36512 36513 36514 36515 36516 36517 36518 36519 36520 36521 36522 36523 36524 36525 36526 36527 36528 36529 36530 36531 36532 36533 36534 36535 36536 36537 36538 36539 36540 36541 36542 36543 36544 36545 36546 36547 36548 36549 36550 36551 36552 36553 36554 36555 36556 36557 36558 36559 36560 36561 36562 36563 36564 36565 36566 36567 36568 36569 36570 36571 36572 36573 36574 36575 36576 36577 36578 36579 36580 36581 36582 36583 36584 36585 36586 36587 36588 36589 36590 36591 36592 36593 36594 36595 36596 36597 36598 36599 36600 36601 36602 36603 36604 36605 36606 36607 36608 36609 36610 36611 36612 36613 36614 36615 36616 36617 36618 36619 36620 36621 36622 36623 36624 36625 36626 36627 36628 36629 36630 36631 36632 36633 36634 36635 36636 36637 36638 36639 36640 36641 36642 36643 36644 36645 36646 36647 36648 36649 36650 36651 36652 36653 36654 36655 36656 36657 36658 36659 36660 36661 36662 36663 36664 36665 36666 36667 36668 36669 36670 36671 36672 36673 36674 36675 36676 36677 36678 36679 36680 36681 36682 36683 36684 36685 36686 36687 36688 36689 36690 36691 36692 36693 36694 36695 36696 36697 36698 36699 36700 36701 36702 36703 36704 36705 36706 36707 36708 36709 36710 36711 36712 36713 36714 36715 36716 36717 36718 36719 36720 36721 36722 36723 36724 36725 36726 36727 36728 36729 36730 36731 36732 36733 36734 36735 36736 36737 36738 36739 36740 36741 36742 36743 36744 36745 36746 36747 36748 36749 36750 36751 36752 36753 36754 36755 36756 36757 36758 36759 36760 36761 36762 36763 36764 36765 36766 36767 36768 36769 36770 36771 36772 36773 36774 36775 36776 36777 36778 36779 36780 36781 36782 36783 36784 36785 36786 36787 36788 36789 36790 36791 36792 36793 36794 36795 36796 36797 36798 36799 36800 36801 36802 36803 36804 36805 36806 36807 36808 36809 36810 36811 36812 36813 36814 36815 36816 36817 36818 36819 36820 36821 36822 36823 36824 36825 36826 36827 36828 36829 36830 36831 36832 36833 36834 36835 36836 36837 36838 36839 36840 36841 36842 36843 36844 36845 36846 36847 36848 36849 36850 36851 36852 36853 36854 36855 36856 36857 36858 36859 36860 36861 36862 36863 36864 36865 36866 36867 36868 36869 36870 36871 36872 36873 36874 36875 36876 36877 36878 36879 36880 36881 36882 36883 36884 36885 36886 36887 36888 36889 36890 36891 36892 36893 36894 36895 36896 36897 36898 36899 36900 36901 36902 36903 36904 36905 36906 36907 36908 36909 36910 36911 36912 36913 36914 36915 36916 36917 36918 36919 36920 36921 36922 36923 36924 36925 36926 36927 36928 36929 36930 36931 36932 36933 36934 36935 36936 36937 36938 36939 36940 36941 36942 36943 36944 36945 36946 36947 36948 36949 36950 36951 36952 36953 36954 36955 36956 36957 36958 36959 36960 36961 36962 36963 36964 36965 36966 36967 36968 36969 36970 36971 36972 36973 36974 36975 36976 36977 36978 36979 36980 36981 36982 36983 36984 36985 36986 36987 36988 36989 36990 36991 36992 36993 36994 36995 36996 36997 36998 36999 37000 37001 37002 37003 37004 37005 37006 37007 37008 37009 37010 37011 37012 37013 37014 37015 37016 37017 37018 37019 37020 37021 37022 37023 37024 37025 37026 37027 37028 37029 37030 37031 37032 37033 37034 37035 37036 37037 37038 37039 37040 37041 37042 37043 37044 37045 37046 37047 37048 37049 37050 37051 37052 37053 37054 37055 37056 37057 37058 37059 37060 37061 37062 37063 37064 37065 37066 37067 37068 37069 37070 37071 37072 37073 37074 37075 37076 37077 37078 37079 37080 37081 37082 37083 37084 37085 37086 37087 37088 37089 37090 37091 37092 37093 37094 37095 37096 37097 37098 37099 37100 37101 37102 37103 37104 37105 37106 37107 37108 37109 37110 37111 37112 37113 37114 37115 37116 37117 37118 37119 37120 37121 37122 37123 37124 37125 37126 37127 37128 37129 37130 37131 37132 37133 37134 37135 37136 37137 37138 37139 37140 37141 37142 37143 37144 37145 37146 37147 37148 37149 37150 37151 37152 37153 37154 37155 37156 37157 37158 37159 37160 37161 37162 37163 37164 37165 37166 37167 37168 37169 37170 37171 37172 37173 37174 37175 37176 37177 37178 37179 37180 37181 37182 37183 37184 37185 37186 37187 37188 37189 37190 37191 37192 37193 37194 37195 37196 37197 37198 37199 37200 37201 37202 37203 37204 37205 37206 37207 37208 37209 37210 37211 37212 37213 37214 37215 37216 37217 37218 37219 37220 37221 37222 37223 37224 37225 37226 37227 37228 37229 37230 37231 37232 37233 37234 37235 37236 37237 37238 37239 37240 37241 37242 37243 37244 37245 37246 37247 37248 37249 37250 37251 37252 37253 37254 37255 37256 37257 37258 37259 37260 37261 37262 37263 37264 37265 37266 37267 37268 37269 37270 37271 37272 37273 37274 37275 37276 37277 37278 37279 37280 37281 37282 37283 37284 37285 37286 37287 37288 37289 37290 37291 37292 37293 37294 37295 37296 37297 37298 37299 37300 37301 37302 37303 37304 37305 37306 37307 37308 37309 37310 37311 37312 37313 37314 37315 37316 37317 37318 37319 37320 37321 37322 37323 37324 37325 37326 37327 37328 37329 37330 37331 37332 37333 37334 37335 37336 37337 37338 37339 37340 37341 37342 37343 37344 37345 37346 37347 37348 37349 37350 37351 37352 37353 37354 37355 37356 37357 37358 37359 37360 37361 37362 37363 37364 37365 37366 37367 37368 37369 37370 37371 37372 37373 37374 37375 37376 37377 37378 37379 37380 37381 37382 37383 37384 37385 37386 37387 37388 37389 37390 37391 37392 37393 37394 37395 37396 37397 37398 37399 37400 37401 37402 37403 37404 37405 37406 37407 37408 37409 37410 37411 37412 37413 37414 37415 37416 37417 37418 37419 37420 37421 37422 37423 37424 37425 37426 37427 37428 37429 37430 37431 37432 37433 37434 37435 37436 37437 37438 37439 37440 37441 37442 37443 37444 37445 37446 37447 37448 37449 37450 37451 37452 37453 37454 37455 37456 37457 37458 37459 37460 37461 37462 37463 37464 37465 37466 37467 37468 37469 37470 37471 37472 37473 37474 37475 37476 37477 37478 37479 37480 37481 37482 37483 37484 37485 37486 37487 37488 37489 37490 37491 37492 37493 37494 37495 37496 37497 37498 37499 37500 37501 37502 37503 37504 37505 37506 37507 37508 37509 37510 37511 37512 37513 37514 37515 37516 37517 37518 37519 37520 37521 37522 37523 37524 37525 37526 37527 37528 37529 37530 37531 37532 37533 37534 37535 37536 37537 37538 37539 37540 37541 37542 37543 37544 37545 37546 37547 37548 37549 37550 37551 37552 37553 37554 37555 37556 37557 37558 37559 37560 37561 37562 37563 37564 37565 37566 37567 37568 37569 37570 37571 37572 37573 37574 37575 37576 37577 37578 37579 37580 37581 37582 37583 37584 37585 37586 37587 37588 37589 37590 37591 37592 37593 37594 37595 37596 37597 37598 37599 37600 37601 37602 37603 37604 37605 37606 37607 37608 37609 37610 37611 37612 37613 37614 37615 37616 37617 37618 37619 37620 37621 37622 37623 37624 37625 37626 37627 37628 37629 37630 37631 37632 37633 37634 37635 37636 37637 37638 37639 37640 37641 37642 37643 37644 37645 37646 37647 37648 37649 37650 37651 37652 37653 37654 37655 37656 37657 37658 37659 37660 37661 37662 37663 37664 37665 37666 37667 37668 37669 37670 37671 37672 37673 37674 37675 37676 37677 37678 37679 37680 37681 37682 37683 37684 37685 37686 37687 37688 37689 37690 37691 37692 37693 37694 37695 37696 37697 37698 37699 37700 37701 37702 37703 37704 37705 37706 37707 37708 37709 37710 37711 37712 37713 37714 37715 37716 37717 37718 37719 37720 37721 37722 37723 37724 37725 37726 37727 37728 37729 37730 37731 37732 37733 37734 37735 37736 37737 37738 37739 37740 37741 37742 37743 37744 37745 37746 37747 37748 37749 37750 37751 37752 37753 37754 37755 37756 37757 37758 37759 37760 37761 37762 37763 37764 37765 37766 37767 37768 37769 37770 37771 37772 37773 37774 37775 37776 37777 37778 37779 37780 37781 37782 37783 37784 37785 37786 37787 37788 37789 37790 37791 37792 37793 37794 37795 37796 37797 37798 37799 37800 37801 37802 37803 37804 37805 37806 37807 37808 37809 37810 37811 37812 37813 37814 37815 37816 37817 37818 37819 37820 37821 37822 37823 37824 37825 37826 37827 37828 37829 37830 37831 37832 37833 37834 37835 37836 37837 37838 37839 37840 37841 37842 37843 37844 37845 37846 37847 37848 37849 37850 37851 37852 37853 37854 37855 37856 37857 37858 37859 37860 37861 37862 37863 37864 37865 37866 37867 37868 37869 37870 37871 37872 37873 37874 37875 37876 37877 37878 37879 37880 37881 37882 37883 37884 37885 37886 37887 37888 37889 37890 37891 37892 37893 37894 37895 37896 37897 37898 37899 37900 37901 37902 37903 37904 37905 37906 37907 37908 37909 37910 37911 37912 37913 37914 37915 37916 37917 37918 37919 37920 37921 37922 37923 37924 37925 37926 37927 37928 37929 37930 37931 37932 37933 37934 37935 37936 37937 37938 37939 37940 37941 37942 37943 37944 37945 37946 37947 37948 37949 37950 37951 37952 37953 37954 37955 37956 37957 37958 37959 37960 37961 37962 37963 37964 37965 37966 37967 37968 37969 37970 37971 37972 37973 37974 37975 37976 37977 37978 37979 37980 37981 37982 37983 37984 37985 37986 37987 37988 37989 37990 37991 37992 37993 37994 37995 37996 37997 37998 37999 38000 38001 38002 38003 38004 38005 38006 38007 38008 38009 38010 38011 38012 38013 38014 38015 38016 38017 38018 38019 38020 38021 38022 38023 38024 38025 38026 38027 38028 38029 38030 38031 38032 38033 38034 38035 38036 38037 38038 38039 38040 38041 38042 38043 38044 38045 38046 38047 38048 38049 38050 38051 38052 38053 38054 38055 38056 38057 38058 38059 38060 38061 38062 38063 38064 38065 38066 38067 38068 38069 38070 38071 38072 38073 38074 38075 38076 38077 38078 38079 38080 38081 38082 38083 38084 38085 38086 38087 38088 38089 38090 38091 38092 38093 38094 38095 38096 38097 38098 38099 38100 38101 38102 38103 38104 38105 38106 38107 38108 38109 38110 38111 38112 38113 38114 38115 38116 38117 38118 38119 38120 38121 38122 38123 38124 38125 38126 38127 38128 38129 38130 38131 38132 38133 38134 38135 38136 38137 38138 38139 38140 38141 38142 38143 38144 38145 38146 38147 38148 38149 38150 38151 38152 38153 38154 38155 38156 38157 38158 38159 38160 38161 38162 38163 38164 38165 38166 38167 38168 38169 38170 38171 38172 38173 38174 38175 38176 38177 38178 38179 38180 38181 38182 38183 38184 38185 38186 38187 38188 38189 38190 38191 38192 38193 38194 38195 38196 38197 38198 38199 38200 38201 38202 38203 38204 38205 38206 38207 38208 38209 38210 38211 38212 38213 38214 38215 38216 38217 38218 38219 38220 38221 38222 38223 38224 38225 38226 38227 38228 38229 38230 38231 38232 38233 38234 38235 38236 38237 38238 38239 38240 38241 38242 38243 38244 38245 38246 38247 38248 38249 38250 38251 38252 38253 38254 38255 38256 38257 38258 38259 38260 38261 38262 38263 38264 38265 38266 38267 38268 38269 38270 38271 38272 38273 38274 38275 38276 38277 38278 38279 38280 38281 38282 38283 38284 38285 38286 38287 38288 38289 38290 38291 38292 38293 38294 38295 38296 38297 38298 38299 38300 38301 38302 38303 38304 38305 38306 38307 38308 38309 38310 38311 38312 38313 38314 38315 38316 38317 38318 38319 38320 38321 38322 38323 38324 38325 38326 38327 38328 38329 38330 38331 38332 38333 38334 38335 38336 38337 38338 38339 38340 38341 38342 38343 38344 38345 38346 38347 38348 38349 38350 38351 38352 38353 38354 38355 38356 38357 38358 38359 38360 38361 38362 38363 38364 38365 38366 38367 38368 38369 38370 38371 38372 38373 38374 38375 38376 38377 38378 38379 38380 38381 38382 38383 38384 38385 38386 38387 38388 38389 38390 38391 38392 38393 38394 38395 38396 38397 38398 38399 38400 38401 38402 38403 38404 38405 38406 38407 38408 38409 38410 38411 38412 38413 38414 38415 38416 38417 38418 38419 38420 38421 38422 38423 38424 38425 38426 38427 38428 38429 38430 38431 38432 38433 38434 38435 38436 38437 38438 38439 38440 38441 38442 38443 38444 38445 38446 38447 38448 38449 38450 38451 38452 38453 38454 38455 38456 38457 38458 38459 38460 38461 38462 38463 38464 38465 38466 38467 38468 38469 38470 38471 38472 38473 38474 38475 38476 38477 38478 38479 38480 38481 38482 38483 38484 38485 38486 38487 38488 38489 38490 38491 38492 38493 38494 38495 38496 38497 38498 38499 38500 38501 38502 38503 38504 38505 38506 38507 38508 38509 38510 38511 38512 38513 38514 38515 38516 38517 38518 38519 38520 38521 38522 38523 38524 38525 38526 38527 38528 38529 38530 38531 38532 38533 38534 38535 38536 38537 38538 38539 38540 38541 38542 38543 38544 38545 38546 38547 38548 38549 38550 38551 38552 38553 38554 38555 38556 38557 38558 38559 38560 38561 38562 38563 38564 38565 38566 38567 38568 38569 38570 38571 38572 38573 38574 38575 38576 38577 38578 38579 38580 38581 38582 38583 38584 38585 38586 38587 38588 38589 38590 38591 38592 38593 38594 38595 38596 38597 38598 38599 38600 38601 38602 38603 38604 38605 38606 38607 38608 38609 38610 38611 38612 38613 38614 38615 38616 38617 38618 38619 38620 38621 38622 38623 38624 38625 38626 38627 38628 38629 38630 38631 38632 38633 38634 38635 38636 38637 38638 38639 38640 38641 38642 38643 38644 38645 38646 38647 38648 38649 38650 38651 38652 38653 38654 38655 38656 38657 38658 38659 38660 38661 38662 38663 38664 38665 38666 38667 38668 38669 38670 38671 38672 38673 38674 38675 38676 38677 38678 38679 38680 38681 38682 38683 38684 38685 38686 38687 38688 38689 38690 38691 38692 38693 38694 38695 38696 38697 38698 38699 38700 38701 38702 38703 38704 38705 38706 38707 38708 38709 38710 38711 38712 38713 38714 38715 38716 38717 38718 38719 38720 38721 38722 38723 38724 38725 38726 38727 38728 38729 38730 38731 38732 38733 38734 38735 38736 38737 38738 38739 38740 38741 38742 38743 38744 38745 38746 38747 38748 38749 38750 38751 38752 38753 38754 38755 38756 38757 38758 38759 38760 38761 38762 38763 38764 38765 38766 38767 38768 38769 38770 38771 38772 38773 38774 38775 38776 38777 38778 38779 38780 38781 38782 38783 38784 38785 38786 38787 38788 38789 38790 38791 38792 38793 38794 38795 38796 38797 38798 38799 38800 38801 38802 38803 38804 38805 38806 38807 38808 38809 38810 38811 38812 38813 38814 38815 38816 38817 38818 38819 38820 38821 38822 38823 38824 38825 38826 38827 38828 38829 38830 38831 38832 38833 38834 38835 38836 38837 38838 38839 38840 38841 38842 38843 38844 38845 38846 38847 38848 38849 38850 38851 38852 38853 38854 38855 38856 38857 38858 38859 38860 38861 38862 38863 38864 38865 38866 38867 38868 38869 38870 38871 38872 38873 38874 38875 38876 38877 38878 38879 38880 38881 38882 38883 38884 38885 38886 38887 38888 38889 38890 38891 38892 38893 38894 38895 38896 38897 38898 38899 38900 38901 38902 38903 38904 38905 38906 38907 38908 38909 38910 38911 38912 38913 38914 38915 38916 38917 38918 38919 38920 38921 38922 38923 38924 38925 38926 38927 38928 38929 38930 38931 38932 38933 38934 38935 38936 38937 38938 38939 38940 38941 38942 38943 38944 38945 38946 38947 38948 38949 38950 38951 38952 38953 38954 38955 38956 38957 38958 38959 38960 38961 38962 38963 38964 38965 38966 38967 38968 38969 38970 38971 38972 38973 38974 38975 38976 38977 38978 38979 38980 38981 38982 38983 38984 38985 38986 38987 38988 38989 38990 38991 38992 38993 38994 38995 38996 38997 38998 38999 39000 39001 39002 39003 39004 39005 39006 39007 39008 39009 39010 39011 39012 39013 39014 39015 39016 39017 39018 39019 39020 39021 39022 39023 39024 39025 39026 39027 39028 39029 39030 39031 39032 39033 39034 39035 39036 39037 39038 39039 39040 39041 39042 39043 39044 39045 39046 39047 39048 39049 39050 39051 39052 39053 39054 39055 39056 39057 39058 39059 39060 39061 39062 39063 39064 39065 39066 39067 39068 39069 39070 39071 39072 39073 39074 39075 39076 39077 39078 39079 39080 39081 39082 39083 39084 39085 39086 39087 39088 39089 39090 39091 39092 39093 39094 39095 39096 39097 39098 39099 39100 39101 39102 39103 39104 39105 39106 39107 39108 39109 39110 39111 39112 39113 39114 39115 39116 39117 39118 39119 39120 39121 39122 39123 39124 39125 39126 39127 39128 39129 39130 39131 39132 39133 39134 39135 39136 39137 39138 39139 39140 39141 39142 39143 39144 39145 39146 39147 39148 39149 39150 39151 39152 39153 39154 39155 39156 39157 39158 39159 39160 39161 39162 39163 39164 39165 39166 39167 39168 39169 39170 39171 39172 39173 39174 39175 39176 39177 39178 39179 39180 39181 39182 39183 39184 39185 39186 39187 39188 39189 39190 39191 39192 39193 39194 39195 39196 39197 39198 39199 39200 39201 39202 39203 39204 39205 39206 39207 39208 39209 39210 39211 39212 39213 39214 39215 39216 39217 39218 39219 39220 39221 39222 39223 39224 39225 39226 39227 39228 39229 39230 39231 39232 39233 39234 39235 39236 39237 39238 39239 39240 39241 39242 39243 39244 39245 39246 39247 39248 39249 39250 39251 39252 39253 39254 39255 39256 39257 39258 39259 39260 39261 39262 39263 39264 39265 39266 39267 39268 39269 39270 39271 39272 39273 39274 39275 39276 39277 39278 39279 39280 39281 39282 39283 39284 39285 39286 39287 39288 39289 39290 39291 39292 39293 39294 39295 39296 39297 39298 39299 39300 39301 39302 39303 39304 39305 39306 39307 39308 39309 39310 39311 39312 39313 39314 39315 39316 39317 39318 39319 39320 39321 39322 39323 39324 39325 39326 39327 39328 39329 39330 39331 39332 39333 39334 39335 39336 39337 39338 39339 39340 39341 39342 39343 39344 39345 39346 39347 39348 39349 39350 39351 39352 39353 39354 39355 39356 39357 39358 39359 39360 39361 39362 39363 39364 39365 39366 39367 39368 39369 39370 39371 39372 39373 39374 39375 39376 39377 39378 39379 39380 39381 39382 39383 39384 39385 39386 39387 39388 39389 39390 39391 39392 39393 39394 39395 39396 39397 39398 39399 39400 39401 39402 39403 39404 39405 39406 39407 39408 39409 39410 39411 39412 39413 39414 39415 39416 39417 39418 39419 39420 39421 39422 39423 39424 39425 39426 39427 39428 39429 39430 39431 39432 39433 39434 39435 39436 39437 39438 39439 39440 39441 39442 39443 39444 39445 39446 39447 39448 39449 39450 39451 39452 39453 39454 39455 39456 39457 39458 39459 39460 39461 39462 39463 39464 39465 39466 39467 39468 39469 39470 39471 39472 39473 39474 39475 39476 39477 39478 39479 39480 39481 39482 39483 39484 39485 39486 39487 39488 39489 39490 39491 39492 39493 39494 39495 39496 39497 39498 39499 39500 39501 39502 39503 39504 39505 39506 39507 39508 39509 39510 39511 39512 39513 39514 39515 39516 39517 39518 39519 39520 39521 39522 39523 39524 39525 39526 39527 39528 39529 39530 39531 39532 39533 39534 39535 39536 39537 39538 39539 39540 39541 39542 39543 39544 39545 39546 39547 39548 39549 39550 39551 39552 39553 39554 39555 39556 39557 39558 39559 39560 39561 39562 39563 39564 39565 39566 39567 39568 39569 39570 39571 39572 39573 39574 39575 39576 39577 39578 39579 39580 39581 39582 39583 39584 39585 39586 39587 39588 39589 39590 39591 39592 39593 39594 39595 39596 39597 39598 39599 39600 39601 39602 39603 39604 39605 39606 39607 39608 39609 39610 39611 39612 39613 39614 39615 39616 39617 39618 39619 39620 39621 39622 39623 39624 39625 39626 39627 39628 39629 39630 39631 39632 39633 39634 39635 39636 39637 39638 39639 39640 39641 39642 39643 39644 39645 39646 39647 39648 39649 39650 39651 39652 39653 39654 39655 39656 39657 39658 39659 39660 39661 39662 39663 39664 39665 39666 39667 39668 39669 39670 39671 39672 39673 39674 39675 39676 39677 39678 39679 39680 39681 39682 39683 39684 39685 39686 39687 39688 39689 39690 39691 39692 39693 39694 39695 39696 39697 39698 39699 39700 39701 39702 39703 39704 39705 39706 39707 39708 39709 39710 39711 39712 39713 39714 39715 39716 39717 39718 39719 39720 39721 39722 39723 39724 39725 39726 39727 39728 39729 39730 39731 39732 39733 39734 39735 39736 39737 39738 39739 39740 39741 39742 39743 39744 39745 39746 39747 39748 39749 39750 39751 39752 39753 39754 39755 39756 39757 39758 39759 39760 39761 39762 39763 39764 39765 39766 39767 39768 39769 39770 39771 39772 39773 39774 39775 39776 39777 39778 39779 39780 39781 39782 39783 39784 39785 39786 39787 39788 39789 39790 39791 39792 39793 39794 39795 39796 39797 39798 39799 39800 39801 39802 39803 39804 39805 39806 39807 39808 39809 39810 39811 39812 39813 39814 39815 39816 39817 39818 39819 39820 39821 39822 39823 39824 39825 39826 39827 39828 39829 39830 39831 39832 39833 39834 39835 39836 39837 39838 39839 39840 39841 39842 39843 39844 39845 39846 39847 39848 39849 39850 39851 39852 39853 39854 39855 39856 39857 39858 39859 39860 39861 39862 39863 39864 39865 39866 39867 39868 39869 39870 39871 39872 39873 39874 39875 39876 39877 39878 39879 39880 39881 39882 39883 39884 39885 39886 39887 39888 39889 39890 39891 39892 39893 39894 39895 39896 39897 39898 39899 39900 39901 39902 39903 39904 39905 39906 39907 39908 39909 39910 39911 39912 39913 39914 39915 39916 39917 39918 39919 39920 39921 39922 39923 39924 39925 39926 39927 39928 39929 39930 39931 39932 39933 39934 39935 39936 39937 39938 39939 39940 39941 39942 39943 39944 39945 39946 39947 39948 39949 39950 39951 39952 39953 39954 39955 39956 39957 39958 39959 39960 39961 39962 39963 39964 39965 39966 39967 39968 39969 39970 39971 39972 39973 39974 39975 39976 39977 39978 39979 39980 39981 39982 39983 39984 39985 39986 39987 39988 39989 39990 39991 39992 39993 39994 39995 39996 39997 39998 39999 40000 40001 40002 40003 40004 40005 40006 40007 40008 40009 40010 40011 40012 40013 40014 40015 40016 40017 40018 40019 40020 40021 40022 40023 40024 40025 40026 40027 40028 40029 40030 40031 40032 40033 40034 40035 40036 40037 40038 40039 40040 40041 40042 40043 40044 40045 40046 40047 40048 40049 40050 40051 40052 40053 40054 40055 40056 40057 40058 40059 40060 40061 40062 40063 40064 40065 40066 40067 40068 40069 40070 40071 40072 40073 40074 40075 40076 40077 40078 40079 40080 40081 40082 40083 40084 40085 40086 40087 40088 40089 40090 40091 40092 40093 40094 40095 40096 40097 40098 40099 40100 40101 40102 40103 40104 40105 40106 40107 40108 40109 40110 40111 40112 40113 40114 40115 40116 40117 40118 40119 40120 40121 40122 40123 40124 40125 40126 40127 40128 40129 40130 40131 40132 40133 40134 40135 40136 40137 40138 40139 40140 40141 40142 40143 40144 40145 40146 40147 40148 40149 40150 40151 40152 40153 40154 40155 40156 40157 40158 40159 40160 40161 40162 40163 40164 40165 40166 40167 40168 40169 40170 40171 40172 40173 40174 40175 40176 40177 40178 40179 40180 40181 40182 40183 40184 40185 40186 40187 40188 40189 40190 40191 40192 40193 40194 40195 40196 40197 40198 40199 40200 40201 40202 40203 40204 40205 40206 40207 40208 40209 40210 40211 40212 40213 40214 40215 40216 40217 40218 40219 40220 40221 40222 40223 40224 40225 40226 40227 40228 40229 40230 40231 40232 40233 40234 40235 40236 40237 40238 40239 40240 40241 40242 40243 40244 40245 40246 40247 40248 40249 40250 40251 40252 40253 40254 40255 40256 40257 40258 40259 40260 40261 40262 40263 40264 40265 40266 40267 40268 40269 40270 40271 40272 40273 40274 40275 40276 40277 40278 40279 40280 40281 40282 40283 40284 40285 40286 40287 40288 40289 40290 40291 40292 40293 40294 40295 40296 40297 40298 40299 40300 40301 40302 40303 40304 40305 40306 40307 40308 40309 40310 40311 40312 40313 40314 40315 40316 40317 40318 40319 40320 40321 40322 40323 40324 40325 40326 40327 40328 40329 40330 40331 40332 40333 40334 40335 40336 40337 40338 40339 40340 40341 40342 40343 40344 40345 40346 40347 40348 40349 40350 40351 40352 40353 40354 40355 40356 40357 40358 40359 40360 40361 40362 40363 40364 40365 40366 40367 40368 40369 40370 40371 40372 40373 40374 40375 40376 40377 40378 40379 40380 40381 40382 40383 40384 40385 40386 40387 40388 40389 40390 40391 40392 40393 40394 40395 40396 40397 40398 40399 40400 40401 40402 40403 40404 40405 40406 40407 40408 40409 40410 40411 40412 40413 40414 40415 40416 40417 40418 40419 40420 40421 40422 40423 40424 40425 40426 40427 40428 40429 40430 40431 40432 40433 40434 40435 40436 40437 40438 40439 40440 40441 40442 40443 40444 40445 40446 40447 40448 40449 40450 40451 40452 40453 40454 40455 40456 40457 40458 40459 40460 40461 40462 40463 40464 40465 40466 40467 40468 40469 40470 40471 40472 40473 40474 40475 40476 40477 40478 40479 40480 40481 40482 40483 40484 40485 40486 40487 40488 40489 40490 40491 40492 40493 40494 40495 40496 40497 40498 40499 40500 40501 40502 40503 40504 40505 40506 40507 40508 40509 40510 40511 40512 40513 40514 40515 40516 40517 40518 40519 40520 40521 40522 40523 40524 40525 40526 40527 40528 40529 40530 40531 40532 40533 40534 40535 40536 40537 40538 40539 40540 40541 40542 40543 40544 40545 40546 40547 40548 40549 40550 40551 40552 40553 40554 40555 40556 40557 40558 40559 40560 40561 40562 40563 40564 40565 40566 40567 40568 40569 40570 40571 40572 40573 40574 40575 40576 40577 40578 40579 40580 40581 40582 40583 40584 40585 40586 40587 40588 40589 40590 40591 40592 40593 40594 40595 40596 40597 40598 40599 40600 40601 40602 40603 40604 40605 40606 40607 40608 40609 40610 40611 40612 40613 40614 40615 40616 40617 40618 40619 40620 40621 40622 40623 40624 40625 40626 40627 40628 40629 40630 40631 40632 40633 40634 40635 40636 40637 40638 40639 40640 40641 40642 40643 40644 40645 40646 40647 40648 40649 40650 40651 40652 40653 40654 40655 40656 40657 40658 40659 40660 40661 40662 40663 40664 40665 40666 40667 40668 40669 40670 40671 40672 40673 40674 40675 40676 40677 40678 40679 40680 40681 40682 40683 40684 40685 40686 40687 40688 40689 40690 40691 40692 40693 40694 40695 40696 40697 40698 40699 40700 40701 40702 40703 40704 40705 40706 40707 40708 40709 40710 40711 40712 40713 40714 40715 40716 40717 40718 40719 40720 40721 40722 40723 40724 40725 40726 40727 40728 40729 40730 40731 40732 40733 40734 40735 40736 40737 40738 40739 40740 40741 40742 40743 40744 40745 40746 40747 40748 40749 40750 40751 40752 40753 40754 40755 40756 40757 40758 40759 40760 40761 40762 40763 40764 40765 40766 40767 40768 40769 40770 40771 40772 40773 40774 40775 40776 40777 40778 40779 40780 40781 40782 40783 40784 40785 40786 40787 40788 40789 40790 40791 40792 40793 40794 40795 40796 40797 40798 40799 40800 40801 40802 40803 40804 40805 40806 40807 40808 40809 40810 40811 40812 40813 40814 40815 40816 40817 40818 40819 40820 40821 40822 40823 40824 40825 40826 40827 40828 40829 40830 40831 40832 40833 40834 40835 40836 40837 40838 40839 40840 40841 40842 40843 40844 40845 40846 40847 40848 40849 40850 40851 40852 40853 40854 40855 40856 40857 40858 40859 40860 40861 40862 40863 40864 40865 40866 40867 40868 40869 40870 40871 40872 40873 40874 40875 40876 40877 40878 40879 40880 40881 40882 40883 40884 40885 40886 40887 40888 40889 40890 40891 40892 40893 40894 40895 40896 40897 40898 40899 40900 40901 40902 40903 40904 40905 40906 40907 40908 40909 40910 40911 40912 40913 40914 40915 40916 40917 40918 40919 40920 40921 40922 40923 40924 40925 40926 40927 40928 40929 40930 40931 40932 40933 40934 40935 40936 40937 40938 40939 40940 40941 40942 40943 40944 40945 40946 40947 40948 40949 40950 40951 40952 40953 40954 40955 40956 40957 40958 40959 40960 40961 40962 40963 40964 40965 40966 40967 40968 40969 40970 40971 40972 40973 40974 40975 40976 40977 40978 40979 40980 40981 40982 40983 40984 40985 40986 40987 40988 40989 40990 40991 40992 40993 40994 40995 40996 40997 40998 40999 41000 41001 41002 41003 41004 41005 41006 41007 41008 41009 41010 41011 41012 41013 41014 41015 41016 41017 41018 41019 41020 41021 41022 41023 41024 41025 41026 41027 41028 41029 41030 41031 41032 41033 41034 41035 41036 41037 41038 41039 41040 41041 41042 41043 41044 41045 41046 41047 41048 41049 41050 41051 41052 41053 41054 41055 41056 41057 41058 41059 41060 41061 41062 41063 41064 41065 41066 41067 41068 41069 41070 41071 41072 41073 41074 41075 41076 41077 41078 41079 41080 41081 41082 41083 41084 41085 41086 41087 41088 41089 41090 41091 41092 41093 41094 41095 41096 41097 41098 41099 41100 41101 41102 41103 41104 41105 41106 41107 41108 41109 41110 41111 41112 41113 41114 41115 41116 41117 41118 41119 41120 41121 41122 41123 41124 41125 41126 41127 41128 41129 41130 41131 41132 41133 41134 41135 41136 41137 41138 41139 41140 41141 41142 41143 41144 41145 41146 41147 41148 41149 41150 41151 41152 41153 41154 41155 41156 41157 41158 41159 41160 41161 41162 41163 41164 41165 41166 41167 41168 41169 41170 41171 41172 41173 41174 41175 41176 41177 41178 41179 41180 41181 41182 41183 41184 41185 41186 41187 41188 41189 41190 41191 41192 41193 41194 41195 41196 41197 41198 41199 41200 41201 41202 41203 41204 41205 41206 41207 41208 41209 41210 41211 41212 41213 41214 41215 41216 41217 41218 41219 41220 41221 41222 41223 41224 41225 41226 41227 41228 41229 41230 41231 41232 41233 41234 41235 41236 41237 41238 41239 41240 41241 41242 41243 41244 41245 41246 41247 41248 41249 41250 41251 41252 41253 41254 41255 41256 41257 41258 41259 41260 41261 41262 41263 41264 41265 41266 41267 41268 41269 41270 41271 41272 41273 41274 41275 41276 41277 41278 41279 41280 41281 41282 41283 41284 41285 41286 41287 41288 41289 41290 41291 41292 41293 41294 41295 41296 41297 41298 41299 41300 41301 41302 41303 41304 41305 41306 41307 41308 41309 41310 41311 41312 41313 41314 41315 41316 41317 41318 41319 41320 41321 41322 41323 41324 41325 41326 41327 41328 41329 41330 41331 41332 41333 41334 41335 41336 41337 41338 41339 41340 41341 41342 41343 41344 41345 41346 41347 41348 41349 41350 41351 41352 41353 41354 41355 41356 41357 41358 41359 41360 41361 41362 41363 41364 41365 41366 41367 41368 41369 41370 41371 41372 41373 41374 41375 41376 41377 41378 41379 41380 41381 41382 41383 41384 41385 41386 41387 41388 41389 41390 41391 41392 41393 41394 41395 41396 41397 41398 41399 41400 41401 41402 41403 41404 41405 41406 41407 41408 41409 41410 41411 41412 41413 41414 41415 41416 41417 41418 41419 41420 41421 41422 41423 41424 41425 41426 41427 41428 41429 41430 41431 41432 41433 41434 41435 41436 41437 41438 41439 41440 41441 41442 41443 41444 41445 41446 41447 41448 41449 41450 41451 41452 41453 41454 41455 41456 41457 41458 41459 41460 41461 41462 41463 41464 41465 41466 41467 41468 41469 41470 41471 41472 41473 41474 41475 41476 41477 41478 41479 41480 41481 41482 41483 41484 41485 41486 41487 41488 41489 41490 41491 41492 41493 41494 41495 41496 41497 41498 41499 41500 41501 41502 41503 41504 41505 41506 41507 41508 41509 41510 41511 41512 41513 41514 41515 41516 41517 41518 41519 41520 41521 41522 41523 41524 41525 41526 41527 41528 41529 41530 41531 41532 41533 41534 41535 41536 41537 41538 41539 41540 41541 41542 41543 41544 41545 41546 41547 41548 41549 41550 41551 41552 41553 41554 41555 41556 41557 41558 41559 41560 41561 41562 41563 41564 41565 41566 41567 41568 41569 41570 41571 41572 41573 41574 41575 41576 41577 41578 41579 41580 41581 41582 41583 41584 41585 41586 41587 41588 41589 41590 41591 41592 41593 41594 41595 41596 41597 41598 41599 41600 41601 41602 41603 41604 41605 41606 41607 41608 41609 41610 41611 41612 41613 41614 41615 41616 41617 41618 41619 41620 41621 41622 41623 41624 41625 41626 41627 41628 41629 41630 41631 41632 41633 41634 41635 41636 41637 41638 41639 41640 41641 41642 41643 41644 41645 41646 41647 41648 41649 41650 41651 41652 41653 41654 41655 41656 41657 41658 41659 41660 41661 41662 41663 41664 41665 41666 41667 41668 41669 41670 41671 41672 41673 41674 41675 41676 41677 41678 41679 41680 41681 41682 41683 41684 41685 41686 41687 41688 41689 41690 41691 41692 41693 41694 41695 41696 41697 41698 41699 41700 41701 41702 41703 41704 41705 41706 41707 41708 41709 41710 41711 41712 41713 41714 41715 41716 41717 41718 41719 41720 41721 41722 41723 41724 41725 41726 41727 41728 41729 41730 41731 41732 41733 41734 41735 41736 41737 41738 41739 41740 41741 41742 41743 41744 41745 41746 41747 41748 41749 41750 41751 41752 41753 41754 41755 41756 41757 41758 41759 41760 41761 41762 41763 41764 41765 41766 41767 41768 41769 41770 41771 41772 41773 41774 41775 41776 41777 41778 41779 41780 41781 41782 41783 41784 41785 41786 41787 41788 41789 41790 41791 41792 41793 41794 41795 41796 41797 41798 41799 41800 41801 41802 41803 41804 41805 41806 41807 41808 41809 41810 41811 41812 41813 41814 41815 41816 41817 41818 41819 41820 41821 41822 41823 41824 41825 41826 41827 41828 41829 41830 41831 41832 41833 41834 41835 41836 41837 41838 41839 41840 41841 41842 41843 41844 41845 41846 41847 41848 41849 41850 41851 41852 41853 41854 41855 41856 41857 41858 41859 41860 41861 41862 41863 41864 41865 41866 41867 41868 41869 41870 41871 41872 41873 41874 41875 41876 41877 41878 41879 41880 41881 41882 41883 41884 41885 41886 41887 41888 41889 41890 41891 41892 41893 41894 41895 41896 41897 41898 41899 41900 41901 41902 41903 41904 41905 41906 41907 41908 41909 41910 41911 41912 41913 41914 41915 41916 41917 41918 41919 41920 41921 41922 41923 41924 41925 41926 41927 41928 41929 41930 41931 41932 41933 41934 41935 41936 41937 41938 41939 41940 41941 41942 41943 41944 41945 41946 41947 41948 41949 41950 41951 41952 41953 41954 41955 41956 41957 41958 41959 41960 41961 41962 41963 41964 41965 41966 41967 41968 41969 41970 41971 41972 41973 41974 41975 41976 41977 41978 41979 41980 41981 41982 41983 41984 41985 41986 41987 41988 41989 41990 41991 41992 41993 41994 41995 41996 41997 41998 41999 42000 42001 42002 42003 42004 42005 42006 42007 42008 42009 42010 42011 42012 42013 42014 42015 42016 42017 42018 42019 42020 42021 42022 42023 42024 42025 42026 42027 42028 42029 42030 42031 42032 42033 42034 42035 42036 42037 42038 42039 42040 42041 42042 42043 42044 42045 42046 42047 42048 42049 42050 42051 42052 42053 42054 42055 42056 42057 42058 42059 42060 42061 42062 42063 42064 42065 42066 42067 42068 42069 42070 42071 42072 42073 42074 42075 42076 42077 42078 42079 42080 42081 42082 42083 42084 42085 42086 42087 42088 42089 42090 42091 42092 42093 42094 42095 42096 42097 42098 42099 42100 42101 42102 42103 42104 42105 42106 42107 42108 42109 42110 42111 42112 42113 42114 42115 42116 42117 42118 42119 42120 42121 42122 42123 42124 42125 42126 42127 42128 42129 42130 42131 42132 42133 42134 42135 42136 42137 42138 42139 42140 42141 42142 42143 42144 42145 42146 42147 42148 42149 42150 42151 42152 42153 42154 42155 42156 42157 42158 42159 42160 42161 42162 42163 42164 42165 42166 42167 42168 42169 42170 42171 42172 42173 42174 42175 42176 42177 42178 42179 42180 42181 42182 42183 42184 42185 42186 42187 42188 42189 42190 42191 42192 42193 42194 42195 42196 42197 42198 42199 42200 42201 42202 42203 42204 42205 42206 42207 42208 42209 42210 42211 42212 42213 42214 42215 42216 42217 42218 42219 42220 42221 42222 42223 42224 42225 42226 42227 42228 42229 42230 42231 42232 42233 42234 42235 42236 42237 42238 42239 42240 42241 42242 42243 42244 42245 42246 42247 42248 42249 42250 42251 42252 42253 42254 42255 42256 42257 42258 42259 42260 42261 42262 42263 42264 42265 42266 42267 42268 42269 42270 42271 42272 42273 42274 42275 42276 42277 42278 42279 42280 42281 42282 42283 42284 42285 42286 42287 42288 42289 42290 42291 42292 42293 42294 42295 42296 42297 42298 42299 42300 42301 42302 42303 42304 42305 42306 42307 42308 42309 42310 42311 42312 42313 42314 42315 42316 42317 42318 42319 42320 42321 42322 42323 42324 42325 42326 42327 42328 42329 42330 42331 42332 42333 42334 42335 42336 42337 42338 42339 42340 42341 42342 42343 42344 42345 42346 42347 42348 42349 42350 42351 42352 42353 42354 42355 42356 42357 42358 42359 42360 42361 42362 42363 42364 42365 42366 42367 42368 42369 42370 42371 42372 42373 42374 42375 42376 42377 42378 42379 42380 42381 42382 42383 42384 42385 42386 42387 42388 42389 42390 42391 42392 42393 42394 42395 42396 42397 42398 42399 42400 42401 42402 42403 42404 42405 42406 42407 42408 42409 42410 42411 42412 42413 42414 42415 42416 42417 42418 42419 42420 42421 42422 42423 42424 42425 42426 42427 42428 42429 42430 42431 42432 42433 42434 42435 42436 42437 42438 42439 42440 42441 42442 42443 42444 42445 42446 42447 42448 42449 42450 42451 42452 42453 42454 42455 42456 42457 42458 42459 42460 42461 42462 42463 42464 42465 42466 42467 42468 42469 42470 42471 42472 42473 42474 42475 42476 42477 42478 42479 42480 42481 42482 42483 42484 42485 42486 42487 42488 42489 42490 42491 42492 42493 42494 42495 42496 42497 42498 42499 42500 42501 42502 42503 42504 42505 42506 42507 42508 42509 42510 42511 42512 42513 42514 42515 42516 42517 42518 42519 42520 42521 42522 42523 42524 42525 42526 42527 42528 42529 42530 42531 42532 42533 42534 42535 42536 42537 42538 42539 42540 42541 42542 42543 42544 42545 42546 42547 42548 42549 42550 42551 42552 42553 42554 42555 42556 42557 42558 42559 42560 42561 42562 42563 42564 42565 42566 42567 42568 42569 42570 42571 42572 42573 42574 42575 42576 42577 42578 42579 42580 42581 42582 42583 42584 42585 42586 42587 42588 42589 42590 42591 42592 42593 42594 42595 42596 42597 42598 42599 42600 42601 42602 42603 42604 42605 42606 42607 42608 42609 42610 42611 42612 42613 42614 42615 42616 42617 42618 42619 42620 42621 42622 42623 42624 42625 42626 42627 42628 42629 42630 42631 42632 42633 42634 42635 42636 42637 42638 42639 42640 42641 42642 42643 42644 42645 42646 42647 42648 42649 42650 42651 42652 42653 42654 42655 42656 42657 42658 42659 42660 42661 42662 42663 42664 42665 42666 42667 42668 42669 42670 42671 42672 42673 42674 42675 42676 42677 42678 42679 42680 42681 42682 42683 42684 42685 42686 42687 42688 42689 42690 42691 42692 42693 42694 42695 42696 42697 42698 42699 42700 42701 42702 42703 42704 42705 42706 42707 42708 42709 42710 42711 42712 42713 42714 42715 42716 42717 42718 42719 42720 42721 42722 42723 42724 42725 42726 42727 42728 42729 42730 42731 42732 42733 42734 42735 42736 42737 42738 42739 42740 42741 42742 42743 42744 42745 42746 42747 42748 42749 42750 42751 42752 42753 42754 42755 42756 42757 42758 42759 42760 42761 42762 42763 42764 42765 42766 42767 42768 42769 42770 42771 42772 42773 42774 42775 42776 42777 42778 42779 42780 42781 42782 42783 42784 42785 42786 42787 42788 42789 42790 42791 42792 42793 42794 42795 42796 42797 42798 42799 42800 42801 42802 42803 42804 42805 42806 42807 42808 42809 42810 42811 42812 42813 42814 42815 42816 42817 42818 42819 42820 42821 42822 42823 42824 42825 42826 42827 42828 42829 42830 42831 42832 42833 42834 42835 42836 42837 42838 42839 42840 42841 42842 42843 42844 42845 42846 42847 42848 42849 42850 42851 42852 42853 42854 42855 42856 42857 42858 42859 42860 42861 42862 42863 42864 42865 42866 42867 42868 42869 42870 42871 42872 42873 42874 42875 42876 42877 42878 42879 42880 42881 42882 42883 42884 42885 42886 42887 42888 42889 42890 42891 42892 42893 42894 42895 42896 42897 42898 42899 42900 42901 42902 42903 42904 42905 42906 42907 42908 42909 42910 42911 42912 42913 42914 42915 42916 42917 42918 42919 42920 42921 42922 42923 42924 42925 42926 42927 42928 42929 42930 42931 42932 42933 42934 42935 42936 42937 42938 42939 42940 42941 42942 42943 42944 42945 42946 42947 42948 42949 42950 42951 42952 42953 42954 42955 42956 42957 42958 42959 42960 42961 42962 42963 42964 42965 42966 42967 42968 42969 42970 42971 42972 42973 42974 42975 42976 42977 42978 42979 42980 42981 42982 42983 42984 42985 42986 42987 42988 42989 42990 42991 42992 42993 42994 42995 42996 42997 42998 42999 43000 43001 43002 43003 43004 43005 43006 43007 43008 43009 43010 43011 43012 43013 43014 43015 43016 43017 43018 43019 43020 43021 43022 43023 43024 43025 43026 43027 43028 43029 43030 43031 43032 43033 43034 43035 43036 43037 43038 43039 43040 43041 43042 43043 43044 43045 43046 43047 43048 43049 43050 43051 43052 43053 43054 43055 43056 43057 43058 43059 43060 43061 43062 43063 43064 43065 43066 43067 43068 43069 43070 43071 43072 43073 43074 43075 43076 43077 43078 43079 43080 43081 43082 43083 43084 43085 43086 43087 43088 43089 43090 43091 43092 43093 43094 43095 43096 43097 43098 43099 43100 43101 43102 43103 43104 43105 43106 43107 43108 43109 43110 43111 43112 43113 43114 43115 43116 43117 43118 43119 43120 43121 43122 43123 43124 43125 43126 43127 43128 43129 43130 43131 43132 43133 43134 43135 43136 43137 43138 43139 43140 43141 43142 43143 43144 43145 43146 43147 43148 43149 43150 43151 43152 43153 43154 43155 43156 43157 43158 43159 43160 43161 43162 43163 43164 43165 43166 43167 43168 43169 43170 43171 43172 43173 43174 43175 43176 43177 43178 43179 43180 43181 43182 43183 43184 43185 43186 43187 43188 43189 43190 43191 43192 43193 43194 43195 43196 43197 43198 43199 43200 43201 43202 43203 43204 43205 43206 43207 43208 43209 43210 43211 43212 43213 43214 43215 43216 43217 43218 43219 43220 43221 43222 43223 43224 43225 43226 43227 43228 43229 43230 43231 43232 43233 43234 43235 43236 43237 43238 43239 43240 43241 43242 43243 43244 43245 43246 43247 43248 43249 43250 43251 43252 43253 43254 43255 43256 43257 43258 43259 43260 43261 43262 43263 43264 43265 43266 43267 43268 43269 43270 43271 43272 43273 43274 43275 43276 43277 43278 43279 43280 43281 43282 43283 43284 43285 43286 43287 43288 43289 43290 43291 43292 43293 43294 43295 43296 43297 43298 43299 43300 43301 43302 43303 43304 43305 43306 43307 43308 43309 43310 43311 43312 43313 43314 43315 43316 43317 43318 43319 43320 43321 43322 43323 43324 43325 43326 43327 43328 43329 43330 43331 43332 43333 43334 43335 43336 43337 43338 43339 43340 43341 43342 43343 43344 43345 43346 43347 43348 43349 43350 43351 43352 43353 43354 43355 43356 43357 43358 43359 43360 43361 43362 43363 43364 43365 43366 43367 43368 43369 43370 43371 43372 43373 43374 43375 43376 43377 43378 43379 43380 43381 43382 43383 43384 43385 43386 43387 43388 43389 43390 43391 43392 43393 43394 43395 43396 43397 43398 43399 43400 43401 43402 43403 43404 43405 43406 43407 43408 43409 43410 43411 43412 43413 43414 43415 43416 43417 43418 43419 43420 43421 43422 43423 43424 43425 43426 43427 43428 43429 43430 43431 43432 43433 43434 43435 43436 43437 43438 43439 43440 43441 43442 43443 43444 43445 43446 43447 43448 43449 43450 43451 43452 43453 43454 43455 43456 43457 43458 43459 43460 43461 43462 43463 43464 43465 43466 43467 43468 43469 43470 43471 43472 43473 43474 43475 43476 43477 43478 43479 43480 43481 43482 43483 43484 43485 43486 43487 43488 43489 43490 43491 43492 43493 43494 43495 43496 43497 43498 43499 43500 43501 43502 43503 43504 43505 43506 43507 43508 43509 43510 43511 43512 43513 43514 43515 43516 43517 43518 43519 43520 43521 43522 43523 43524 43525 43526 43527 43528 43529 43530 43531 43532 43533 43534 43535 43536 43537 43538 43539 43540 43541 43542 43543 43544 43545 43546 43547 43548 43549 43550 43551 43552 43553 43554 43555 43556 43557 43558 43559 43560 43561 43562 43563 43564 43565 43566 43567 43568 43569 43570 43571 43572 43573 43574 43575 43576 43577 43578 43579 43580 43581 43582 43583 43584 43585 43586 43587 43588 43589 43590 43591 43592 43593 43594 43595 43596 43597 43598 43599 43600 43601 43602 43603 43604 43605 43606 43607 43608 43609 43610 43611 43612 43613 43614 43615 43616 43617 43618 43619 43620 43621 43622 43623 43624 43625 43626 43627 43628 43629 43630 43631 43632 43633 43634 43635 43636 43637 43638 43639 43640 43641 43642 43643 43644 43645 43646 43647 43648 43649 43650 43651 43652 43653 43654 43655 43656 43657 43658 43659 43660 43661 43662 43663 43664 43665 43666 43667 43668 43669 43670 43671 43672 43673 43674 43675 43676 43677 43678 43679 43680 43681 43682 43683 43684 43685 43686 43687 43688 43689 43690 43691 43692 43693 43694 43695 43696 43697 43698 43699 43700 43701 43702 43703 43704 43705 43706 43707 43708 43709 43710 43711 43712 43713 43714 43715 43716 43717 43718 43719 43720 43721 43722 43723 43724 43725 43726 43727 43728 43729 43730 43731 43732 43733 43734 43735 43736 43737 43738 43739 43740 43741 43742 43743 43744 43745 43746 43747 43748 43749 43750 43751 43752 43753 43754 43755 43756 43757 43758 43759 43760 43761 43762 43763 43764 43765 43766 43767 43768 43769 43770 43771 43772 43773 43774 43775 43776 43777 43778 43779 43780 43781 43782 43783 43784 43785 43786 43787 43788 43789 43790 43791 43792 43793 43794 43795 43796 43797 43798 43799 43800 43801 43802 43803 43804 43805 43806 43807 43808 43809 43810 43811 43812 43813 43814 43815 43816 43817 43818 43819 43820 43821 43822 43823 43824 43825 43826 43827 43828 43829 43830 43831 43832 43833 43834 43835 43836 43837 43838 43839 43840 43841 43842 43843 43844 43845 43846 43847 43848 43849 43850 43851 43852 43853 43854 43855 43856 43857 43858 43859 43860 43861 43862 43863 43864 43865 43866 43867 43868 43869 43870 43871 43872 43873 43874 43875 43876 43877 43878 43879 43880 43881 43882 43883 43884 43885 43886 43887 43888 43889 43890 43891 43892 43893 43894 43895 43896 43897 43898 43899 43900 43901 43902 43903 43904 43905 43906 43907 43908 43909 43910 43911 43912 43913 43914 43915 43916 43917 43918 43919 43920 43921 43922 43923 43924 43925 43926 43927 43928 43929 43930 43931 43932 43933 43934 43935 43936 43937 43938 43939 43940 43941 43942 43943 43944 43945 43946 43947 43948 43949 43950 43951 43952 43953 43954 43955 43956 43957 43958 43959 43960 43961 43962 43963 43964 43965 43966 43967 43968 43969 43970 43971 43972 43973 43974 43975 43976 43977 43978 43979 43980 43981 43982 43983 43984 43985 43986 43987 43988 43989 43990 43991 43992 43993 43994 43995 43996 43997 43998 43999 44000 44001 44002 44003 44004 44005 44006 44007 44008 44009 44010 44011 44012 44013 44014 44015 44016 44017 44018 44019 44020 44021 44022 44023 44024 44025 44026 44027 44028 44029 44030 44031 44032 44033 44034 44035 44036 44037 44038 44039 44040 44041 44042 44043 44044 44045 44046 44047 44048 44049 44050 44051 44052 44053 44054 44055 44056 44057 44058 44059 44060 44061 44062 44063 44064 44065 44066 44067 44068 44069 44070 44071 44072 44073 44074 44075 44076 44077 44078 44079 44080 44081 44082 44083 44084 44085 44086 44087 44088 44089 44090 44091 44092 44093 44094 44095 44096 44097 44098 44099 44100 44101 44102 44103 44104 44105 44106 44107 44108 44109 44110 44111 44112 44113 44114 44115 44116 44117 44118 44119 44120 44121 44122 44123 44124 44125 44126 44127 44128 44129 44130 44131 44132 44133 44134 44135 44136 44137 44138 44139 44140 44141 44142 44143 44144 44145 44146 44147 44148 44149 44150 44151 44152 44153 44154 44155 44156 44157 44158 44159 44160 44161 44162 44163 44164 44165 44166 44167 44168 44169 44170 44171 44172 44173 44174 44175 44176 44177 44178 44179 44180 44181 44182 44183 44184 44185 44186 44187 44188 44189 44190 44191 44192 44193 44194 44195 44196 44197 44198 44199 44200 44201 44202 44203 44204 44205 44206 44207 44208 44209 44210 44211 44212 44213 44214 44215 44216 44217 44218 44219 44220 44221 44222 44223 44224 44225 44226 44227 44228 44229 44230 44231 44232 44233 44234 44235 44236 44237 44238 44239 44240 44241 44242 44243 44244 44245 44246 44247 44248 44249 44250 44251 44252 44253 44254 44255 44256 44257 44258 44259 44260 44261 44262 44263 44264 44265 44266 44267 44268 44269 44270 44271 44272 44273 44274 44275 44276 44277 44278 44279 44280 44281 44282 44283 44284 44285 44286 44287 44288 44289 44290 44291 44292 44293 44294 44295 44296 44297 44298 44299 44300 44301 44302 44303 44304 44305 44306 44307 44308 44309 44310 44311 44312 44313 44314 44315 44316 44317 44318 44319 44320 44321 44322 44323 44324 44325 44326 44327 44328 44329 44330 44331 44332 44333 44334 44335 44336 44337 44338 44339 44340 44341 44342 44343 44344 44345 44346 44347 44348 44349 44350 44351 44352 44353 44354 44355 44356 44357 44358 44359 44360 44361 44362 44363 44364 44365 44366 44367 44368 44369 44370 44371 44372 44373 44374 44375 44376 44377 44378 44379 44380 44381 44382 44383 44384 44385 44386 44387 44388 44389 44390 44391 44392 44393 44394 44395 44396 44397 44398 44399 44400 44401 44402 44403 44404 44405 44406 44407 44408 44409 44410 44411 44412 44413 44414 44415 44416 44417 44418 44419 44420 44421 44422 44423 44424 44425 44426 44427 44428 44429 44430 44431 44432 44433 44434 44435 44436 44437 44438 44439 44440 44441 44442 44443 44444 44445 44446 44447 44448 44449 44450 44451 44452 44453 44454 44455 44456 44457 44458 44459 44460 44461 44462 44463 44464 44465 44466 44467 44468 44469 44470 44471 44472 44473 44474 44475 44476 44477 44478 44479 44480 44481 44482 44483 44484 44485 44486 44487 44488 44489 44490 44491 44492 44493 44494 44495 44496 44497 44498 44499 44500 44501 44502 44503 44504 44505 44506 44507 44508 44509 44510 44511 44512 44513 44514 44515 44516 44517 44518 44519 44520 44521 44522 44523 44524 44525 44526 44527 44528 44529 44530 44531 44532 44533 44534 44535 44536 44537 44538 44539 44540 44541 44542 44543 44544 44545 44546 44547 44548 44549 44550 44551 44552 44553 44554 44555 44556 44557 44558 44559 44560 44561 44562 44563 44564 44565 44566 44567 44568 44569 44570 44571 44572 44573 44574 44575 44576 44577 44578 44579 44580 44581 44582 44583 44584 44585 44586 44587 44588 44589 44590 44591 44592 44593 44594 44595 44596 44597 44598 44599 44600 44601 44602 44603 44604 44605 44606 44607 44608 44609 44610 44611 44612 44613 44614 44615 44616 44617 44618 44619 44620 44621 44622 44623 44624 44625 44626 44627 44628 44629 44630 44631 44632 44633 44634 44635 44636 44637 44638 44639 44640 44641 44642 44643 44644 44645 44646 44647 44648 44649 44650 44651 44652 44653 44654 44655 44656 44657 44658 44659 44660 44661 44662 44663 44664 44665 44666 44667 44668 44669 44670 44671 44672 44673 44674 44675 44676 44677 44678 44679 44680 44681 44682 44683 44684 44685 44686 44687 44688 44689 44690 44691 44692 44693 44694 44695 44696 44697 44698 44699 44700 44701 44702 44703 44704 44705 44706 44707 44708 44709 44710 44711 44712 44713 44714 44715 44716 44717 44718 44719 44720 44721 44722 44723 44724 44725 44726 44727 44728 44729 44730 44731 44732 44733 44734 44735 44736 44737 44738 44739 44740 44741 44742 44743 44744 44745 44746 44747 44748 44749 44750 44751 44752 44753 44754 44755 44756 44757 44758 44759 44760 44761 44762 44763 44764 44765 44766 44767 44768 44769 44770 44771 44772 44773 44774 44775 44776 44777 44778 44779 44780 44781 44782 44783 44784 44785 44786 44787 44788 44789 44790 44791 44792 44793 44794 44795 44796 44797 44798 44799 44800 44801 44802 44803 44804 44805 44806 44807 44808 44809 44810 44811 44812 44813 44814 44815 44816 44817 44818 44819 44820 44821 44822 44823 44824 44825 44826 44827 44828 44829 44830 44831 44832 44833 44834 44835 44836 44837 44838 44839 44840 44841 44842 44843 44844 44845 44846 44847 44848 44849 44850 44851 44852 44853 44854 44855 44856 44857 44858 44859 44860 44861 44862 44863 44864 44865 44866 44867 44868 44869 44870 44871 44872 44873 44874 44875 44876 44877 44878 44879 44880 44881 44882 44883 44884 44885 44886 44887 44888 44889 44890 44891 44892 44893 44894 44895 44896 44897 44898 44899 44900 44901 44902 44903 44904 44905 44906 44907 44908 44909 44910 44911 44912 44913 44914 44915 44916 44917 44918 44919 44920 44921 44922 44923 44924 44925 44926 44927 44928 44929 44930 44931 44932 44933 44934 44935 44936 44937 44938 44939 44940 44941 44942 44943 44944 44945 44946 44947 44948 44949 44950 44951 44952 44953 44954 44955 44956 44957 44958 44959 44960 44961 44962 44963 44964 44965 44966 44967 44968 44969 44970 44971 44972 44973 44974 44975 44976 44977 44978 44979 44980 44981 44982 44983 44984 44985 44986 44987 44988 44989 44990 44991 44992 44993 44994 44995 44996 44997 44998 44999 45000 45001 45002 45003 45004 45005 45006 45007 45008 45009 45010 45011 45012 45013 45014 45015 45016 45017 45018 45019 45020 45021 45022 45023 45024 45025 45026 45027 45028 45029 45030 45031 45032 45033 45034 45035 45036 45037 45038 45039 45040 45041 45042 45043 45044 45045 45046 45047 45048 45049 45050 45051 45052 45053 45054 45055 45056 45057 45058 45059 45060 45061 45062 45063 45064 45065 45066 45067 45068 45069 45070 45071 45072 45073 45074 45075 45076 45077 45078 45079 45080 45081 45082 45083 45084 45085 45086 45087 45088 45089 45090 45091 45092 45093 45094 45095 45096 45097 45098 45099 45100 45101 45102 45103 45104 45105 45106 45107 45108 45109 45110 45111 45112 45113 45114 45115 45116 45117 45118 45119 45120 45121 45122 45123 45124 45125 45126 45127 45128 45129 45130 45131 45132 45133 45134 45135 45136 45137 45138 45139 45140 45141 45142 45143 45144 45145 45146 45147 45148 45149 45150 45151 45152 45153 45154 45155 45156 45157 45158 45159 45160 45161 45162 45163 45164 45165 45166 45167 45168 45169 45170 45171 45172 45173 45174 45175 45176 45177 45178 45179 45180 45181 45182 45183 45184 45185 45186 45187 45188 45189 45190 45191 45192 45193 45194 45195 45196 45197 45198 45199 45200 45201 45202 45203 45204 45205 45206 45207 45208 45209 45210 45211 45212 45213 45214 45215 45216 45217 45218 45219 45220 45221 45222 45223 45224 45225 45226 45227 45228 45229 45230 45231 45232 45233 45234 45235 45236 45237 45238 45239 45240 45241 45242 45243 45244 45245 45246 45247 45248 45249 45250 45251 45252 45253 45254 45255 45256 45257 45258 45259 45260 45261 45262 45263 45264 45265 45266 45267 45268 45269 45270 45271 45272 45273 45274 45275 45276 45277 45278 45279 45280 45281 45282 45283 45284 45285 45286 45287 45288 45289 45290 45291 45292 45293 45294 45295 45296 45297 45298 45299 45300 45301 45302 45303 45304 45305 45306 45307 45308 45309 45310 45311 45312 45313 45314 45315 45316 45317 45318 45319 45320 45321 45322 45323 45324 45325 45326 45327 45328 45329 45330 45331 45332 45333 45334 45335 45336 45337 45338 45339 45340 45341 45342 45343 45344 45345 45346 45347 45348 45349 45350 45351 45352 45353 45354 45355 45356 45357 45358 45359 45360 45361 45362 45363 45364 45365 45366 45367 45368 45369 45370 45371 45372 45373 45374 45375 45376 45377 45378 45379 45380 45381 45382 45383 45384 45385 45386 45387 45388 45389 45390 45391 45392 45393 45394 45395 45396 45397 45398 45399 45400 45401 45402 45403 45404 45405 45406 45407 45408 45409 45410 45411 45412 45413 45414 45415 45416 45417 45418 45419 45420 45421 45422 45423 45424 45425 45426 45427 45428 45429 45430 45431 45432 45433 45434 45435 45436 45437 45438 45439 45440 45441 45442 45443 45444 45445 45446 45447 45448 45449 45450 45451 45452 45453 45454 45455 45456 45457 45458 45459 45460 45461 45462 45463 45464 45465 45466 45467 45468 45469 45470 45471 45472 45473 45474 45475 45476 45477 45478 45479 45480 45481 45482 45483 45484 45485 45486 45487 45488 45489 45490 45491 45492 45493 45494 45495 45496 45497 45498 45499 45500 45501 45502 45503 45504 45505 45506 45507 45508 45509 45510 45511 45512 45513 45514 45515 45516 45517 45518 45519 45520 45521 45522 45523 45524 45525 45526 45527 45528 45529 45530 45531 45532 45533 45534 45535 45536 45537 45538 45539 45540 45541 45542 45543 45544 45545 45546 45547 45548 45549 45550 45551 45552 45553 45554 45555 45556 45557 45558 45559 45560 45561 45562 45563 45564 45565 45566 45567 45568 45569 45570 45571 45572 45573 45574 45575 45576 45577 45578 45579 45580 45581 45582 45583 45584 45585 45586 45587 45588 45589 45590 45591 45592 45593 45594 45595 45596 45597 45598 45599 45600 45601 45602 45603 45604 45605 45606 45607 45608 45609 45610 45611 45612 45613 45614 45615 45616 45617 45618 45619 45620 45621 45622 45623 45624 45625 45626 45627 45628 45629 45630 45631 45632 45633 45634 45635 45636 45637 45638 45639 45640 45641 45642 45643 45644 45645 45646 45647 45648 45649 45650 45651 45652 45653 45654 45655 45656 45657 45658 45659 45660 45661 45662 45663 45664 45665 45666 45667 45668 45669 45670 45671 45672 45673 45674 45675 45676 45677 45678 45679 45680 45681 45682 45683 45684 45685 45686 45687 45688 45689 45690 45691 45692 45693 45694 45695 45696 45697 45698 45699 45700 45701 45702 45703 45704 45705 45706 45707 45708 45709 45710 45711 45712 45713 45714 45715 45716 45717 45718 45719 45720 45721 45722 45723 45724 45725 45726 45727 45728 45729 45730 45731 45732 45733 45734 45735 45736 45737 45738 45739 45740 45741 45742 45743 45744 45745 45746 45747 45748 45749 45750 45751 45752 45753 45754 45755 45756 45757 45758 45759 45760 45761 45762 45763 45764 45765 45766 45767 45768 45769 45770 45771 45772 45773 45774 45775 45776 45777 45778 45779 45780 45781 45782 45783 45784 45785 45786 45787 45788 45789 45790 45791 45792 45793 45794 45795 45796 45797 45798 45799 45800 45801 45802 45803 45804 45805 45806 45807 45808 45809 45810 45811 45812 45813 45814 45815 45816 45817 45818 45819 45820 45821 45822 45823 45824 45825 45826 45827 45828 45829 45830 45831 45832 45833 45834 45835 45836 45837 45838 45839 45840 45841 45842 45843 45844 45845 45846 45847 45848 45849 45850 45851 45852 45853 45854 45855 45856 45857 45858 45859 45860 45861 45862 45863 45864 45865 45866 45867 45868 45869 45870 45871 45872 45873 45874 45875 45876 45877 45878 45879 45880 45881 45882 45883 45884 45885 45886 45887 45888 45889 45890 45891 45892 45893 45894 45895 45896 45897 45898 45899 45900 45901 45902 45903 45904 45905 45906 45907 45908 45909 45910 45911 45912 45913 45914 45915 45916 45917 45918 45919 45920 45921 45922 45923 45924 45925 45926 45927 45928 45929 45930 45931 45932 45933 45934 45935 45936 45937 45938 45939 45940 45941 45942 45943 45944 45945 45946 45947 45948 45949 45950 45951 45952 45953 45954 45955 45956 45957 45958 45959 45960 45961 45962 45963 45964 45965 45966 45967 45968 45969 45970 45971 45972 45973 45974 45975 45976 45977 45978 45979 45980 45981 45982 45983 45984 45985 45986 45987 45988 45989 45990 45991 45992 45993 45994 45995 45996 45997 45998 45999 46000 46001 46002 46003 46004 46005 46006 46007 46008 46009 46010 46011 46012 46013 46014 46015 46016 46017 46018 46019 46020 46021 46022 46023 46024 46025 46026 46027 46028 46029 46030 46031 46032 46033 46034 46035 46036 46037 46038 46039 46040 46041 46042 46043 46044 46045 46046 46047 46048 46049 46050 46051 46052 46053 46054 46055 46056 46057 46058 46059 46060 46061 46062 46063 46064 46065 46066 46067 46068 46069 46070 46071 46072 46073 46074 46075 46076 46077 46078 46079 46080 46081 46082 46083 46084 46085 46086 46087 46088 46089 46090 46091 46092 46093 46094 46095 46096 46097 46098 46099 46100 46101 46102 46103 46104 46105 46106 46107 46108 46109 46110 46111 46112 46113 46114 46115 46116 46117 46118 46119 46120 46121 46122 46123 46124 46125 46126 46127 46128 46129 46130 46131 46132 46133 46134 46135 46136 46137 46138 46139 46140 46141 46142 46143 46144 46145 46146 46147 46148 46149 46150 46151 46152 46153 46154 46155 46156 46157 46158 46159 46160 46161 46162 46163 46164 46165 46166 46167 46168 46169 46170 46171 46172 46173 46174 46175 46176 46177 46178 46179 46180 46181 46182 46183 46184 46185 46186 46187 46188 46189 46190 46191 46192 46193 46194 46195 46196 46197 46198 46199 46200 46201 46202 46203 46204 46205 46206 46207 46208 46209 46210 46211 46212 46213 46214 46215 46216 46217 46218 46219 46220 46221 46222 46223 46224 46225 46226 46227 46228 46229 46230 46231 46232 46233 46234 46235 46236 46237 46238 46239 46240 46241 46242 46243 46244 46245 46246 46247 46248 46249 46250 46251 46252 46253 46254 46255 46256 46257 46258 46259 46260 46261 46262 46263 46264 46265 46266 46267 46268 46269 46270 46271 46272 46273 46274 46275 46276 46277 46278 46279 46280 46281 46282 46283 46284 46285 46286 46287 46288 46289 46290 46291 46292 46293 46294 46295 46296 46297 46298 46299 46300 46301 46302 46303 46304 46305 46306 46307 46308 46309 46310 46311 46312 46313 46314 46315 46316 46317 46318 46319 46320 46321 46322 46323 46324 46325 46326 46327 46328 46329 46330 46331 46332 46333 46334 46335 46336 46337 46338 46339 46340 46341 46342 46343 46344 46345 46346 46347 46348 46349 46350 46351 46352 46353 46354 46355 46356 46357 46358 46359 46360 46361 46362 46363 46364 46365 46366 46367 46368 46369 46370 46371 46372 46373 46374 46375 46376 46377 46378 46379 46380 46381 46382 46383 46384 46385 46386 46387 46388 46389 46390 46391 46392 46393 46394 46395 46396 46397 46398 46399 46400 46401 46402 46403 46404 46405 46406 46407 46408 46409 46410 46411 46412 46413 46414 46415 46416 46417 46418 46419 46420 46421 46422 46423 46424 46425 46426 46427 46428 46429 46430 46431 46432 46433 46434 46435 46436 46437 46438 46439 46440 46441 46442 46443 46444 46445 46446 46447 46448 46449 46450 46451 46452 46453 46454 46455 46456 46457 46458 46459 46460 46461 46462 46463 46464 46465 46466 46467 46468 46469 46470 46471 46472 46473 46474 46475 46476 46477 46478 46479 46480 46481 46482 46483 46484 46485 46486 46487 46488 46489 46490 46491 46492 46493 46494 46495 46496 46497 46498 46499 46500 46501 46502 46503 46504 46505 46506 46507 46508 46509 46510 46511 46512 46513 46514 46515 46516 46517 46518 46519 46520 46521 46522 46523 46524 46525 46526 46527 46528 46529 46530 46531 46532 46533 46534 46535 46536 46537 46538 46539 46540 46541 46542 46543 46544 46545 46546 46547 46548 46549 46550 46551 46552 46553 46554 46555 46556 46557 46558 46559 46560 46561 46562 46563 46564 46565 46566 46567 46568 46569 46570 46571 46572 46573 46574 46575 46576 46577 46578 46579 46580 46581 46582 46583 46584 46585 46586 46587 46588 46589 46590 46591 46592 46593 46594 46595 46596 46597 46598 46599 46600 46601 46602 46603 46604 46605 46606 46607 46608 46609 46610 46611 46612 46613 46614 46615 46616 46617 46618 46619 46620 46621 46622 46623 46624 46625 46626 46627 46628 46629 46630 46631 46632 46633 46634 46635 46636 46637 46638 46639 46640 46641 46642 46643 46644 46645 46646 46647 46648 46649 46650 46651 46652 46653 46654 46655 46656 46657 46658 46659 46660 46661 46662 46663 46664 46665 46666 46667 46668 46669 46670 46671 46672 46673 46674 46675 46676 46677 46678 46679 46680 46681 46682 46683 46684 46685 46686 46687 46688 46689 46690 46691 46692 46693 46694 46695 46696 46697 46698 46699 46700 46701 46702 46703 46704 46705 46706 46707 46708 46709 46710 46711 46712 46713 46714 46715 46716 46717 46718 46719 46720 46721 46722 46723 46724 46725 46726 46727 46728 46729 46730 46731 46732 46733 46734 46735 46736 46737 46738 46739 46740 46741 46742 46743 46744 46745 46746 46747 46748 46749 46750 46751 46752 46753 46754 46755 46756 46757 46758 46759 46760 46761 46762 46763 46764 46765 46766 46767 46768 46769 46770 46771 46772 46773 46774 46775 46776 46777 46778 46779 46780 46781 46782 46783 46784 46785 46786 46787 46788 46789 46790 46791 46792 46793 46794 46795 46796 46797 46798 46799 46800 46801 46802 46803 46804 46805 46806 46807 46808 46809 46810 46811 46812 46813 46814 46815 46816 46817 46818 46819 46820 46821 46822 46823 46824 46825 46826 46827 46828 46829 46830 46831 46832 46833 46834 46835 46836 46837 46838 46839 46840 46841 46842 46843 46844 46845 46846 46847 46848 46849 46850 46851 46852 46853 46854 46855 46856 46857 46858 46859 46860 46861 46862 46863 46864 46865 46866 46867 46868 46869 46870 46871 46872 46873 46874 46875 46876 46877 46878 46879 46880 46881 46882 46883 46884 46885 46886 46887 46888 46889 46890 46891 46892 46893 46894 46895 46896 46897 46898 46899 46900 46901 46902 46903 46904 46905 46906 46907 46908 46909 46910 46911 46912 46913 46914 46915 46916 46917 46918 46919 46920 46921 46922 46923 46924 46925 46926 46927 46928 46929 46930 46931 46932 46933 46934 46935 46936 46937 46938 46939 46940 46941 46942 46943 46944 46945 46946 46947 46948 46949 46950 46951 46952 46953 46954 46955 46956 46957 46958 46959 46960 46961 46962 46963 46964 46965 46966 46967 46968 46969 46970 46971 46972 46973 46974 46975 46976 46977 46978 46979 46980 46981 46982 46983 46984 46985 46986 46987 46988 46989 46990 46991 46992 46993 46994 46995 46996 46997 46998 46999 47000 47001 47002 47003 47004 47005 47006 47007 47008 47009 47010 47011 47012 47013 47014 47015 47016 47017 47018 47019 47020 47021 47022 47023 47024 47025 47026 47027 47028 47029 47030 47031 47032 47033 47034 47035 47036 47037 47038 47039 47040 47041 47042 47043 47044 47045 47046 47047 47048 47049 47050 47051 47052 47053 47054 47055 47056 47057 47058 47059 47060 47061 47062 47063 47064 47065 47066 47067 47068 47069 47070 47071 47072 47073 47074 47075 47076 47077 47078 47079 47080 47081 47082 47083 47084 47085 47086 47087 47088 47089 47090 47091 47092 47093 47094 47095 47096 47097 47098 47099 47100 47101 47102 47103 47104 47105 47106 47107 47108 47109 47110 47111 47112 47113 47114 47115 47116 47117 47118 47119 47120 47121 47122 47123 47124 47125 47126 47127 47128 47129 47130 47131 47132 47133 47134 47135 47136 47137 47138 47139 47140 47141 47142 47143 47144 47145 47146 47147 47148 47149 47150 47151 47152 47153 47154 47155 47156 47157 47158 47159 47160 47161 47162 47163 47164 47165 47166 47167 47168 47169 47170 47171 47172 47173 47174 47175 47176 47177 47178 47179 47180 47181 47182 47183 47184 47185 47186 47187 47188 47189 47190 47191 47192 47193 47194 47195 47196 47197 47198 47199 47200 47201 47202 47203 47204 47205 47206 47207 47208 47209 47210 47211 47212 47213 47214 47215 47216 47217 47218 47219 47220 47221 47222 47223 47224 47225 47226 47227 47228 47229 47230 47231 47232 47233 47234 47235 47236 47237 47238 47239 47240 47241 47242 47243 47244 47245 47246 47247 47248 47249 47250 47251 47252 47253 47254 47255 47256 47257 47258 47259 47260 47261 47262 47263 47264 47265 47266 47267 47268 47269 47270 47271 47272 47273 47274 47275 47276 47277 47278 47279 47280 47281 47282 47283 47284 47285 47286 47287 47288 47289 47290 47291 47292 47293 47294 47295 47296 47297 47298 47299 47300 47301 47302 47303 47304 47305 47306 47307 47308 47309 47310 47311 47312 47313 47314 47315 47316 47317 47318 47319 47320 47321 47322 47323 47324 47325 47326 47327 47328 47329 47330 47331 47332 47333 47334 47335 47336 47337 47338 47339 47340 47341 47342 47343 47344 47345 47346 47347 47348 47349 47350 47351 47352 47353 47354 47355 47356 47357 47358 47359 47360 47361 47362 47363 47364 47365 47366 47367 47368 47369 47370 47371 47372 47373 47374 47375 47376 47377 47378 47379 47380 47381 47382 47383 47384 47385 47386 47387 47388 47389 47390 47391 47392 47393 47394 47395 47396 47397 47398 47399 47400 47401 47402 47403 47404 47405 47406 47407 47408 47409 47410 47411 47412 47413 47414 47415 47416 47417 47418 47419 47420 47421 47422 47423 47424 47425 47426 47427 47428 47429 47430 47431 47432 47433 47434 47435 47436 47437 47438 47439 47440 47441 47442 47443 47444 47445 47446 47447 47448 47449 47450 47451 47452 47453 47454 47455 47456 47457 47458 47459 47460 47461 47462 47463 47464 47465 47466 47467 47468 47469 47470 47471 47472 47473 47474 47475 47476 47477 47478 47479 47480 47481 47482 47483 47484 47485 47486 47487 47488 47489 47490 47491 47492 47493 47494 47495 47496 47497 47498 47499 47500 47501 47502 47503 47504 47505 47506 47507 47508 47509 47510 47511 47512 47513 47514 47515 47516 47517 47518 47519 47520 47521 47522 47523 47524 47525 47526 47527 47528 47529 47530 47531 47532 47533 47534 47535 47536 47537 47538 47539 47540 47541 47542 47543 47544 47545 47546 47547 47548 47549 47550 47551 47552 47553 47554 47555 47556 47557 47558 47559 47560 47561 47562 47563 47564 47565 47566 47567 47568 47569 47570 47571 47572 47573 47574 47575 47576 47577 47578 47579 47580 47581 47582 47583 47584 47585 47586 47587 47588 47589 47590 47591 47592 47593 47594 47595 47596 47597 47598 47599 47600 47601 47602 47603 47604 47605 47606 47607 47608 47609 47610 47611 47612 47613 47614 47615 47616 47617 47618 47619 47620 47621 47622 47623 47624 47625 47626 47627 47628 47629 47630 47631 47632 47633 47634 47635 47636 47637 47638 47639 47640 47641 47642 47643 47644 47645 47646 47647 47648 47649 47650 47651 47652 47653 47654 47655 47656 47657 47658 47659 47660 47661 47662 47663 47664 47665 47666 47667 47668 47669 47670 47671 47672 47673 47674 47675 47676 47677 47678 47679 47680 47681 47682 47683 47684 47685 47686 47687 47688 47689 47690 47691 47692 47693 47694 47695 47696 47697 47698 47699 47700 47701 47702 47703 47704 47705 47706 47707 47708 47709 47710 47711 47712 47713 47714 47715 47716 47717 47718 47719 47720 47721 47722 47723 47724 47725 47726 47727 47728 47729 47730 47731 47732 47733 47734 47735 47736 47737 47738 47739 47740 47741 47742 47743 47744 47745 47746 47747 47748 47749 47750 47751 47752 47753 47754 47755 47756 47757 47758 47759 47760 47761 47762 47763 47764 47765 47766 47767 47768 47769 47770 47771 47772 47773 47774 47775 47776 47777 47778 47779 47780 47781 47782 47783 47784 47785 47786 47787 47788 47789 47790 47791 47792 47793 47794 47795 47796 47797 47798 47799 47800 47801 47802 47803 47804 47805 47806 47807 47808 47809 47810 47811 47812 47813 47814 47815 47816 47817 47818 47819 47820 47821 47822 47823 47824 47825 47826 47827 47828 47829 47830 47831 47832 47833 47834 47835 47836 47837 47838 47839 47840 47841 47842 47843 47844 47845 47846 47847 47848 47849 47850 47851 47852 47853 47854 47855 47856 47857 47858 47859 47860 47861 47862 47863 47864 47865 47866 47867 47868 47869 47870 47871 47872 47873 47874 47875 47876 47877 47878 47879 47880 47881 47882 47883 47884 47885 47886 47887 47888 47889 47890 47891 47892 47893 47894 47895 47896 47897 47898 47899 47900 47901 47902 47903 47904 47905 47906 47907 47908 47909 47910 47911 47912 47913 47914 47915 47916 47917 47918 47919 47920 47921 47922 47923 47924 47925 47926 47927 47928 47929 47930 47931 47932 47933 47934 47935 47936 47937 47938 47939 47940 47941 47942 47943 47944 47945 47946 47947 47948 47949 47950 47951 47952 47953 47954 47955 47956 47957 47958 47959 47960 47961 47962 47963 47964 47965 47966 47967 47968 47969 47970 47971 47972 47973 47974 47975 47976 47977 47978 47979 47980 47981 47982 47983 47984 47985 47986 47987 47988 47989 47990 47991 47992 47993 47994 47995 47996 47997 47998 47999 48000 48001 48002 48003 48004 48005 48006 48007 48008 48009 48010 48011 48012 48013 48014 48015 48016 48017 48018 48019 48020 48021 48022 48023 48024 48025 48026 48027 48028 48029 48030 48031 48032 48033 48034 48035 48036 48037 48038 48039 48040 48041 48042 48043 48044 48045 48046 48047 48048 48049 48050 48051 48052 48053 48054 48055 48056 48057 48058 48059 48060 48061 48062 48063 48064 48065 48066 48067 48068 48069 48070 48071 48072 48073 48074 48075 48076 48077 48078 48079 48080 48081 48082 48083 48084 48085 48086 48087 48088 48089 48090 48091 48092 48093 48094 48095 48096 48097 48098 48099 48100 48101 48102 48103 48104 48105 48106 48107 48108 48109 48110 48111 48112 48113 48114 48115 48116 48117 48118 48119 48120 48121 48122 48123 48124 48125 48126 48127 48128 48129 48130 48131 48132 48133 48134 48135 48136 48137 48138 48139 48140 48141 48142 48143 48144 48145 48146 48147 48148 48149 48150 48151 48152 48153 48154 48155 48156 48157 48158 48159 48160 48161 48162 48163 48164 48165 48166 48167 48168 48169 48170 48171 48172 48173 48174 48175 48176 48177 48178 48179 48180 48181 48182 48183 48184 48185 48186 48187 48188 48189 48190 48191 48192 48193 48194 48195 48196 48197 48198 48199 48200 48201 48202 48203 48204 48205 48206 48207 48208 48209 48210 48211 48212 48213 48214 48215 48216 48217 48218 48219 48220 48221 48222 48223 48224 48225 48226 48227 48228 48229 48230 48231 48232 48233 48234 48235 48236 48237 48238 48239 48240 48241 48242 48243 48244 48245 48246 48247 48248 48249 48250 48251 48252 48253 48254 48255 48256 48257 48258 48259 48260 48261 48262 48263 48264 48265 48266 48267 48268 48269 48270 48271 48272 48273 48274 48275 48276 48277 48278 48279 48280 48281 48282 48283 48284 48285 48286 48287 48288 48289 48290 48291 48292 48293 48294 48295 48296 48297 48298 48299 48300 48301 48302 48303 48304 48305 48306 48307 48308 48309 48310 48311 48312 48313 48314 48315 48316 48317 48318 48319 48320 48321 48322 48323 48324 48325 48326 48327 48328 48329 48330 48331 48332 48333 48334 48335 48336 48337 48338 48339 48340 48341 48342 48343 48344 48345 48346 48347 48348 48349 48350 48351 48352 48353 48354 48355 48356 48357 48358 48359 48360 48361 48362 48363 48364 48365 48366 48367 48368 48369 48370 48371 48372 48373 48374 48375 48376 48377 48378 48379 48380 48381 48382 48383 48384 48385 48386 48387 48388 48389 48390 48391 48392 48393 48394 48395 48396 48397 48398 48399 48400 48401 48402 48403 48404 48405 48406 48407 48408 48409 48410 48411 48412 48413 48414 48415 48416 48417 48418 48419 48420 48421 48422 48423 48424 48425 48426 48427 48428 48429 48430 48431 48432 48433 48434 48435 48436 48437 48438 48439 48440 48441 48442 48443 48444 48445 48446 48447 48448 48449 48450 48451 48452 48453 48454 48455 48456 48457 48458 48459 48460 48461 48462 48463 48464 48465 48466 48467 48468 48469 48470 48471 48472 48473 48474 48475 48476 48477 48478 48479 48480 48481 48482 48483 48484 48485 48486 48487 48488 48489 48490 48491 48492 48493 48494 48495 48496 48497 48498 48499 48500 48501 48502 48503 48504 48505 48506 48507 48508 48509 48510 48511 48512 48513 48514 48515 48516 48517 48518 48519 48520 48521 48522 48523 48524 48525 48526 48527 48528 48529 48530 48531 48532 48533 48534 48535 48536 48537 48538 48539 48540 48541 48542 48543 48544 48545 48546 48547 48548 48549 48550 48551 48552 48553 48554 48555 48556 48557 48558 48559 48560 48561 48562 48563 48564 48565 48566 48567 48568 48569 48570 48571 48572 48573 48574 48575 48576 48577 48578 48579 48580 48581 48582 48583 48584 48585 48586 48587 48588 48589 48590 48591 48592 48593 48594 48595 48596 48597 48598 48599 48600 48601 48602 48603 48604 48605 48606 48607 48608 48609 48610 48611 48612 48613 48614 48615 48616 48617 48618 48619 48620 48621 48622 48623 48624 48625 48626 48627 48628 48629 48630 48631 48632 48633 48634 48635 48636 48637 48638 48639 48640 48641 48642 48643 48644 48645 48646 48647 48648 48649 48650 48651 48652 48653 48654 48655 48656 48657 48658 48659 48660 48661 48662 48663 48664 48665 48666 48667 48668 48669 48670 48671 48672 48673 48674 48675 48676 48677 48678 48679 48680 48681 48682 48683 48684 48685 48686 48687 48688 48689 48690 48691 48692 48693 48694 48695 48696 48697 48698 48699 48700 48701 48702 48703 48704 48705 48706 48707 48708 48709 48710 48711 48712 48713 48714 48715 48716 48717 48718 48719 48720 48721 48722 48723 48724 48725 48726 48727 48728 48729 48730 48731 48732 48733 48734 48735 48736 48737 48738 48739 48740 48741 48742 48743 48744 48745 48746 48747 48748 48749 48750 48751 48752 48753 48754 48755 48756 48757 48758 48759 48760 48761 48762 48763 48764 48765 48766 48767 48768 48769 48770 48771 48772 48773 48774 48775 48776 48777 48778 48779 48780 48781 48782 48783 48784 48785 48786 48787 48788 48789 48790 48791 48792 48793 48794 48795 48796 48797 48798 48799 48800 48801 48802 48803 48804 48805 48806 48807 48808 48809 48810 48811 48812 48813 48814 48815 48816 48817 48818 48819 48820 48821 48822 48823 48824 48825 48826 48827 48828 48829 48830 48831 48832 48833 48834 48835 48836 48837 48838 48839 48840 48841 48842 48843 48844 48845 48846 48847 48848 48849 48850 48851 48852 48853 48854 48855 48856 48857 48858 48859 48860 48861 48862 48863 48864 48865 48866 48867 48868 48869 48870 48871 48872 48873 48874 48875 48876 48877 48878 48879 48880 48881 48882 48883 48884 48885 48886 48887 48888 48889 48890 48891 48892 48893 48894 48895 48896 48897 48898 48899 48900 48901 48902 48903 48904 48905 48906 48907 48908 48909 48910 48911 48912 48913 48914 48915 48916 48917 48918 48919 48920 48921 48922 48923 48924 48925 48926 48927 48928 48929 48930 48931 48932 48933 48934 48935 48936 48937 48938 48939 48940 48941 48942 48943 48944 48945 48946 48947 48948 48949 48950 48951 48952 48953 48954 48955 48956 48957 48958 48959 48960 48961 48962 48963 48964 48965 48966 48967 48968 48969 48970 48971 48972 48973 48974 48975 48976 48977 48978 48979 48980 48981 48982 48983 48984 48985 48986 48987 48988 48989 48990 48991 48992 48993 48994 48995 48996 48997 48998 48999 49000 49001 49002 49003 49004 49005 49006 49007 49008 49009 49010 49011 49012 49013 49014 49015 49016 49017 49018 49019 49020 49021 49022 49023 49024 49025 49026 49027 49028 49029 49030 49031 49032 49033 49034 49035 49036 49037 49038 49039 49040 49041 49042 49043 49044 49045 49046 49047 49048 49049 49050 49051 49052 49053 49054 49055 49056 49057 49058 49059 49060 49061 49062 49063 49064 49065 49066 49067 49068 49069 49070 49071 49072 49073 49074 49075 49076 49077 49078 49079 49080 49081 49082 49083 49084 49085 49086 49087 49088 49089 49090 49091 49092 49093 49094 49095 49096 49097 49098 49099 49100 49101 49102 49103 49104 49105 49106 49107 49108 49109 49110 49111 49112 49113 49114 49115 49116 49117 49118 49119 49120 49121 49122 49123 49124 49125 49126 49127 49128 49129 49130 49131 49132 49133 49134 49135 49136 49137 49138 49139 49140 49141 49142 49143 49144 49145 49146 49147 49148 49149 49150 49151 49152 49153 49154 49155 49156 49157 49158 49159 49160 49161 49162 49163 49164 49165 49166 49167 49168 49169 49170 49171 49172 49173 49174 49175 49176 49177 49178 49179 49180 49181 49182 49183 49184 49185 49186 49187 49188 49189 49190 49191 49192 49193 49194 49195 49196 49197 49198 49199 49200 49201 49202 49203 49204 49205 49206 49207 49208 49209 49210 49211 49212 49213 49214 49215 49216 49217 49218 49219 49220 49221 49222 49223 49224 49225 49226 49227 49228 49229 49230 49231 49232 49233 49234 49235 49236 49237 49238 49239 49240 49241 49242 49243 49244 49245 49246 49247 49248 49249 49250 49251 49252 49253 49254 49255 49256 49257 49258 49259 49260 49261 49262 49263 49264 49265 49266 49267 49268 49269 49270 49271 49272 49273 49274 49275 49276 49277 49278 49279 49280 49281 49282 49283 49284 49285 49286 49287 49288 49289 49290 49291 49292 49293 49294 49295 49296 49297 49298 49299 49300 49301 49302 49303 49304 49305 49306 49307 49308 49309 49310 49311 49312 49313 49314 49315 49316 49317 49318 49319 49320 49321 49322 49323 49324 49325 49326 49327 49328 49329 49330 49331 49332 49333 49334 49335 49336 49337 49338 49339 49340 49341 49342 49343 49344 49345 49346 49347 49348 49349 49350 49351 49352 49353 49354 49355 49356 49357 49358 49359 49360 49361 49362 49363 49364 49365 49366 49367 49368 49369 49370 49371 49372 49373 49374 49375 49376 49377 49378 49379 49380 49381 49382 49383 49384 49385 49386 49387 49388 49389 49390 49391 49392 49393 49394 49395 49396 49397 49398 49399 49400 49401 49402 49403 49404 49405 49406 49407 49408 49409 49410 49411 49412 49413 49414 49415 49416 49417 49418 49419 49420 49421 49422 49423 49424 49425 49426 49427 49428 49429 49430 49431 49432 49433 49434 49435 49436 49437 49438 49439 49440 49441 49442 49443 49444 49445 49446 49447 49448 49449 49450 49451 49452 49453 49454 49455 49456 49457 49458 49459 49460 49461 49462 49463 49464 49465 49466 49467 49468 49469 49470 49471 49472 49473 49474 49475 49476 49477 49478 49479 49480 49481 49482 49483 49484 49485 49486 49487 49488 49489 49490 49491 49492 49493 49494 49495 49496 49497 49498 49499 49500 49501 49502 49503 49504 49505 49506 49507 49508 49509 49510 49511 49512 49513 49514 49515 49516 49517 49518 49519 49520 49521 49522 49523 49524 49525 49526 49527 49528 49529 49530 49531 49532 49533 49534 49535 49536 49537 49538 49539 49540 49541 49542 49543 49544 49545 49546 49547 49548 49549 49550 49551 49552 49553 49554 49555 49556 49557 49558 49559 49560 49561 49562 49563 49564 49565 49566 49567 49568 49569 49570 49571 49572 49573 49574 49575 49576 49577 49578 49579 49580 49581 49582 49583 49584 49585 49586 49587 49588 49589 49590 49591 49592 49593 49594 49595 49596 49597 49598 49599 49600 49601 49602 49603 49604 49605 49606 49607 49608 49609 49610 49611 49612 49613 49614 49615 49616 49617 49618 49619 49620 49621 49622 49623 49624 49625 49626 49627 49628 49629 49630 49631 49632 49633 49634 49635 49636 49637 49638 49639 49640 49641 49642 49643 49644 49645 49646 49647 49648 49649 49650 49651 49652 49653 49654 49655 49656 49657 49658 49659 49660 49661 49662 49663 49664 49665 49666 49667 49668 49669 49670 49671 49672 49673 49674 49675 49676 49677 49678 49679 49680 49681 49682 49683 49684 49685 49686 49687 49688 49689 49690 49691 49692 49693 49694 49695 49696 49697 49698 49699 49700 49701 49702 49703 49704 49705 49706 49707 49708 49709 49710 49711 49712 49713 49714 49715 49716 49717 49718 49719 49720 49721 49722 49723 49724 49725 49726 49727 49728 49729 49730 49731 49732 49733 49734 49735 49736 49737 49738 49739 49740 49741 49742 49743 49744 49745 49746 49747 49748 49749 49750 49751 49752 49753 49754 49755 49756 49757 49758 49759 49760 49761 49762 49763 49764 49765 49766 49767 49768 49769 49770 49771 49772 49773 49774 49775 49776 49777 49778 49779 49780 49781 49782 49783 49784 49785 49786 49787 49788 49789 49790 49791 49792 49793 49794 49795 49796 49797 49798 49799 49800 49801 49802 49803 49804 49805 49806 49807 49808 49809 49810 49811 49812 49813 49814 49815 49816 49817 49818 49819 49820 49821 49822 49823 49824 49825 49826 49827 49828 49829 49830 49831 49832 49833 49834 49835 49836 49837 49838 49839 49840 49841 49842 49843 49844 49845 49846 49847 49848 49849 49850 49851 49852 49853 49854 49855 49856 49857 49858 49859 49860 49861 49862 49863 49864 49865 49866 49867 49868 49869 49870 49871 49872 49873 49874 49875 49876 49877 49878 49879 49880 49881 49882 49883 49884 49885 49886 49887 49888 49889 49890 49891 49892 49893 49894 49895 49896 49897 49898 49899 49900 49901 49902 49903 49904 49905 49906 49907 49908 49909 49910 49911 49912 49913 49914 49915 49916 49917 49918 49919 49920 49921 49922 49923 49924 49925 49926 49927 49928 49929 49930 49931 49932 49933 49934 49935 49936 49937 49938 49939 49940 49941 49942 49943 49944 49945 49946 49947 49948 49949 49950 49951 49952 49953 49954 49955 49956 49957 49958 49959 49960 49961 49962 49963 49964 49965 49966 49967 49968 49969 49970 49971 49972 49973 49974 49975 49976 49977 49978 49979 49980 49981 49982 49983 49984 49985 49986 49987 49988 49989 49990 49991 49992 49993 49994 49995 49996 49997 49998 49999 50000 50001 50002 50003 50004 50005 50006 50007 50008 50009 50010 50011 50012 50013 50014 50015 50016 50017 50018 50019 50020 50021 50022 50023 50024 50025 50026 50027 50028 50029 50030 50031 50032 50033 50034 50035 50036 50037 50038 50039 50040 50041 50042 50043 50044 50045 50046 50047 50048 50049 50050 50051 50052 50053 50054 50055 50056 50057 50058 50059 50060 50061 50062 50063 50064 50065 50066 50067 50068 50069 50070 50071 50072 50073 50074 50075 50076 50077 50078 50079 50080 50081 50082 50083 50084 50085 50086 50087 50088 50089 50090 50091 50092 50093 50094 50095 50096 50097 50098 50099 50100 50101 50102 50103 50104 50105 50106 50107 50108 50109 50110 50111 50112 50113 50114 50115 50116 50117 50118 50119 50120 50121 50122 50123 50124 50125 50126 50127 50128 50129 50130 50131 50132 50133 50134 50135 50136 50137 50138 50139 50140 50141 50142 50143 50144 50145 50146 50147 50148 50149 50150 50151 50152 50153 50154 50155 50156 50157 50158 50159 50160 50161 50162 50163 50164 50165 50166 50167 50168 50169 50170 50171 50172 50173 50174 50175 50176 50177 50178 50179 50180 50181 50182 50183 50184 50185 50186 50187 50188 50189 50190 50191 50192 50193 50194 50195 50196 50197 50198 50199 50200 50201 50202 50203 50204 50205 50206 50207 50208 50209 50210 50211 50212 50213 50214 50215 50216 50217 50218 50219 50220 50221 50222 50223 50224 50225 50226 50227 50228 50229 50230 50231 50232 50233 50234 50235 50236 50237 50238 50239 50240 50241 50242 50243 50244 50245 50246 50247 50248 50249 50250 50251 50252 50253 50254 50255 50256 50257 50258 50259 50260 50261 50262 50263 50264 50265 50266 50267 50268 50269 50270 50271 50272 50273 50274 50275 50276 50277 50278 50279 50280 50281 50282 50283 50284 50285 50286 50287 50288 50289 50290 50291 50292 50293 50294 50295 50296 50297 50298 50299 50300 50301 50302 50303 50304 50305 50306 50307 50308 50309 50310 50311 50312 50313 50314 50315 50316 50317 50318 50319 50320 50321 50322 50323 50324 50325 50326 50327 50328 50329 50330 50331 50332 50333 50334 50335 50336 50337 50338 50339 50340 50341 50342 50343 50344 50345 50346 50347 50348 50349 50350 50351 50352 50353 50354 50355 50356 50357 50358 50359 50360 50361 50362 50363 50364 50365 50366 50367 50368 50369 50370 50371 50372 50373 50374 50375 50376 50377 50378 50379 50380 50381 50382 50383 50384 50385 50386 50387 50388 50389 50390 50391 50392 50393 50394 50395 50396 50397 50398 50399 50400 50401 50402 50403 50404 50405 50406 50407 50408 50409 50410 50411 50412 50413 50414 50415 50416 50417 50418 50419 50420 50421 50422 50423 50424 50425 50426 50427 50428 50429 50430 50431 50432 50433 50434 50435 50436 50437 50438 50439 50440 50441 50442 50443 50444 50445 50446 50447 50448 50449 50450 50451 50452 50453 50454 50455 50456 50457 50458 50459 50460 50461 50462 50463 50464 50465 50466 50467 50468 50469 50470 50471 50472 50473 50474 50475 50476 50477 50478 50479 50480 50481 50482 50483 50484 50485 50486 50487 50488 50489 50490 50491 50492 50493 50494 50495 50496 50497 50498 50499 50500 50501 50502 50503 50504 50505 50506 50507 50508 50509 50510 50511 50512 50513 50514 50515 50516 50517 50518 50519 50520 50521 50522 50523 50524 50525 50526 50527 50528 50529 50530 50531 50532 50533 50534 50535 50536 50537 50538 50539 50540 50541 50542 50543 50544 50545 50546 50547 50548 50549 50550 50551 50552 50553 50554 50555 50556 50557 50558 50559 50560 50561 50562 50563 50564 50565 50566 50567 50568 50569 50570 50571 50572 50573 50574 50575 50576 50577 50578 50579 50580 50581 50582 50583 50584 50585 50586 50587 50588 50589 50590 50591 50592 50593 50594 50595 50596 50597 50598 50599 50600 50601 50602 50603 50604 50605 50606 50607 50608 50609 50610 50611 50612 50613 50614 50615 50616 50617 50618 50619 50620 50621 50622 50623 50624 50625 50626 50627 50628 50629 50630 50631 50632 50633 50634 50635 50636 50637 50638 50639 50640 50641 50642 50643 50644 50645 50646 50647 50648 50649 50650 50651 50652 50653 50654 50655 50656 50657 50658 50659 50660 50661 50662 50663 50664 50665 50666 50667 50668 50669 50670 50671 50672 50673 50674 50675 50676 50677 50678 50679 50680 50681 50682 50683 50684 50685 50686 50687 50688 50689 50690 50691 50692 50693 50694 50695 50696 50697 50698 50699 50700 50701 50702 50703 50704 50705 50706 50707 50708 50709 50710 50711 50712 50713 50714 50715 50716 50717 50718 50719 50720 50721 50722 50723 50724 50725 50726 50727 50728 50729 50730 50731 50732 50733 50734 50735 50736 50737 50738 50739 50740 50741 50742 50743 50744 50745 50746 50747 50748 50749 50750 50751 50752 50753 50754 50755 50756 50757 50758 50759 50760 50761 50762 50763 50764 50765 50766 50767 50768 50769 50770 50771 50772 50773 50774 50775 50776 50777 50778 50779 50780 50781 50782 50783 50784 50785 50786 50787 50788 50789 50790 50791 50792 50793 50794 50795 50796 50797 50798 50799 50800 50801 50802 50803 50804 50805 50806 50807 50808 50809 50810 50811 50812 50813 50814 50815 50816 50817 50818 50819 50820 50821 50822 50823 50824 50825 50826 50827 50828 50829 50830 50831 50832 50833 50834 50835 50836 50837 50838 50839 50840 50841 50842 50843 50844 50845 50846 50847 50848 50849 50850 50851 50852 50853 50854 50855 50856 50857 50858 50859 50860 50861 50862 50863 50864 50865 50866 50867 50868 50869 50870 50871 50872 50873 50874 50875 50876 50877 50878 50879 50880 50881 50882 50883 50884 50885 50886 50887 50888 50889 50890 50891 50892 50893 50894 50895 50896 50897 50898 50899 50900 50901 50902 50903 50904 50905 50906 50907 50908 50909 50910 50911 50912 50913 50914 50915 50916 50917 50918 50919 50920 50921 50922 50923 50924 50925 50926 50927 50928 50929 50930 50931 50932 50933 50934 50935 50936 50937 50938 50939 50940 50941 50942 50943 50944 50945 50946 50947 50948 50949 50950 50951 50952 50953 50954 50955 50956 50957 50958 50959 50960 50961 50962 50963 50964 50965 50966 50967 50968 50969 50970 50971 50972 50973 50974 50975 50976 50977 50978 50979 50980 50981 50982 50983 50984 50985 50986 50987 50988 50989 50990 50991 50992 50993 50994 50995 50996 50997 50998 50999 51000 51001 51002 51003 51004 51005 51006 51007 51008 51009 51010 51011 51012 51013 51014 51015 51016 51017 51018 51019 51020 51021 51022 51023 51024 51025 51026 51027 51028 51029 51030 51031 51032 51033 51034 51035 51036 51037 51038 51039 51040 51041 51042 51043 51044 51045 51046 51047 51048 51049 51050 51051 51052 51053 51054 51055 51056 51057 51058 51059 51060 51061 51062 51063 51064 51065 51066 51067 51068 51069 51070 51071 51072 51073 51074 51075 51076 51077 51078 51079 51080 51081 51082 51083 51084 51085 51086 51087 51088 51089 51090 51091 51092 51093 51094 51095 51096 51097 51098 51099 51100 51101 51102 51103 51104 51105 51106 51107 51108 51109 51110 51111 51112 51113 51114 51115 51116 51117 51118 51119 51120 51121 51122 51123 51124 51125 51126 51127 51128 51129 51130 51131 51132 51133 51134 51135 51136 51137 51138 51139 51140 51141 51142 51143 51144 51145 51146 51147 51148 51149 51150 51151 51152 51153 51154 51155 51156 51157 51158 51159 51160 51161 51162 51163 51164 51165 51166 51167 51168 51169 51170 51171 51172 51173 51174 51175 51176 51177 51178 51179 51180 51181 51182 51183 51184 51185 51186 51187 51188 51189 51190 51191 51192 51193 51194 51195 51196 51197 51198 51199 51200 51201 51202 51203 51204 51205 51206 51207 51208 51209 51210 51211 51212 51213 51214 51215 51216 51217 51218 51219 51220 51221 51222 51223 51224 51225 51226 51227 51228 51229 51230 51231 51232 51233 51234 51235 51236 51237 51238 51239 51240 51241 51242 51243 51244 51245 51246 51247 51248 51249 51250 51251 51252 51253 51254 51255 51256 51257 51258 51259 51260 51261 51262 51263 51264 51265 51266 51267 51268 51269 51270 51271 51272 51273 51274 51275 51276 51277 51278 51279 51280 51281 51282 51283 51284 51285 51286 51287 51288 51289 51290 51291 51292 51293 51294 51295 51296 51297 51298 51299 51300 51301 51302 51303 51304 51305 51306 51307 51308 51309 51310 51311 51312 51313 51314 51315 51316 51317 51318 51319 51320 51321 51322 51323 51324 51325 51326 51327 51328 51329 51330 51331 51332 51333 51334 51335 51336 51337 51338 51339 51340 51341 51342 51343 51344 51345 51346 51347 51348 51349 51350 51351 51352 51353 51354 51355 51356 51357 51358 51359 51360 51361 51362 51363 51364 51365 51366 51367 51368 51369 51370 51371 51372 51373 51374 51375 51376 51377 51378 51379 51380 51381 51382 51383 51384 51385 51386 51387 51388 51389 51390 51391 51392 51393 51394 51395 51396 51397 51398 51399 51400 51401 51402 51403 51404 51405 51406 51407 51408 51409 51410 51411 51412 51413 51414 51415 51416 51417 51418 51419 51420 51421 51422 51423 51424 51425 51426 51427 51428 51429 51430 51431 51432 51433 51434 51435 51436 51437 51438 51439 51440 51441 51442 51443 51444 51445 51446 51447 51448 51449 51450 51451 51452 51453 51454 51455 51456 51457 51458 51459 51460 51461 51462 51463 51464 51465 51466 51467 51468 51469 51470 51471 51472 51473 51474 51475 51476 51477 51478 51479 51480 51481 51482 51483 51484 51485 51486 51487 51488 51489 51490 51491 51492 51493 51494 51495 51496 51497 51498 51499 51500 51501 51502 51503 51504 51505 51506 51507 51508 51509 51510 51511 51512 51513 51514 51515 51516 51517 51518 51519 51520 51521 51522 51523 51524 51525 51526 51527 51528 51529 51530 51531 51532 51533 51534 51535 51536 51537 51538 51539 51540 51541 51542 51543 51544 51545 51546 51547 51548 51549 51550 51551 51552 51553 51554 51555 51556 51557 51558 51559 51560 51561 51562 51563 51564 51565 51566 51567 51568 51569 51570 51571 51572 51573 51574 51575 51576 51577 51578 51579 51580 51581 51582 51583 51584 51585 51586 51587 51588 51589 51590 51591 51592 51593 51594 51595 51596 51597 51598 51599 51600 51601 51602 51603 51604 51605 51606 51607 51608 51609 51610 51611 51612 51613 51614 51615 51616 51617 51618 51619 51620 51621 51622 51623 51624 51625 51626 51627 51628 51629 51630 51631 51632 51633 51634 51635 51636 51637 51638 51639 51640 51641 51642 51643 51644 51645 51646 51647 51648 51649 51650 51651 51652 51653 51654 51655 51656 51657 51658 51659 51660 51661 51662 51663 51664 51665 51666 51667 51668 51669 51670 51671 51672 51673 51674 51675 51676 51677 51678 51679 51680 51681 51682 51683 51684 51685 51686 51687 51688 51689 51690 51691 51692 51693 51694 51695 51696 51697 51698 51699 51700 51701 51702 51703 51704 51705 51706 51707 51708 51709 51710 51711 51712 51713 51714 51715 51716 51717 51718 51719 51720 51721 51722 51723 51724 51725 51726 51727 51728 51729 51730 51731 51732 51733 51734 51735 51736 51737 51738 51739 51740 51741 51742 51743 51744 51745 51746 51747 51748 51749 51750 51751 51752 51753 51754 51755 51756 51757 51758 51759 51760 51761 51762 51763 51764 51765 51766 51767 51768 51769 51770 51771 51772 51773 51774 51775 51776 51777 51778 51779 51780 51781 51782 51783 51784 51785 51786 51787 51788 51789 51790 51791 51792 51793 51794 51795 51796 51797 51798 51799 51800 51801 51802 51803 51804 51805 51806 51807 51808 51809 51810 51811 51812 51813 51814 51815 51816 51817 51818 51819 51820 51821 51822 51823 51824 51825 51826 51827 51828 51829 51830 51831 51832 51833 51834 51835 51836 51837 51838 51839 51840 51841 51842 51843 51844 51845 51846 51847 51848 51849 51850 51851 51852 51853 51854 51855 51856 51857 51858 51859 51860 51861 51862 51863 51864 51865 51866 51867 51868 51869 51870 51871 51872 51873 51874 51875 51876 51877 51878 51879 51880 51881 51882 51883 51884 51885 51886 51887 51888 51889 51890 51891 51892 51893 51894 51895 51896 51897 51898 51899 51900 51901 51902 51903 51904 51905 51906 51907 51908 51909 51910 51911 51912 51913 51914 51915 51916 51917 51918 51919 51920 51921 51922 51923 51924 51925 51926 51927 51928 51929 51930 51931 51932 51933 51934 51935 51936 51937 51938 51939 51940 51941 51942 51943 51944 51945 51946 51947 51948 51949 51950 51951 51952 51953 51954 51955 51956 51957 51958 51959 51960 51961 51962 51963 51964 51965 51966 51967 51968 51969 51970 51971 51972 51973 51974 51975 51976 51977 51978 51979 51980 51981 51982 51983 51984 51985 51986 51987 51988 51989 51990 51991 51992 51993 51994 51995 51996 51997 51998 51999 52000 52001 52002 52003 52004 52005 52006 52007 52008 52009 52010 52011 52012 52013 52014 52015 52016 52017 52018 52019 52020 52021 52022 52023 52024 52025 52026 52027 52028 52029 52030 52031 52032 52033 52034 52035 52036 52037 52038 52039 52040 52041 52042 52043 52044 52045 52046 52047 52048 52049 52050 52051 52052 52053 52054 52055 52056 52057 52058 52059 52060 52061 52062 52063 52064 52065 52066 52067 52068 52069 52070 52071 52072 52073 52074 52075 52076 52077 52078 52079 52080 52081 52082 52083 52084 52085 52086 52087 52088 52089 52090 52091 52092 52093 52094 52095 52096 52097 52098 52099 52100 52101 52102 52103 52104 52105 52106 52107 52108 52109 52110 52111 52112 52113 52114 52115 52116 52117 52118 52119 52120 52121 52122 52123 52124 52125 52126 52127 52128 52129 52130 52131 52132 52133 52134 52135 52136 52137 52138 52139 52140 52141 52142 52143 52144 52145 52146 52147 52148 52149 52150 52151 52152 52153 52154 52155 52156 52157 52158 52159 52160 52161 52162 52163 52164 52165 52166 52167 52168 52169 52170 52171 52172 52173 52174 52175 52176 52177 52178 52179 52180 52181 52182 52183 52184 52185 52186 52187 52188 52189 52190 52191 52192 52193 52194 52195 52196 52197 52198 52199 52200 52201 52202 52203 52204 52205 52206 52207 52208 52209 52210 52211 52212 52213 52214 52215 52216 52217 52218 52219 52220 52221 52222 52223 52224 52225 52226 52227 52228 52229 52230 52231 52232 52233 52234 52235 52236 52237 52238 52239 52240 52241 52242 52243 52244 52245 52246 52247 52248 52249 52250 52251 52252 52253 52254 52255 52256 52257 52258 52259 52260 52261 52262 52263 52264 52265 52266 52267 52268 52269 52270 52271 52272 52273 52274 52275 52276 52277 52278 52279 52280 52281 52282 52283 52284 52285 52286 52287 52288 52289 52290 52291 52292 52293 52294 52295 52296 52297 52298 52299 52300 52301 52302 52303 52304 52305 52306 52307 52308 52309 52310 52311 52312 52313 52314 52315 52316 52317 52318 52319 52320 52321 52322 52323 52324 52325 52326 52327 52328 52329 52330 52331 52332 52333 52334 52335 52336 52337 52338 52339 52340 52341 52342 52343 52344 52345 52346 52347 52348 52349 52350 52351 52352 52353 52354 52355 52356 52357 52358 52359 52360 52361 52362 52363 52364 52365 52366 52367 52368 52369 52370 52371 52372 52373 52374 52375 52376 52377 52378 52379 52380 52381 52382 52383 52384 52385 52386 52387 52388 52389 52390 52391 52392 52393 52394 52395 52396 52397 52398 52399 52400 52401 52402 52403 52404 52405 52406 52407 52408 52409 52410 52411 52412 52413 52414 52415 52416 52417 52418 52419 52420 52421 52422 52423 52424 52425 52426 52427 52428 52429 52430 52431 52432 52433 52434 52435 52436 52437 52438 52439 52440 52441 52442 52443 52444 52445 52446 52447 52448 52449 52450 52451 52452 52453 52454 52455 52456 52457 52458 52459 52460 52461 52462 52463 52464 52465 52466 52467 52468 52469 52470 52471 52472 52473 52474 52475 52476 52477 52478 52479 52480 52481 52482 52483 52484 52485 52486 52487 52488 52489 52490 52491 52492 52493 52494 52495 52496 52497 52498 52499 52500 52501 52502 52503 52504 52505 52506 52507 52508 52509 52510 52511 52512 52513 52514 52515 52516 52517 52518 52519 52520 52521 52522 52523 52524 52525 52526 52527 52528 52529 52530 52531 52532 52533 52534 52535 52536 52537 52538 52539 52540 52541 52542 52543 52544 52545 52546 52547 52548 52549 52550 52551 52552 52553 52554 52555 52556 52557 52558 52559 52560 52561 52562 52563 52564 52565 52566 52567 52568 52569 52570 52571 52572 52573 52574 52575 52576 52577 52578 52579 52580 52581 52582 52583 52584 52585 52586 52587 52588 52589 52590 52591 52592 52593 52594 52595 52596 52597 52598 52599 52600 52601 52602 52603 52604 52605 52606 52607 52608 52609 52610 52611 52612 52613 52614 52615 52616 52617 52618 52619 52620 52621 52622 52623 52624 52625 52626 52627 52628 52629 52630 52631 52632 52633 52634 52635 52636 52637 52638 52639 52640 52641 52642 52643 52644 52645 52646 52647 52648 52649 52650 52651 52652 52653 52654 52655 52656 52657 52658 52659 52660 52661 52662 52663 52664 52665 52666 52667 52668 52669 52670 52671 52672 52673 52674 52675 52676 52677 52678 52679 52680 52681 52682 52683 52684 52685 52686 52687 52688 52689 52690 52691 52692 52693 52694 52695 52696 52697 52698 52699 52700 52701 52702 52703 52704 52705 52706 52707 52708 52709 52710 52711 52712 52713 52714 52715 52716 52717 52718 52719 52720 52721 52722 52723 52724 52725 52726 52727 52728 52729 52730 52731 52732 52733 52734 52735 52736 52737 52738 52739 52740 52741 52742 52743 52744 52745 52746 52747 52748 52749 52750 52751 52752 52753 52754 52755 52756 52757 52758 52759 52760 52761 52762 52763 52764 52765 52766 52767 52768 52769 52770 52771 52772 52773 52774 52775 52776 52777 52778 52779 52780 52781 52782 52783 52784 52785 52786 52787 52788 52789 52790 52791 52792 52793 52794 52795 52796 52797 52798 52799 52800 52801 52802 52803 52804 52805 52806 52807 52808 52809 52810 52811 52812 52813 52814 52815 52816 52817 52818 52819 52820 52821 52822 52823 52824 52825 52826 52827 52828 52829 52830 52831 52832 52833 52834 52835 52836 52837 52838 52839 52840 52841 52842 52843 52844 52845 52846 52847 52848 52849 52850 52851 52852 52853 52854 52855 52856 52857 52858 52859 52860 52861 52862 52863 52864 52865 52866 52867 52868 52869 52870 52871 52872 52873 52874 52875 52876 52877 52878 52879 52880 52881 52882 52883 52884 52885 52886 52887 52888 52889 52890 52891 52892 52893 52894 52895 52896 52897 52898 52899 52900 52901 52902 52903 52904 52905 52906 52907 52908 52909 52910 52911 52912 52913 52914 52915 52916 52917 52918 52919 52920 52921 52922 52923 52924 52925 52926 52927 52928 52929 52930 52931 52932 52933 52934 52935 52936 52937 52938 52939 52940 52941 52942 52943 52944 52945 52946 52947 52948 52949 52950 52951 52952 52953 52954 52955 52956 52957 52958 52959 52960 52961 52962 52963 52964 52965 52966 52967 52968 52969 52970 52971 52972 52973 52974 52975 52976 52977 52978 52979 52980 52981 52982 52983 52984 52985 52986 52987 52988 52989 52990 52991 52992 52993 52994 52995 52996 52997 52998 52999 53000 53001 53002 53003 53004 53005 53006 53007 53008 53009 53010 53011 53012 53013 53014 53015 53016 53017 53018 53019 53020 53021 53022 53023 53024 53025 53026 53027 53028 53029 53030 53031 53032 53033 53034 53035 53036 53037 53038 53039 53040 53041 53042 53043 53044 53045 53046 53047 53048 53049 53050 53051 53052 53053 53054 53055 53056 53057 53058 53059 53060 53061 53062 53063 53064 53065 53066 53067 53068 53069 53070 53071 53072 53073 53074 53075 53076 53077 53078 53079 53080 53081 53082 53083 53084 53085 53086 53087 53088 53089 53090 53091 53092 53093 53094 53095 53096 53097 53098 53099 53100 53101 53102 53103 53104 53105 53106 53107 53108 53109 53110 53111 53112 53113 53114 53115 53116 53117 53118 53119 53120 53121 53122 53123 53124 53125 53126 53127 53128 53129 53130 53131 53132 53133 53134 53135 53136 53137 53138 53139 53140 53141 53142 53143 53144 53145 53146 53147 53148 53149 53150 53151 53152 53153 53154 53155 53156 53157 53158 53159 53160 53161 53162 53163 53164 53165 53166 53167 53168 53169 53170 53171 53172 53173 53174 53175 53176 53177 53178 53179 53180 53181 53182 53183 53184 53185 53186 53187 53188 53189 53190 53191 53192 53193 53194 53195 53196 53197 53198 53199 53200 53201 53202 53203 53204 53205 53206 53207 53208 53209 53210 53211 53212 53213 53214 53215 53216 53217 53218 53219 53220 53221 53222 53223 53224 53225 53226 53227 53228 53229 53230 53231 53232 53233 53234 53235 53236 53237 53238 53239 53240 53241 53242 53243 53244 53245 53246 53247 53248 53249 53250 53251 53252 53253 53254 53255 53256 53257 53258 53259 53260 53261 53262 53263 53264 53265 53266 53267 53268 53269 53270 53271 53272 53273 53274 53275 53276 53277 53278 53279 53280 53281 53282 53283 53284 53285 53286 53287 53288 53289 53290 53291 53292 53293 53294 53295 53296 53297 53298 53299 53300 53301 53302 53303 53304 53305 53306 53307 53308 53309 53310 53311 53312 53313 53314 53315 53316 53317 53318 53319 53320 53321 53322 53323 53324 53325 53326 53327 53328 53329 53330 53331 53332 53333 53334 53335 53336 53337 53338 53339 53340 53341 53342 53343 53344 53345 53346 53347 53348 53349 53350 53351 53352 53353 53354 53355 53356 53357 53358 53359 53360 53361 53362 53363 53364 53365 53366 53367 53368 53369 53370 53371 53372 53373 53374 53375 53376 53377 53378 53379 53380 53381 53382 53383 53384 53385 53386 53387 53388 53389 53390 53391 53392 53393 53394 53395 53396 53397 53398 53399 53400 53401 53402 53403 53404 53405 53406 53407 53408 53409 53410 53411 53412 53413 53414 53415 53416 53417 53418 53419 53420 53421 53422 53423 53424 53425 53426 53427 53428 53429 53430 53431 53432 53433 53434 53435 53436 53437 53438 53439 53440 53441 53442 53443 53444 53445 53446 53447 53448 53449 53450 53451 53452 53453 53454 53455 53456 53457 53458 53459 53460 53461 53462 53463 53464 53465 53466 53467 53468 53469 53470 53471 53472 53473 53474 53475 53476 53477 53478 53479 53480 53481 53482 53483 53484 53485 53486 53487 53488 53489 53490 53491 53492 53493 53494 53495 53496 53497 53498 53499 53500 53501 53502 53503 53504 53505 53506 53507 53508 53509 53510 53511 53512 53513 53514 53515 53516 53517 53518 53519 53520 53521 53522 53523 53524 53525 53526 53527 53528 53529 53530 53531 53532 53533 53534 53535 53536 53537 53538 53539 53540 53541 53542 53543 53544 53545 53546 53547 53548 53549 53550 53551 53552 53553 53554 53555 53556 53557 53558 53559 53560 53561 53562 53563 53564 53565 53566 53567 53568 53569 53570 53571 53572 53573 53574 53575 53576 53577 53578 53579 53580 53581 53582 53583 53584 53585 53586 53587 53588 53589 53590 53591 53592 53593 53594 53595 53596 53597 53598 53599 53600 53601 53602 53603 53604 53605 53606 53607 53608 53609 53610 53611 53612 53613 53614 53615 53616 53617 53618 53619 53620 53621 53622 53623 53624 53625 53626 53627 53628 53629 53630 53631 53632 53633 53634 53635 53636 53637 53638 53639 53640 53641 53642 53643 53644 53645 53646 53647 53648 53649 53650 53651 53652 53653 53654 53655 53656 53657 53658 53659 53660 53661 53662 53663 53664 53665 53666 53667 53668 53669 53670 53671 53672 53673 53674 53675 53676 53677 53678 53679 53680 53681 53682 53683 53684 53685 53686 53687 53688 53689 53690 53691 53692 53693 53694 53695 53696 53697 53698 53699 53700 53701 53702 53703 53704 53705 53706 53707 53708 53709 53710 53711 53712 53713 53714 53715 53716 53717 53718 53719 53720 53721 53722 53723 53724 53725 53726 53727 53728 53729 53730 53731 53732 53733 53734 53735 53736 53737 53738 53739 53740 53741 53742 53743 53744 53745 53746 53747 53748 53749 53750 53751 53752 53753 53754 53755 53756 53757 53758 53759 53760 53761 53762 53763 53764 53765 53766 53767 53768 53769 53770 53771 53772 53773 53774 53775 53776 53777 53778 53779 53780 53781 53782 53783 53784 53785 53786 53787 53788 53789 53790 53791 53792 53793 53794 53795 53796 53797 53798 53799 53800 53801 53802 53803 53804 53805 53806 53807 53808 53809 53810 53811 53812 53813 53814 53815 53816 53817 53818 53819 53820 53821 53822 53823 53824 53825 53826 53827 53828 53829 53830 53831 53832 53833 53834 53835 53836 53837 53838 53839 53840 53841 53842 53843 53844 53845 53846 53847 53848 53849 53850 53851 53852 53853 53854 53855 53856 53857 53858 53859 53860 53861 53862 53863 53864 53865 53866 53867 53868 53869 53870 53871 53872 53873 53874 53875 53876 53877 53878 53879 53880 53881 53882 53883 53884 53885 53886 53887 53888 53889 53890 53891 53892 53893 53894 53895 53896 53897 53898 53899 53900 53901 53902 53903 53904 53905 53906 53907 53908 53909 53910 53911 53912 53913 53914 53915 53916 53917 53918 53919 53920 53921 53922 53923 53924 53925 53926 53927 53928 53929 53930 53931 53932 53933 53934 53935 53936 53937 53938 53939 53940 53941 53942 53943 53944 53945 53946 53947 53948 53949 53950 53951 53952 53953 53954 53955 53956 53957 53958 53959 53960 53961 53962 53963 53964 53965 53966 53967 53968 53969 53970 53971 53972 53973 53974 53975 53976 53977 53978 53979 53980 53981 53982 53983 53984 53985 53986 53987 53988 53989 53990 53991 53992 53993 53994 53995 53996 53997 53998 53999 54000 54001 54002 54003 54004 54005 54006 54007 54008 54009 54010 54011 54012 54013 54014 54015 54016 54017 54018 54019 54020 54021 54022 54023 54024 54025 54026 54027 54028 54029 54030 54031 54032 54033 54034 54035 54036 54037 54038 54039 54040 54041 54042 54043 54044 54045 54046 54047 54048 54049 54050 54051 54052 54053 54054 54055 54056 54057 54058 54059 54060 54061 54062 54063 54064 54065 54066 54067 54068 54069 54070 54071 54072 54073 54074 54075 54076 54077 54078 54079 54080 54081 54082 54083 54084 54085 54086 54087 54088 54089 54090 54091 54092 54093 54094 54095 54096 54097 54098 54099 54100 54101 54102 54103 54104 54105 54106 54107 54108 54109 54110 54111 54112 54113 54114 54115 54116 54117 54118 54119 54120 54121 54122 54123 54124 54125 54126 54127 54128 54129 54130 54131 54132 54133 54134 54135 54136 54137 54138 54139 54140 54141 54142 54143 54144 54145 54146 54147 54148 54149 54150 54151 54152 54153 54154 54155 54156 54157 54158 54159 54160 54161 54162 54163 54164 54165 54166 54167 54168 54169 54170 54171 54172 54173 54174 54175 54176 54177 54178 54179 54180 54181 54182 54183 54184 54185 54186 54187 54188 54189 54190 54191 54192 54193 54194 54195 54196 54197 54198 54199 54200 54201 54202 54203 54204 54205 54206 54207 54208 54209 54210 54211 54212 54213 54214 54215 54216 54217 54218 54219 54220 54221 54222 54223 54224 54225 54226 54227 54228 54229 54230 54231 54232 54233 54234 54235 54236 54237 54238 54239 54240 54241 54242 54243 54244 54245 54246 54247 54248 54249 54250 54251 54252 54253 54254 54255 54256 54257 54258 54259 54260 54261 54262 54263 54264 54265 54266 54267 54268 54269 54270 54271 54272 54273 54274 54275 54276 54277 54278 54279 54280 54281 54282 54283 54284 54285 54286 54287 54288 54289 54290 54291 54292 54293 54294 54295 54296 54297 54298 54299 54300 54301 54302 54303 54304 54305 54306 54307 54308 54309 54310 54311 54312 54313 54314 54315 54316 54317 54318 54319 54320 54321 54322 54323 54324 54325 54326 54327 54328 54329 54330 54331 54332 54333 54334 54335 54336 54337 54338 54339 54340 54341 54342 54343 54344 54345 54346 54347 54348 54349 54350 54351 54352 54353 54354 54355 54356 54357 54358 54359 54360 54361 54362 54363 54364 54365 54366 54367 54368 54369 54370 54371 54372 54373 54374 54375 54376 54377 54378 54379 54380 54381 54382 54383 54384 54385 54386 54387 54388 54389 54390 54391 54392 54393 54394 54395 54396 54397 54398 54399 54400 54401 54402 54403 54404 54405 54406 54407 54408 54409 54410 54411 54412 54413 54414 54415 54416 54417 54418 54419 54420 54421 54422 54423 54424 54425 54426 54427 54428 54429 54430 54431 54432 54433 54434 54435 54436 54437 54438 54439 54440 54441 54442 54443 54444 54445 54446 54447 54448 54449 54450 54451 54452 54453 54454 54455 54456 54457 54458 54459 54460 54461 54462 54463 54464 54465 54466 54467 54468 54469 54470 54471 54472 54473 54474 54475 54476 54477 54478 54479 54480 54481 54482 54483 54484 54485 54486 54487 54488 54489 54490 54491 54492 54493 54494 54495 54496 54497 54498 54499 54500 54501 54502 54503 54504 54505 54506 54507 54508 54509 54510 54511 54512 54513 54514 54515 54516 54517 54518 54519 54520 54521 54522 54523 54524 54525 54526 54527 54528 54529 54530 54531 54532 54533 54534 54535 54536 54537 54538 54539 54540 54541 54542 54543 54544 54545 54546 54547 54548 54549 54550 54551 54552 54553 54554 54555 54556 54557 54558 54559 54560 54561 54562 54563 54564 54565 54566 54567 54568 54569 54570 54571 54572 54573 54574 54575 54576 54577 54578 54579 54580 54581 54582 54583 54584 54585 54586 54587 54588 54589 54590 54591 54592 54593 54594 54595 54596 54597 54598 54599 54600 54601 54602 54603 54604 54605 54606 54607 54608 54609 54610 54611 54612 54613 54614 54615 54616 54617 54618 54619 54620 54621 54622 54623 54624 54625 54626 54627 54628 54629 54630 54631 54632 54633 54634 54635 54636 54637 54638 54639 54640 54641 54642 54643 54644 54645 54646 54647 54648 54649 54650 54651 54652 54653 54654 54655 54656 54657 54658 54659 54660 54661 54662 54663 54664 54665 54666 54667 54668 54669 54670 54671 54672 54673 54674 54675 54676 54677 54678 54679 54680 54681 54682 54683 54684 54685 54686 54687 54688 54689 54690 54691 54692 54693 54694 54695 54696 54697 54698 54699 54700 54701 54702 54703 54704 54705 54706 54707 54708 54709 54710 54711 54712 54713 54714 54715 54716 54717 54718 54719 54720 54721 54722 54723 54724 54725 54726 54727 54728 54729 54730 54731 54732 54733 54734 54735 54736 54737 54738 54739 54740 54741 54742 54743 54744 54745 54746 54747 54748 54749 54750 54751 54752 54753 54754 54755 54756 54757 54758 54759 54760 54761 54762 54763 54764 54765 54766 54767 54768 54769 54770 54771 54772 54773 54774 54775 54776 54777 54778 54779 54780 54781 54782 54783 54784 54785 54786 54787 54788 54789 54790 54791 54792 54793 54794 54795 54796 54797 54798 54799 54800 54801 54802 54803 54804 54805 54806 54807 54808 54809 54810 54811 54812 54813 54814 54815 54816 54817 54818 54819 54820 54821 54822 54823 54824 54825 54826 54827 54828 54829 54830 54831 54832 54833 54834 54835 54836 54837 54838 54839 54840 54841 54842 54843 54844 54845 54846 54847 54848 54849 54850 54851 54852 54853 54854 54855 54856 54857 54858 54859 54860 54861 54862 54863 54864 54865 54866 54867 54868 54869 54870 54871 54872 54873 54874 54875 54876 54877 54878 54879 54880 54881 54882 54883 54884 54885 54886 54887 54888 54889 54890 54891 54892 54893 54894 54895 54896 54897 54898 54899 54900 54901 54902 54903 54904 54905 54906 54907 54908 54909 54910 54911 54912 54913 54914 54915 54916 54917 54918 54919 54920 54921 54922 54923 54924 54925 54926 54927 54928 54929 54930 54931 54932 54933 54934 54935 54936 54937 54938 54939 54940 54941 54942 54943 54944 54945 54946 54947 54948 54949 54950 54951 54952 54953 54954 54955 54956 54957 54958 54959 54960 54961 54962 54963 54964 54965 54966 54967 54968 54969 54970 54971 54972 54973 54974 54975 54976 54977 54978 54979 54980 54981 54982 54983 54984 54985 54986 54987 54988 54989 54990 54991 54992 54993 54994 54995 54996 54997 54998 54999 55000 55001 55002 55003 55004 55005 55006 55007 55008 55009 55010 55011 55012 55013 55014 55015 55016 55017 55018 55019 55020 55021 55022 55023 55024 55025 55026 55027 55028 55029 55030 55031 55032 55033 55034 55035 55036 55037 55038 55039 55040 55041 55042 55043 55044 55045 55046 55047 55048 55049 55050 55051 55052 55053 55054 55055 55056 55057 55058 55059 55060 55061 55062 55063 55064 55065 55066 55067 55068 55069 55070 55071 55072 55073 55074 55075 55076 55077 55078 55079 55080 55081 55082 55083 55084 55085 55086 55087 55088 55089 55090 55091 55092 55093 55094 55095 55096 55097 55098 55099 55100 55101 55102 55103 55104 55105 55106 55107 55108 55109 55110 55111 55112 55113 55114 55115 55116 55117 55118 55119 55120 55121 55122 55123 55124 55125 55126 55127 55128 55129 55130 55131 55132 55133 55134 55135 55136 55137 55138 55139 55140 55141 55142 55143 55144 55145 55146 55147 55148 55149 55150 55151 55152 55153 55154 55155 55156 55157 55158 55159 55160 55161 55162 55163 55164 55165 55166 55167 55168 55169 55170 55171 55172 55173 55174 55175 55176 55177 55178 55179 55180 55181 55182 55183 55184 55185 55186 55187 55188 55189 55190 55191 55192 55193 55194 55195 55196 55197 55198 55199 55200 55201 55202 55203 55204 55205 55206 55207 55208 55209 55210 55211 55212 55213 55214 55215 55216 55217 55218 55219 55220 55221 55222 55223 55224 55225 55226 55227 55228 55229 55230 55231 55232 55233 55234 55235 55236 55237 55238 55239 55240 55241 55242 55243 55244 55245 55246 55247 55248 55249 55250 55251 55252 55253 55254 55255 55256 55257 55258 55259 55260 55261 55262 55263 55264 55265 55266 55267 55268 55269 55270 55271 55272 55273 55274 55275 55276 55277 55278 55279 55280 55281 55282 55283 55284 55285 55286 55287 55288 55289 55290 55291 55292 55293 55294 55295 55296 55297 55298 55299 55300 55301 55302 55303 55304 55305 55306 55307 55308 55309 55310 55311 55312 55313 55314 55315 55316 55317 55318 55319 55320 55321 55322 55323 55324 55325 55326 55327 55328 55329 55330 55331 55332 55333 55334 55335 55336 55337 55338 55339 55340 55341 55342 55343 55344 55345 55346 55347 55348 55349 55350 55351 55352 55353 55354 55355 55356 55357 55358 55359 55360 55361 55362 55363 55364 55365 55366 55367 55368 55369 55370 55371 55372 55373 55374 55375 55376 55377 55378 55379 55380 55381 55382 55383 55384 55385 55386 55387 55388 55389 55390 55391 55392 55393 55394 55395 55396 55397 55398 55399 55400 55401 55402 55403 55404 55405 55406 55407 55408 55409 55410 55411 55412 55413 55414 55415 55416 55417 55418 55419 55420 55421 55422 55423 55424 55425 55426 55427 55428 55429 55430 55431 55432 55433 55434 55435 55436 55437 55438 55439 55440 55441 55442 55443 55444 55445 55446 55447 55448 55449 55450 55451 55452 55453 55454 55455 55456 55457 55458 55459 55460 55461 55462 55463 55464 55465 55466 55467 55468 55469 55470 55471 55472 55473 55474 55475 55476 55477 55478 55479 55480 55481 55482 55483 55484 55485 55486 55487 55488 55489 55490 55491 55492 55493 55494 55495 55496 55497 55498 55499 55500 55501 55502 55503 55504 55505 55506 55507 55508 55509 55510 55511 55512 55513 55514 55515 55516 55517 55518 55519 55520 55521 55522 55523 55524 55525 55526 55527 55528 55529 55530 55531 55532 55533 55534 55535 55536 55537 55538 55539 55540 55541 55542 55543 55544 55545 55546 55547 55548 55549 55550 55551 55552 55553 55554 55555 55556 55557 55558 55559 55560 55561 55562 55563 55564 55565 55566 55567 55568 55569 55570 55571 55572 55573 55574 55575 55576 55577 55578 55579 55580 55581 55582 55583 55584 55585 55586 55587 55588 55589 55590 55591 55592 55593 55594 55595 55596 55597 55598 55599 55600 55601 55602 55603 55604 55605 55606 55607 55608 55609 55610 55611 55612 55613 55614 55615 55616 55617 55618 55619 55620 55621 55622 55623 55624 55625 55626 55627 55628 55629 55630 55631 55632 55633 55634 55635 55636 55637 55638 55639 55640 55641 55642 55643 55644 55645 55646 55647 55648 55649 55650 55651 55652 55653 55654 55655 55656 55657 55658 55659 55660 55661 55662 55663 55664 55665 55666 55667 55668 55669 55670 55671 55672 55673 55674 55675 55676 55677 55678 55679 55680 55681 55682 55683 55684 55685 55686 55687 55688 55689 55690 55691 55692 55693 55694 55695 55696 55697 55698 55699 55700 55701 55702 55703 55704 55705 55706 55707 55708 55709 55710 55711 55712 55713 55714 55715 55716 55717 55718 55719 55720 55721 55722 55723 55724 55725 55726 55727 55728 55729 55730 55731 55732 55733 55734 55735 55736 55737 55738 55739 55740 55741 55742 55743 55744 55745 55746 55747 55748 55749 55750 55751 55752 55753 55754 55755 55756 55757 55758 55759 55760 55761 55762 55763 55764 55765 55766 55767 55768 55769 55770 55771 55772 55773 55774 55775 55776 55777 55778 55779 55780 55781 55782 55783 55784 55785 55786 55787 55788 55789 55790 55791 55792 55793 55794 55795 55796 55797 55798 55799 55800 55801 55802 55803 55804 55805 55806 55807 55808 55809 55810 55811 55812 55813 55814 55815 55816 55817 55818 55819 55820 55821 55822 55823 55824 55825 55826 55827 55828 55829 55830 55831 55832 55833 55834 55835 55836 55837 55838 55839 55840 55841 55842 55843 55844 55845 55846 55847 55848 55849 55850 55851 55852 55853 55854 55855 55856 55857 55858 55859 55860 55861 55862 55863 55864 55865 55866 55867 55868 55869 55870 55871 55872 55873 55874 55875 55876 55877 55878 55879 55880 55881 55882 55883 55884 55885 55886 55887 55888 55889 55890 55891 55892 55893 55894 55895 55896 55897 55898 55899 55900 55901 55902 55903 55904 55905 55906 55907 55908 55909 55910 55911 55912 55913 55914 55915 55916 55917 55918 55919 55920 55921 55922 55923 55924 55925 55926 55927 55928 55929 55930 55931 55932 55933 55934 55935 55936 55937 55938 55939 55940 55941 55942 55943 55944 55945 55946 55947 55948 55949 55950 55951 55952 55953 55954 55955 55956 55957 55958 55959 55960 55961 55962 55963 55964 55965 55966 55967 55968 55969 55970 55971 55972 55973 55974 55975 55976 55977 55978 55979 55980 55981 55982 55983 55984 55985 55986 55987 55988 55989 55990 55991 55992 55993 55994 55995 55996 55997 55998 55999 56000 56001 56002 56003 56004 56005 56006 56007 56008 56009 56010 56011 56012 56013 56014 56015 56016 56017 56018 56019 56020 56021 56022 56023 56024 56025 56026 56027 56028 56029 56030 56031 56032 56033 56034 56035 56036 56037 56038 56039 56040 56041 56042 56043 56044 56045 56046 56047 56048 56049 56050 56051 56052 56053 56054 56055 56056 56057 56058 56059 56060 56061 56062 56063 56064 56065 56066 56067 56068 56069 56070 56071 56072 56073 56074 56075 56076 56077 56078 56079 56080 56081 56082 56083 56084 56085 56086 56087 56088 56089 56090 56091 56092 56093 56094 56095 56096 56097 56098 56099 56100 56101 56102 56103 56104 56105 56106 56107 56108 56109 56110 56111 56112 56113 56114 56115 56116 56117 56118 56119 56120 56121 56122 56123 56124 56125 56126 56127 56128 56129 56130 56131 56132 56133 56134 56135 56136 56137 56138 56139 56140 56141 56142 56143 56144 56145 56146 56147 56148 56149 56150 56151 56152 56153 56154 56155 56156 56157 56158 56159 56160 56161 56162 56163 56164 56165 56166 56167 56168 56169 56170 56171 56172 56173 56174 56175 56176 56177 56178 56179 56180 56181 56182 56183 56184 56185 56186 56187 56188 56189 56190 56191 56192 56193 56194 56195 56196 56197 56198 56199 56200 56201 56202 56203 56204 56205 56206 56207 56208 56209 56210 56211 56212 56213 56214 56215 56216 56217 56218 56219 56220 56221 56222 56223 56224 56225 56226 56227 56228 56229 56230 56231 56232 56233 56234 56235 56236 56237 56238 56239 56240 56241 56242 56243 56244 56245 56246 56247 56248 56249 56250 56251 56252 56253 56254 56255 56256 56257 56258 56259 56260 56261 56262 56263 56264 56265 56266 56267 56268 56269 56270 56271 56272 56273 56274 56275 56276 56277 56278 56279 56280 56281 56282 56283 56284 56285 56286 56287 56288 56289 56290 56291 56292 56293 56294 56295 56296 56297 56298 56299 56300 56301 56302 56303 56304 56305 56306 56307 56308 56309 56310 56311 56312 56313 56314 56315 56316 56317 56318 56319 56320 56321 56322 56323 56324 56325 56326 56327 56328 56329 56330 56331 56332 56333 56334 56335 56336 56337 56338 56339 56340 56341 56342 56343 56344 56345 56346 56347 56348 56349 56350 56351 56352 56353 56354 56355 56356 56357 56358 56359 56360 56361 56362 56363 56364 56365 56366 56367 56368 56369 56370 56371 56372 56373 56374 56375 56376 56377 56378 56379 56380 56381 56382 56383 56384 56385 56386 56387 56388 56389 56390 56391 56392 56393 56394 56395 56396 56397 56398 56399 56400 56401 56402 56403 56404 56405 56406 56407 56408 56409 56410 56411 56412 56413 56414 56415 56416 56417 56418 56419 56420 56421 56422 56423 56424 56425 56426 56427 56428 56429 56430 56431 56432 56433 56434 56435 56436 56437 56438 56439 56440 56441 56442 56443 56444 56445 56446 56447 56448 56449 56450 56451 56452 56453 56454 56455 56456 56457 56458 56459 56460 56461 56462 56463 56464 56465 56466 56467 56468 56469 56470 56471 56472 56473 56474 56475 56476 56477 56478 56479 56480 56481 56482 56483 56484 56485 56486 56487 56488 56489 56490 56491 56492 56493 56494 56495 56496 56497 56498 56499 56500 56501 56502 56503 56504 56505 56506 56507 56508 56509 56510 56511 56512 56513 56514 56515 56516 56517 56518 56519 56520 56521 56522 56523 56524 56525 56526 56527 56528 56529 56530 56531 56532 56533 56534 56535 56536 56537 56538 56539 56540 56541 56542 56543 56544 56545 56546 56547 56548 56549 56550 56551 56552 56553 56554 56555 56556 56557 56558 56559 56560 56561 56562 56563 56564 56565 56566 56567 56568 56569 56570 56571 56572 56573 56574 56575 56576 56577 56578 56579 56580 56581 56582 56583 56584 56585 56586 56587 56588 56589 56590 56591 56592 56593 56594 56595 56596 56597 56598 56599 56600 56601 56602 56603 56604 56605 56606 56607 56608 56609 56610 56611 56612 56613 56614 56615 56616 56617 56618 56619 56620 56621 56622 56623 56624 56625 56626 56627 56628 56629 56630 56631 56632 56633 56634 56635 56636 56637 56638 56639 56640 56641 56642 56643 56644 56645 56646 56647 56648 56649 56650 56651 56652 56653 56654 56655 56656 56657 56658 56659 56660 56661 56662 56663 56664 56665 56666 56667 56668 56669 56670 56671 56672 56673 56674 56675 56676 56677 56678 56679 56680 56681 56682 56683 56684 56685 56686 56687 56688 56689 56690 56691 56692 56693 56694 56695 56696 56697 56698 56699 56700 56701 56702 56703 56704 56705 56706 56707 56708 56709 56710 56711 56712 56713 56714 56715 56716 56717 56718 56719 56720 56721 56722 56723 56724 56725 56726 56727 56728 56729 56730 56731 56732 56733 56734 56735 56736 56737 56738 56739 56740 56741 56742 56743 56744 56745 56746 56747 56748 56749 56750 56751 56752 56753 56754 56755 56756 56757 56758 56759 56760 56761 56762 56763 56764 56765 56766 56767 56768 56769 56770 56771 56772 56773 56774 56775 56776 56777 56778 56779 56780 56781 56782 56783 56784 56785 56786 56787 56788 56789 56790 56791 56792 56793 56794 56795 56796 56797 56798 56799 56800 56801 56802 56803 56804 56805 56806 56807 56808 56809 56810 56811 56812 56813 56814 56815 56816 56817 56818 56819 56820 56821 56822 56823 56824 56825 56826 56827 56828 56829 56830 56831 56832 56833 56834 56835 56836 56837 56838 56839 56840 56841 56842 56843 56844 56845 56846 56847 56848 56849 56850 56851 56852 56853 56854 56855 56856 56857 56858 56859 56860 56861 56862 56863 56864 56865 56866 56867 56868 56869 56870 56871 56872 56873 56874 56875 56876 56877 56878 56879 56880 56881 56882 56883 56884 56885 56886 56887 56888 56889 56890 56891 56892 56893 56894 56895 56896 56897 56898 56899 56900 56901 56902 56903 56904 56905 56906 56907 56908 56909 56910 56911 56912 56913 56914 56915 56916 56917 56918 56919 56920 56921 56922 56923 56924 56925 56926 56927 56928 56929 56930 56931 56932 56933 56934 56935 56936 56937 56938 56939 56940 56941 56942 56943 56944 56945 56946 56947 56948 56949 56950 56951 56952 56953 56954 56955 56956 56957 56958 56959 56960 56961 56962 56963 56964 56965 56966 56967 56968 56969 56970 56971 56972 56973 56974 56975 56976 56977 56978 56979 56980 56981 56982 56983 56984 56985 56986 56987 56988 56989 56990 56991 56992 56993 56994 56995 56996 56997 56998 56999 57000 57001 57002 57003 57004 57005 57006 57007 57008 57009 57010 57011 57012 57013 57014 57015 57016 57017 57018 57019 57020 57021 57022 57023 57024 57025 57026 57027 57028 57029 57030 57031 57032 57033 57034 57035 57036 57037 57038 57039 57040 57041 57042 57043 57044 57045 57046 57047 57048 57049 57050 57051 57052 57053 57054 57055 57056 57057 57058 57059 57060 57061 57062 57063 57064 57065 57066 57067 57068 57069 57070 57071 57072 57073 57074 57075 57076 57077 57078 57079 57080 57081 57082 57083 57084 57085 57086 57087 57088 57089 57090 57091 57092 57093 57094 57095 57096 57097 57098 57099 57100 57101 57102 57103 57104 57105 57106 57107 57108 57109 57110 57111 57112 57113 57114 57115 57116 57117 57118 57119 57120 57121 57122 57123 57124 57125 57126 57127 57128 57129 57130 57131 57132 57133 57134 57135 57136 57137 57138 57139 57140 57141 57142 57143 57144 57145 57146 57147 57148 57149 57150 57151 57152 57153 57154 57155 57156 57157 57158 57159 57160 57161 57162 57163 57164 57165 57166 57167 57168 57169 57170 57171 57172 57173 57174 57175 57176 57177 57178 57179 57180 57181 57182 57183 57184 57185 57186 57187 57188 57189 57190 57191 57192 57193 57194 57195 57196 57197 57198 57199 57200 57201 57202 57203 57204 57205 57206 57207 57208 57209 57210 57211 57212 57213 57214 57215 57216 57217 57218 57219 57220 57221 57222 57223 57224 57225 57226 57227 57228 57229 57230 57231 57232 57233 57234 57235 57236 57237 57238 57239 57240 57241 57242 57243 57244 57245 57246 57247 57248 57249 57250 57251 57252 57253 57254 57255 57256 57257 57258 57259 57260 57261 57262 57263 57264 57265 57266 57267 57268 57269 57270 57271 57272 57273 57274 57275 57276 57277 57278 57279 57280 57281 57282 57283 57284 57285 57286 57287 57288 57289 57290 57291 57292 57293 57294 57295 57296 57297 57298 57299 57300 57301 57302 57303 57304 57305 57306 57307 57308 57309 57310 57311 57312 57313 57314 57315 57316 57317 57318 57319 57320 57321 57322 57323 57324 57325 57326 57327 57328 57329 57330 57331 57332 57333 57334 57335 57336 57337 57338 57339 57340 57341 57342 57343 57344 57345 57346 57347 57348 57349 57350 57351 57352 57353 57354 57355 57356 57357 57358 57359 57360 57361 57362 57363 57364 57365 57366 57367 57368 57369 57370 57371 57372 57373 57374 57375 57376 57377 57378 57379 57380 57381 57382 57383 57384 57385 57386 57387 57388 57389 57390 57391 57392 57393 57394 57395 57396 57397 57398 57399 57400 57401 57402 57403 57404 57405 57406 57407 57408 57409 57410 57411 57412 57413 57414 57415 57416 57417 57418 57419 57420 57421 57422 57423 57424 57425 57426 57427 57428 57429 57430 57431 57432 57433 57434 57435 57436 57437 57438 57439 57440 57441 57442 57443 57444 57445 57446 57447 57448 57449 57450 57451 57452 57453 57454 57455 57456 57457 57458 57459 57460 57461 57462 57463 57464 57465 57466 57467 57468 57469 57470 57471 57472 57473 57474 57475 57476 57477 57478 57479 57480 57481 57482 57483 57484 57485 57486 57487 57488 57489 57490 57491 57492 57493 57494 57495 57496 57497 57498 57499 57500 57501 57502 57503 57504 57505 57506 57507 57508 57509 57510 57511 57512 57513 57514 57515 57516 57517 57518 57519 57520 57521 57522 57523 57524 57525 57526 57527 57528 57529 57530 57531 57532 57533 57534 57535 57536 57537 57538 57539 57540 57541 57542 57543 57544 57545 57546 57547 57548 57549 57550 57551 57552 57553 57554 57555 57556 57557 57558 57559 57560 57561 57562 57563 57564 57565 57566 57567 57568 57569 57570 57571 57572 57573 57574 57575 57576 57577 57578 57579 57580 57581 57582 57583 57584 57585 57586 57587 57588 57589 57590 57591 57592 57593 57594 57595 57596 57597 57598 57599 57600 57601 57602 57603 57604 57605 57606 57607 57608 57609 57610 57611 57612 57613 57614 57615 57616 57617 57618 57619 57620 57621 57622 57623 57624 57625 57626 57627 57628 57629 57630 57631 57632 57633 57634 57635 57636 57637 57638 57639 57640 57641 57642 57643 57644 57645 57646 57647 57648 57649 57650 57651 57652 57653 57654 57655 57656 57657 57658 57659 57660 57661 57662 57663 57664 57665 57666 57667 57668 57669 57670 57671 57672 57673 57674 57675 57676 57677 57678 57679 57680 57681 57682 57683 57684 57685 57686 57687 57688 57689 57690 57691 57692 57693 57694 57695 57696 57697 57698 57699 57700 57701 57702 57703 57704 57705 57706 57707 57708 57709 57710 57711 57712 57713 57714 57715 57716 57717 57718 57719 57720 57721 57722 57723 57724 57725 57726 57727 57728 57729 57730 57731 57732 57733 57734 57735 57736 57737 57738 57739 57740 57741 57742 57743 57744 57745 57746 57747 57748 57749 57750 57751 57752 57753 57754 57755 57756 57757 57758 57759 57760 57761 57762 57763 57764 57765 57766 57767 57768 57769 57770 57771 57772 57773 57774 57775 57776 57777 57778 57779 57780 57781 57782 57783 57784 57785 57786 57787 57788 57789 57790 57791 57792 57793 57794 57795 57796 57797 57798 57799 57800 57801 57802 57803 57804 57805 57806 57807 57808 57809 57810 57811 57812 57813 57814 57815 57816 57817 57818 57819 57820 57821 57822 57823 57824 57825 57826 57827 57828 57829 57830 57831 57832 57833 57834 57835 57836 57837 57838 57839 57840 57841 57842 57843 57844 57845 57846 57847 57848 57849 57850 57851 57852 57853 57854 57855 57856 57857 57858 57859 57860 57861 57862 57863 57864 57865 57866 57867 57868 57869 57870 57871 57872 57873 57874 57875 57876 57877 57878 57879 57880 57881 57882 57883 57884 57885 57886 57887 57888 57889 57890 57891 57892 57893 57894 57895 57896 57897 57898 57899 57900 57901 57902 57903 57904 57905 57906 57907 57908 57909 57910 57911 57912 57913 57914 57915 57916 57917 57918 57919 57920 57921 57922 57923 57924 57925 57926 57927 57928 57929 57930 57931 57932 57933 57934 57935 57936 57937 57938 57939 57940 57941 57942 57943 57944 57945 57946 57947 57948 57949 57950 57951 57952 57953 57954 57955 57956 57957 57958 57959 57960 57961 57962 57963 57964 57965 57966 57967 57968 57969 57970 57971 57972 57973 57974 57975 57976 57977 57978 57979 57980 57981 57982 57983 57984 57985 57986 57987 57988 57989 57990 57991 57992 57993 57994 57995 57996 57997 57998 57999 58000 58001 58002 58003 58004 58005 58006 58007 58008 58009 58010 58011 58012 58013 58014 58015 58016 58017 58018 58019 58020 58021 58022 58023 58024 58025 58026 58027 58028 58029 58030 58031 58032 58033 58034 58035 58036 58037 58038 58039 58040 58041 58042 58043 58044 58045 58046 58047 58048 58049 58050 58051 58052 58053 58054 58055 58056 58057 58058 58059 58060 58061 58062 58063 58064 58065 58066 58067 58068 58069 58070 58071 58072 58073 58074 58075 58076 58077 58078 58079 58080 58081 58082 58083 58084 58085 58086 58087 58088 58089 58090 58091 58092 58093 58094 58095 58096 58097 58098 58099 58100 58101 58102 58103 58104 58105 58106 58107 58108 58109 58110 58111 58112 58113 58114 58115 58116 58117 58118 58119 58120 58121 58122 58123 58124 58125 58126 58127 58128 58129 58130 58131 58132 58133 58134 58135 58136 58137 58138 58139 58140 58141 58142 58143 58144 58145 58146 58147 58148 58149 58150 58151 58152 58153 58154 58155 58156 58157 58158 58159 58160 58161 58162 58163 58164 58165 58166 58167 58168 58169 58170 58171 58172 58173 58174 58175 58176 58177 58178 58179 58180 58181 58182 58183 58184 58185 58186 58187 58188 58189 58190 58191 58192 58193 58194 58195 58196 58197 58198 58199 58200 58201 58202 58203 58204 58205 58206 58207 58208 58209 58210 58211 58212 58213 58214 58215 58216 58217 58218 58219 58220 58221 58222 58223 58224 58225 58226 58227 58228 58229 58230 58231 58232 58233 58234 58235 58236 58237 58238 58239 58240 58241 58242 58243 58244 58245 58246 58247 58248 58249 58250 58251 58252 58253 58254 58255 58256 58257 58258 58259 58260 58261 58262 58263 58264 58265 58266 58267 58268 58269 58270 58271 58272 58273 58274 58275 58276 58277 58278 58279 58280 58281 58282 58283 58284 58285 58286 58287 58288 58289 58290 58291 58292 58293 58294 58295 58296 58297 58298 58299 58300 58301 58302 58303 58304 58305 58306 58307 58308 58309 58310 58311 58312 58313 58314 58315 58316 58317 58318 58319 58320 58321 58322 58323 58324 58325 58326 58327 58328 58329 58330 58331 58332 58333 58334 58335 58336 58337 58338 58339 58340 58341 58342 58343 58344 58345 58346 58347 58348 58349 58350 58351 58352 58353 58354 58355 58356 58357 58358 58359 58360 58361 58362 58363 58364 58365 58366 58367 58368 58369 58370 58371 58372 58373 58374 58375 58376 58377 58378 58379 58380 58381 58382 58383 58384 58385 58386 58387 58388 58389 58390 58391 58392 58393 58394 58395 58396 58397 58398 58399 58400 58401 58402 58403 58404 58405 58406 58407 58408 58409 58410 58411 58412 58413 58414 58415 58416 58417 58418 58419 58420 58421 58422 58423 58424 58425 58426 58427 58428 58429 58430 58431 58432 58433 58434 58435 58436 58437 58438 58439 58440 58441 58442 58443 58444 58445 58446 58447 58448 58449 58450 58451 58452 58453 58454 58455 58456 58457 58458 58459 58460 58461 58462 58463 58464 58465 58466 58467 58468 58469 58470 58471 58472 58473 58474 58475 58476 58477 58478 58479 58480 58481 58482 58483 58484 58485 58486 58487 58488 58489 58490 58491 58492 58493 58494 58495 58496 58497 58498 58499 58500 58501 58502 58503 58504 58505 58506 58507 58508 58509 58510 58511 58512 58513 58514 58515 58516 58517 58518 58519 58520 58521 58522 58523 58524 58525 58526 58527 58528 58529 58530 58531 58532 58533 58534 58535 58536 58537 58538 58539 58540 58541 58542 58543 58544 58545 58546 58547 58548 58549 58550 58551 58552 58553 58554 58555 58556 58557 58558 58559 58560 58561 58562 58563 58564 58565 58566 58567 58568 58569 58570 58571 58572 58573 58574 58575 58576 58577 58578 58579 58580 58581 58582 58583 58584 58585 58586 58587 58588 58589 58590 58591 58592 58593 58594 58595 58596 58597 58598 58599 58600 58601 58602 58603 58604 58605 58606 58607 58608 58609 58610 58611 58612 58613 58614 58615 58616 58617 58618 58619 58620 58621 58622 58623 58624 58625 58626 58627 58628 58629 58630 58631 58632 58633 58634 58635 58636 58637 58638 58639 58640 58641 58642 58643 58644 58645 58646 58647 58648 58649 58650 58651 58652 58653 58654 58655 58656 58657 58658 58659 58660 58661 58662 58663 58664 58665 58666 58667 58668 58669 58670 58671 58672 58673 58674 58675 58676 58677 58678 58679 58680 58681 58682 58683 58684 58685 58686 58687 58688 58689 58690 58691 58692 58693 58694 58695 58696 58697 58698 58699 58700 58701 58702 58703 58704 58705 58706 58707 58708 58709 58710 58711 58712 58713 58714 58715 58716 58717 58718 58719 58720 58721 58722 58723 58724 58725 58726 58727 58728 58729 58730 58731 58732 58733 58734 58735 58736 58737 58738 58739 58740 58741 58742 58743 58744 58745 58746 58747 58748 58749 58750 58751 58752 58753 58754 58755 58756 58757 58758 58759 58760 58761 58762 58763 58764 58765 58766 58767 58768 58769 58770 58771 58772 58773 58774 58775 58776 58777 58778 58779 58780 58781 58782 58783 58784 58785 58786 58787 58788 58789 58790 58791 58792 58793 58794 58795 58796 58797 58798 58799 58800 58801 58802 58803 58804 58805 58806 58807 58808 58809 58810 58811 58812 58813 58814 58815 58816 58817 58818 58819 58820 58821 58822 58823 58824 58825 58826 58827 58828 58829 58830 58831 58832 58833 58834 58835 58836 58837 58838 58839 58840 58841 58842 58843 58844 58845 58846 58847 58848 58849 58850 58851 58852 58853 58854 58855 58856 58857 58858 58859 58860 58861 58862 58863 58864 58865 58866 58867 58868 58869 58870 58871 58872 58873 58874 58875 58876 58877 58878 58879 58880 58881 58882 58883 58884 58885 58886 58887 58888 58889 58890 58891 58892 58893 58894 58895 58896 58897 58898 58899 58900 58901 58902 58903 58904 58905 58906 58907 58908 58909 58910 58911 58912 58913 58914 58915 58916 58917 58918 58919 58920 58921 58922 58923 58924 58925 58926 58927 58928 58929 58930 58931 58932 58933 58934 58935 58936 58937 58938 58939 58940 58941 58942 58943 58944 58945 58946 58947 58948 58949 58950 58951 58952 58953 58954 58955 58956 58957 58958 58959 58960 58961 58962 58963 58964 58965 58966 58967 58968 58969 58970 58971 58972 58973 58974 58975 58976 58977 58978 58979 58980 58981 58982 58983 58984 58985 58986 58987 58988 58989 58990 58991 58992 58993 58994 58995 58996 58997 58998 58999 59000 59001 59002 59003 59004 59005 59006 59007 59008 59009 59010 59011 59012 59013 59014 59015 59016 59017 59018 59019 59020 59021 59022 59023 59024 59025 59026 59027 59028 59029 59030 59031 59032 59033 59034 59035 59036 59037 59038 59039 59040 59041 59042 59043 59044 59045 59046 59047 59048 59049 59050 59051 59052 59053 59054 59055 59056 59057 59058 59059 59060 59061 59062 59063 59064 59065 59066 59067 59068 59069 59070 59071 59072 59073 59074 59075 59076 59077 59078 59079 59080 59081 59082 59083 59084 59085 59086 59087 59088 59089 59090 59091 59092 59093 59094 59095 59096 59097 59098 59099 59100 59101 59102 59103 59104 59105 59106 59107 59108 59109 59110 59111 59112 59113 59114 59115 59116 59117 59118 59119 59120 59121 59122 59123 59124 59125 59126 59127 59128 59129 59130 59131 59132 59133 59134 59135 59136 59137 59138 59139 59140 59141 59142 59143 59144 59145 59146 59147 59148 59149 59150 59151 59152 59153 59154 59155 59156 59157 59158 59159 59160 59161 59162 59163 59164 59165 59166 59167 59168 59169 59170 59171 59172 59173 59174 59175 59176 59177 59178 59179 59180 59181 59182 59183 59184 59185 59186 59187 59188 59189 59190 59191 59192 59193 59194 59195 59196 59197 59198 59199 59200 59201 59202 59203 59204 59205 59206 59207 59208 59209 59210 59211 59212 59213 59214 59215 59216 59217 59218 59219 59220 59221 59222 59223 59224 59225 59226 59227 59228 59229 59230 59231 59232 59233 59234 59235 59236 59237 59238 59239 59240 59241 59242 59243 59244 59245 59246 59247 59248 59249 59250 59251 59252 59253 59254 59255 59256 59257 59258 59259 59260 59261 59262 59263 59264 59265 59266 59267 59268 59269 59270 59271 59272 59273 59274 59275 59276 59277 59278 59279 59280 59281 59282 59283 59284 59285 59286 59287 59288 59289 59290 59291 59292 59293 59294 59295 59296 59297 59298 59299 59300 59301 59302 59303 59304 59305 59306 59307 59308 59309 59310 59311 59312 59313 59314 59315 59316 59317 59318 59319 59320 59321 59322 59323 59324 59325 59326 59327 59328 59329 59330 59331 59332 59333 59334 59335 59336 59337 59338 59339 59340 59341 59342 59343 59344 59345 59346 59347 59348 59349 59350 59351 59352 59353 59354 59355 59356 59357 59358 59359 59360 59361 59362 59363 59364 59365 59366 59367 59368 59369 59370 59371 59372 59373 59374 59375 59376 59377 59378 59379 59380 59381 59382 59383 59384 59385 59386 59387 59388 59389 59390 59391 59392 59393 59394 59395 59396 59397 59398 59399 59400 59401 59402 59403 59404 59405 59406 59407 59408 59409 59410 59411 59412 59413 59414 59415 59416 59417 59418 59419 59420 59421 59422 59423 59424 59425 59426 59427 59428 59429 59430 59431 59432 59433 59434 59435 59436 59437 59438 59439 59440 59441 59442 59443 59444 59445 59446 59447 59448 59449 59450 59451 59452 59453 59454 59455 59456 59457 59458 59459 59460 59461 59462 59463 59464 59465 59466 59467 59468 59469 59470 59471 59472 59473 59474 59475 59476 59477 59478 59479 59480 59481 59482 59483 59484 59485 59486 59487 59488 59489 59490 59491 59492 59493 59494 59495 59496 59497 59498 59499 59500 59501 59502 59503 59504 59505 59506 59507 59508 59509 59510 59511 59512 59513 59514 59515 59516 59517 59518 59519 59520 59521 59522 59523 59524 59525 59526 59527 59528 59529 59530 59531 59532 59533 59534 59535 59536 59537 59538 59539 59540 59541 59542 59543 59544 59545 59546 59547 59548 59549 59550 59551 59552 59553 59554 59555 59556 59557 59558 59559 59560 59561 59562 59563 59564 59565 59566 59567 59568 59569 59570 59571 59572 59573 59574 59575 59576 59577 59578 59579 59580 59581 59582 59583 59584 59585 59586 59587 59588 59589 59590 59591 59592 59593 59594 59595 59596 59597 59598 59599 59600 59601 59602 59603 59604 59605 59606 59607 59608 59609 59610 59611 59612 59613 59614 59615 59616 59617 59618 59619 59620 59621 59622 59623 59624 59625 59626 59627 59628 59629 59630 59631 59632 59633 59634 59635 59636 59637 59638 59639 59640 59641 59642 59643 59644 59645 59646 59647 59648 59649 59650 59651 59652 59653 59654 59655 59656 59657 59658 59659 59660 59661 59662 59663 59664 59665 59666 59667 59668 59669 59670 59671 59672 59673 59674 59675 59676 59677 59678 59679 59680 59681 59682 59683 59684 59685 59686 59687 59688 59689 59690 59691 59692 59693 59694 59695 59696 59697 59698 59699 59700 59701 59702 59703 59704 59705 59706 59707 59708 59709 59710 59711 59712 59713 59714 59715 59716 59717 59718 59719 59720 59721 59722 59723 59724 59725 59726 59727 59728 59729 59730 59731 59732 59733 59734 59735 59736 59737 59738 59739 59740 59741 59742 59743 59744 59745 59746 59747 59748 59749 59750 59751 59752 59753 59754 59755 59756 59757 59758 59759 59760 59761 59762 59763 59764 59765 59766 59767 59768 59769 59770 59771 59772 59773 59774 59775 59776 59777 59778 59779 59780 59781 59782 59783 59784 59785 59786 59787 59788 59789 59790 59791 59792 59793 59794 59795 59796 59797 59798 59799 59800 59801 59802 59803 59804 59805 59806 59807 59808 59809 59810 59811 59812 59813 59814 59815 59816 59817 59818 59819 59820 59821 59822 59823 59824 59825 59826 59827 59828 59829 59830 59831 59832 59833 59834 59835 59836 59837 59838 59839 59840 59841 59842 59843 59844 59845 59846 59847 59848 59849 59850 59851 59852 59853 59854 59855 59856 59857 59858 59859 59860 59861 59862 59863 59864 59865 59866 59867 59868 59869 59870 59871 59872 59873 59874 59875 59876 59877 59878 59879 59880 59881 59882 59883 59884 59885 59886 59887 59888 59889 59890 59891 59892 59893 59894 59895 59896 59897 59898 59899 59900 59901 59902 59903 59904 59905 59906 59907 59908 59909 59910 59911 59912 59913 59914 59915 59916 59917 59918 59919 59920 59921 59922 59923 59924 59925 59926 59927 59928 59929 59930 59931 59932 59933 59934 59935 59936 59937 59938 59939 59940 59941 59942 59943 59944 59945 59946 59947 59948 59949 59950 59951 59952 59953 59954 59955 59956 59957 59958 59959 59960 59961 59962 59963 59964 59965 59966 59967 59968 59969 59970 59971 59972 59973 59974 59975 59976 59977 59978 59979 59980 59981 59982 59983 59984 59985 59986 59987 59988 59989 59990 59991 59992 59993 59994 59995 59996 59997 59998 59999 60000 60001 60002 60003 60004 60005 60006 60007 60008 60009 60010 60011 60012 60013 60014 60015 60016 60017 60018 60019 60020 60021 60022 60023 60024 60025 60026 60027 60028 60029 60030 60031 60032 60033 60034 60035 60036 60037 60038 60039 60040 60041 60042 60043 60044 60045 60046 60047 60048 60049 60050 60051 60052 60053 60054 60055 60056 60057 60058 60059 60060 60061 60062 60063 60064 60065 60066 60067 60068 60069 60070 60071 60072 60073 60074 60075 60076 60077 60078 60079 60080 60081 60082 60083 60084 60085 60086 60087 60088 60089 60090 60091 60092 60093 60094 60095 60096 60097 60098 60099 60100 60101 60102 60103 60104 60105 60106 60107 60108 60109 60110 60111 60112 60113 60114 60115 60116 60117 60118 60119 60120 60121 60122 60123 60124 60125 60126 60127 60128 60129 60130 60131 60132 60133 60134 60135 60136 60137 60138 60139 60140 60141 60142 60143 60144 60145 60146 60147 60148 60149 60150 60151 60152 60153 60154 60155 60156 60157 60158 60159 60160 60161 60162 60163 60164 60165 60166 60167 60168 60169 60170 60171 60172 60173 60174 60175 60176 60177 60178 60179 60180 60181 60182 60183 60184 60185 60186 60187 60188 60189 60190 60191 60192 60193 60194 60195 60196 60197 60198 60199 60200 60201 60202 60203 60204 60205 60206 60207 60208 60209 60210 60211 60212 60213 60214 60215 60216 60217 60218 60219 60220 60221 60222 60223 60224 60225 60226 60227 60228 60229 60230 60231 60232 60233 60234 60235 60236 60237 60238 60239 60240 60241 60242 60243 60244 60245 60246 60247 60248 60249 60250 60251 60252 60253 60254 60255 60256 60257 60258 60259 60260 60261 60262 60263 60264 60265 60266 60267 60268 60269 60270 60271 60272 60273 60274 60275 60276 60277 60278 60279 60280 60281 60282 60283 60284 60285 60286 60287 60288 60289 60290 60291 60292 60293 60294 60295 60296 60297 60298 60299 60300 60301 60302 60303 60304 60305 60306 60307 60308 60309 60310 60311 60312 60313 60314 60315 60316 60317 60318 60319 60320 60321 60322 60323 60324 60325 60326 60327 60328 60329 60330 60331 60332 60333 60334 60335 60336 60337 60338 60339 60340 60341 60342 60343 60344 60345 60346 60347 60348 60349 60350 60351 60352 60353 60354 60355 60356 60357 60358 60359 60360 60361 60362 60363 60364 60365 60366 60367 60368 60369 60370 60371 60372 60373 60374 60375 60376 60377 60378 60379 60380 60381 60382 60383 60384 60385 60386 60387 60388 60389 60390 60391 60392 60393 60394 60395 60396 60397 60398 60399 60400 60401 60402 60403 60404 60405 60406 60407 60408 60409 60410 60411 60412 60413 60414 60415 60416 60417 60418 60419 60420 60421 60422 60423 60424 60425 60426 60427 60428 60429 60430 60431 60432 60433 60434 60435 60436 60437 60438 60439 60440 60441 60442 60443 60444 60445 60446 60447 60448 60449 60450 60451 60452 60453 60454 60455 60456 60457 60458 60459 60460 60461 60462 60463 60464 60465 60466 60467 60468 60469 60470 60471 60472 60473 60474 60475 60476 60477 60478 60479 60480 60481 60482 60483 60484 60485 60486 60487 60488 60489 60490 60491 60492 60493 60494 60495 60496 60497 60498 60499 60500 60501 60502 60503 60504 60505 60506 60507 60508 60509 60510 60511 60512 60513 60514 60515 60516 60517 60518 60519 60520 60521 60522 60523 60524 60525 60526 60527 60528 60529 60530 60531 60532 60533 60534 60535 60536 60537 60538 60539 60540 60541 60542 60543 60544 60545 60546 60547 60548 60549 60550 60551 60552 60553 60554 60555 60556 60557 60558 60559 60560 60561 60562 60563 60564 60565 60566 60567 60568 60569 60570 60571 60572 60573 60574 60575 60576 60577 60578 60579 60580 60581 60582 60583 60584 60585 60586 60587 60588 60589 60590 60591 60592 60593 60594 60595 60596 60597 60598 60599 60600 60601 60602 60603 60604 60605 60606 60607 60608 60609 60610 60611 60612 60613 60614 60615 60616 60617 60618 60619 60620 60621 60622 60623 60624 60625 60626 60627 60628 60629 60630 60631 60632 60633 60634 60635 60636 60637 60638 60639 60640 60641 60642 60643 60644 60645 60646 60647 60648 60649 60650 60651 60652 60653 60654 60655 60656 60657 60658 60659 60660 60661 60662 60663 60664 60665 60666 60667 60668 60669 60670 60671 60672 60673 60674 60675 60676 60677 60678 60679 60680 60681 60682 60683 60684 60685 60686 60687 60688 60689 60690 60691 60692 60693 60694 60695 60696 60697 60698 60699 60700 60701 60702 60703 60704 60705 60706 60707 60708 60709 60710 60711 60712 60713 60714 60715 60716 60717 60718 60719 60720 60721 60722 60723 60724 60725 60726 60727 60728 60729 60730 60731 60732 60733 60734 60735 60736 60737 60738 60739 60740 60741 60742 60743 60744 60745 60746 60747 60748 60749 60750 60751 60752 60753 60754 60755 60756 60757 60758 60759 60760 60761 60762 60763 60764 60765 60766 60767 60768 60769 60770 60771 60772 60773 60774 60775 60776 60777 60778 60779 60780 60781 60782 60783 60784 60785 60786 60787 60788 60789 60790 60791 60792 60793 60794 60795 60796 60797 60798 60799 60800 60801 60802 60803 60804 60805 60806 60807 60808 60809 60810 60811 60812 60813 60814 60815 60816 60817 60818 60819 60820 60821 60822 60823 60824 60825 60826 60827 60828 60829 60830 60831 60832 60833 60834 60835 60836 60837 60838 60839 60840 60841 60842 60843 60844 60845 60846 60847 60848 60849 60850 60851 60852 60853 60854 60855 60856 60857 60858 60859 60860 60861 60862 60863 60864 60865 60866 60867 60868 60869 60870 60871 60872 60873 60874 60875 60876 60877 60878 60879 60880 60881 60882 60883 60884 60885 60886 60887 60888 60889 60890 60891 60892 60893 60894 60895 60896 60897 60898 60899 60900 60901 60902 60903 60904 60905 60906 60907 60908 60909 60910 60911 60912 60913 60914 60915 60916 60917 60918 60919 60920 60921 60922 60923 60924 60925 60926 60927 60928 60929 60930 60931 60932 60933 60934 60935 60936 60937 60938 60939 60940 60941 60942 60943 60944 60945 60946 60947 60948 60949 60950 60951 60952 60953 60954 60955 60956 60957 60958 60959 60960 60961 60962 60963 60964 60965 60966 60967 60968 60969 60970 60971 60972 60973 60974 60975 60976 60977 60978 60979 60980 60981 60982 60983 60984 60985 60986 60987 60988 60989 60990 60991 60992 60993 60994 60995 60996 60997 60998 60999 61000 61001 61002 61003 61004 61005 61006 61007 61008 61009 61010 61011 61012 61013 61014 61015 61016 61017 61018 61019 61020 61021 61022 61023 61024 61025 61026 61027 61028 61029 61030 61031 61032 61033 61034 61035 61036 61037 61038 61039 61040 61041 61042 61043 61044 61045 61046 61047 61048 61049 61050 61051 61052 61053 61054 61055 61056 61057 61058 61059 61060 61061 61062 61063 61064 61065 61066 61067 61068 61069 61070 61071 61072 61073 61074 61075 61076 61077 61078 61079 61080 61081 61082 61083 61084 61085 61086 61087 61088 61089 61090 61091 61092 61093 61094 61095 61096 61097 61098 61099 61100 61101 61102 61103 61104 61105 61106 61107 61108 61109 61110 61111 61112 61113 61114 61115 61116 61117 61118 61119 61120 61121 61122 61123 61124 61125 61126 61127 61128 61129 61130 61131 61132 61133 61134 61135 61136 61137 61138 61139 61140 61141 61142 61143 61144 61145 61146 61147 61148 61149 61150 61151 61152 61153 61154 61155 61156 61157 61158 61159 61160 61161 61162 61163 61164 61165 61166 61167 61168 61169 61170 61171 61172 61173 61174 61175 61176 61177 61178 61179 61180 61181 61182 61183 61184 61185 61186 61187 61188 61189 61190 61191 61192 61193 61194 61195 61196 61197 61198 61199 61200 61201 61202 61203 61204 61205 61206 61207 61208 61209 61210 61211 61212 61213 61214 61215 61216 61217 61218 61219 61220 61221 61222 61223 61224 61225 61226 61227 61228 61229 61230 61231 61232 61233 61234 61235 61236 61237 61238 61239 61240 61241 61242 61243 61244 61245 61246 61247 61248 61249 61250 61251 61252 61253 61254 61255 61256 61257 61258 61259 61260 61261 61262 61263 61264 61265 61266 61267 61268 61269 61270 61271 61272 61273 61274 61275 61276 61277 61278 61279 61280 61281 61282 61283 61284 61285 61286 61287 61288 61289 61290 61291 61292 61293 61294 61295 61296 61297 61298 61299 61300 61301 61302 61303 61304 61305 61306 61307 61308 61309 61310 61311 61312 61313 61314 61315 61316 61317 61318 61319 61320 61321 61322 61323 61324 61325 61326 61327 61328 61329 61330 61331 61332 61333 61334 61335 61336 61337 61338 61339 61340 61341 61342 61343 61344 61345 61346 61347 61348 61349 61350 61351 61352 61353 61354 61355 61356 61357 61358 61359 61360 61361 61362 61363 61364 61365 61366 61367 61368 61369 61370 61371 61372 61373 61374 61375 61376 61377 61378 61379 61380 61381 61382 61383 61384 61385 61386 61387 61388 61389 61390 61391 61392 61393 61394 61395 61396 61397 61398 61399 61400 61401 61402 61403 61404 61405 61406 61407 61408 61409 61410 61411 61412 61413 61414 61415 61416 61417 61418 61419 61420 61421 61422 61423 61424 61425 61426 61427 61428 61429 61430 61431 61432 61433 61434 61435 61436 61437 61438 61439 61440 61441 61442 61443 61444 61445 61446 61447 61448 61449 61450 61451 61452 61453 61454 61455 61456 61457 61458 61459 61460 61461 61462 61463 61464 61465 61466 61467 61468 61469 61470 61471 61472 61473 61474 61475 61476 61477 61478 61479 61480 61481 61482 61483 61484 61485 61486 61487 61488 61489 61490 61491 61492 61493 61494 61495 61496 61497 61498 61499 61500 61501 61502 61503 61504 61505 61506 61507 61508 61509 61510 61511 61512 61513 61514 61515 61516 61517 61518 61519 61520 61521 61522 61523 61524 61525 61526 61527 61528 61529 61530 61531 61532 61533 61534 61535 61536 61537 61538 61539 61540 61541 61542 61543 61544 61545 61546 61547 61548 61549 61550 61551 61552 61553 61554 61555 61556 61557 61558 61559 61560 61561 61562 61563 61564 61565 61566 61567 61568 61569 61570 61571 61572 61573 61574 61575 61576 61577 61578 61579 61580 61581 61582 61583 61584 61585 61586 61587 61588 61589 61590 61591 61592 61593 61594 61595 61596 61597 61598 61599 61600 61601 61602 61603 61604 61605 61606 61607 61608 61609 61610 61611 61612 61613 61614 61615 61616 61617 61618 61619 61620 61621 61622 61623 61624 61625 61626 61627 61628 61629 61630 61631 61632 61633 61634 61635 61636 61637 61638 61639 61640 61641 61642 61643 61644 61645 61646 61647 61648 61649 61650 61651 61652 61653 61654 61655 61656 61657 61658 61659 61660 61661 61662 61663 61664 61665 61666 61667 61668 61669 61670 61671 61672 61673 61674 61675 61676 61677 61678 61679 61680 61681 61682 61683 61684 61685 61686 61687 61688 61689 61690 61691 61692 61693 61694 61695 61696 61697 61698 61699 61700 61701 61702 61703 61704 61705 61706 61707 61708 61709 61710 61711 61712 61713 61714 61715 61716 61717 61718 61719 61720 61721 61722 61723 61724 61725 61726 61727 61728 61729 61730 61731 61732 61733 61734 61735 61736 61737 61738 61739 61740 61741 61742 61743 61744 61745 61746 61747 61748 61749 61750 61751 61752 61753 61754 61755 61756 61757 61758 61759 61760 61761 61762 61763 61764 61765 61766 61767 61768 61769 61770 61771 61772 61773 61774 61775 61776 61777 61778 61779 61780 61781 61782 61783 61784 61785 61786 61787 61788 61789 61790 61791 61792 61793 61794 61795 61796 61797 61798 61799 61800 61801 61802 61803 61804 61805 61806 61807 61808 61809 61810 61811 61812 61813 61814 61815 61816 61817 61818 61819 61820 61821 61822 61823 61824 61825 61826 61827 61828 61829 61830 61831 61832 61833 61834 61835 61836 61837 61838 61839 61840 61841 61842 61843 61844 61845 61846 61847 61848 61849 61850 61851 61852 61853 61854 61855 61856 61857 61858 61859 61860 61861 61862 61863 61864 61865 61866 61867 61868 61869 61870 61871 61872 61873 61874 61875 61876 61877 61878 61879 61880 61881 61882 61883 61884 61885 61886 61887 61888 61889 61890 61891 61892 61893 61894 61895 61896 61897 61898 61899 61900 61901 61902 61903 61904 61905 61906 61907 61908 61909 61910 61911 61912 61913 61914 61915 61916 61917 61918 61919 61920 61921 61922 61923 61924 61925 61926 61927 61928 61929 61930 61931 61932 61933 61934 61935 61936 61937 61938 61939 61940 61941 61942 61943 61944 61945 61946 61947 61948 61949 61950 61951 61952 61953 61954 61955 61956 61957 61958 61959 61960 61961 61962 61963 61964 61965 61966 61967 61968 61969 61970 61971 61972 61973 61974 61975 61976 61977 61978 61979 61980 61981 61982 61983 61984 61985 61986 61987 61988 61989 61990 61991 61992 61993 61994 61995 61996 61997 61998 61999 62000 62001 62002 62003 62004 62005 62006 62007 62008 62009 62010 62011 62012 62013 62014 62015 62016 62017 62018 62019 62020 62021 62022 62023 62024 62025 62026 62027 62028 62029 62030 62031 62032 62033 62034 62035 62036 62037 62038 62039 62040 62041 62042 62043 62044 62045 62046 62047 62048 62049 62050 62051 62052 62053 62054 62055 62056 62057 62058 62059 62060 62061 62062 62063 62064 62065 62066 62067 62068 62069 62070 62071 62072 62073 62074 62075 62076 62077 62078 62079 62080 62081 62082 62083 62084 62085 62086 62087 62088 62089 62090 62091 62092 62093 62094 62095 62096 62097 62098 62099 62100 62101 62102 62103 62104 62105 62106 62107 62108 62109 62110 62111 62112 62113 62114 62115 62116 62117 62118 62119 62120 62121 62122 62123 62124 62125 62126 62127 62128 62129 62130 62131 62132 62133 62134 62135 62136 62137 62138 62139 62140 62141 62142 62143 62144 62145 62146 62147 62148 62149 62150 62151 62152 62153 62154 62155 62156 62157 62158 62159 62160 62161 62162 62163 62164 62165 62166 62167 62168 62169 62170 62171 62172 62173 62174 62175 62176 62177 62178 62179 62180 62181 62182 62183 62184 62185 62186 62187 62188 62189 62190 62191 62192 62193 62194 62195 62196 62197 62198 62199 62200 62201 62202 62203 62204 62205 62206 62207 62208 62209 62210 62211 62212 62213 62214 62215 62216 62217 62218 62219 62220 62221 62222 62223 62224 62225 62226 62227 62228 62229 62230 62231 62232 62233 62234 62235 62236 62237 62238 62239 62240 62241 62242 62243 62244 62245 62246 62247 62248 62249 62250 62251 62252 62253 62254 62255 62256 62257 62258 62259 62260 62261 62262 62263 62264 62265 62266 62267 62268 62269 62270 62271 62272 62273 62274 62275 62276 62277 62278 62279 62280 62281 62282 62283 62284 62285 62286 62287 62288 62289 62290 62291 62292 62293 62294 62295 62296 62297 62298 62299 62300 62301 62302 62303 62304 62305 62306 62307 62308 62309 62310 62311 62312 62313 62314 62315 62316 62317 62318 62319 62320 62321 62322 62323 62324 62325 62326 62327 62328 62329 62330 62331 62332 62333 62334 62335 62336 62337 62338 62339 62340 62341 62342 62343 62344 62345 62346 62347 62348 62349 62350 62351 62352 62353 62354 62355 62356 62357 62358 62359 62360 62361 62362 62363 62364 62365 62366 62367 62368 62369 62370 62371 62372 62373 62374 62375 62376 62377 62378 62379 62380 62381 62382 62383 62384 62385 62386 62387 62388 62389 62390 62391 62392 62393 62394 62395 62396 62397 62398 62399 62400 62401 62402 62403 62404 62405 62406 62407 62408 62409 62410 62411 62412 62413 62414 62415 62416 62417 62418 62419 62420 62421 62422 62423 62424 62425 62426 62427 62428 62429 62430 62431 62432 62433 62434 62435 62436 62437 62438 62439 62440 62441 62442 62443 62444 62445 62446 62447 62448 62449 62450 62451 62452 62453 62454 62455 62456 62457 62458 62459 62460 62461 62462 62463 62464 62465 62466 62467 62468 62469 62470 62471 62472 62473 62474 62475 62476 62477 62478 62479 62480 62481 62482 62483 62484 62485 62486 62487 62488 62489 62490 62491 62492 62493 62494 62495 62496 62497 62498 62499 62500 62501 62502 62503 62504 62505 62506 62507 62508 62509 62510 62511 62512 62513 62514 62515 62516 62517 62518 62519 62520 62521 62522 62523 62524 62525 62526 62527 62528 62529 62530 62531 62532 62533 62534 62535 62536 62537 62538 62539 62540 62541 62542 62543 62544 62545 62546 62547 62548 62549 62550 62551 62552 62553 62554 62555 62556 62557 62558 62559 62560 62561 62562 62563 62564 62565 62566 62567 62568 62569 62570 62571 62572 62573 62574 62575 62576 62577 62578 62579 62580 62581 62582 62583 62584 62585 62586 62587 62588 62589 62590 62591 62592 62593 62594 62595 62596 62597 62598 62599 62600 62601 62602 62603 62604 62605 62606 62607 62608 62609 62610 62611 62612 62613 62614 62615 62616 62617 62618 62619 62620 62621 62622 62623 62624 62625 62626 62627 62628 62629 62630 62631 62632 62633 62634 62635 62636 62637 62638 62639 62640 62641 62642 62643 62644 62645 62646 62647 62648 62649 62650 62651 62652 62653 62654 62655 62656 62657 62658 62659 62660 62661 62662 62663 62664 62665 62666 62667 62668 62669 62670 62671 62672 62673 62674 62675 62676 62677 62678 62679 62680 62681 62682 62683 62684 62685 62686 62687 62688 62689 62690 62691 62692 62693 62694 62695 62696 62697 62698 62699 62700 62701 62702 62703 62704 62705 62706 62707 62708 62709 62710 62711 62712 62713 62714 62715 62716 62717 62718 62719 62720 62721 62722 62723 62724 62725 62726 62727 62728 62729 62730 62731 62732 62733 62734 62735 62736 62737 62738 62739 62740 62741 62742 62743 62744 62745 62746 62747 62748 62749 62750 62751 62752 62753 62754 62755 62756 62757 62758 62759 62760 62761 62762 62763 62764 62765 62766 62767 62768 62769 62770 62771 62772 62773 62774 62775 62776 62777 62778 62779 62780 62781 62782 62783 62784 62785 62786 62787 62788 62789 62790 62791 62792 62793 62794 62795 62796 62797 62798 62799 62800 62801 62802 62803 62804 62805 62806 62807 62808 62809 62810 62811 62812 62813 62814 62815 62816 62817 62818 62819 62820 62821 62822 62823 62824 62825 62826 62827 62828 62829 62830 62831 62832 62833 62834 62835 62836 62837 62838 62839 62840 62841 62842 62843 62844 62845 62846 62847 62848 62849 62850 62851 62852 62853 62854 62855 62856 62857 62858 62859 62860 62861 62862 62863 62864 62865 62866 62867 62868 62869 62870 62871 62872 62873 62874 62875 62876 62877 62878 62879 62880 62881 62882 62883 62884 62885 62886 62887 62888 62889 62890 62891 62892 62893 62894 62895 62896 62897 62898 62899 62900 62901 62902 62903 62904 62905 62906 62907 62908 62909 62910 62911 62912 62913 62914 62915 62916 62917 62918 62919 62920 62921 62922 62923 62924 62925 62926 62927 62928 62929 62930 62931 62932 62933 62934 62935 62936 62937 62938 62939 62940 62941 62942 62943 62944 62945 62946 62947 62948 62949 62950 62951 62952 62953 62954 62955 62956 62957 62958 62959 62960 62961 62962 62963 62964 62965 62966 62967 62968 62969 62970 62971 62972 62973 62974 62975 62976 62977 62978 62979 62980 62981 62982 62983 62984 62985 62986 62987 62988 62989 62990 62991 62992 62993 62994 62995 62996 62997 62998 62999 63000 63001 63002 63003 63004 63005 63006 63007 63008 63009 63010 63011 63012 63013 63014 63015 63016 63017 63018 63019 63020 63021 63022 63023 63024 63025 63026 63027 63028 63029 63030 63031 63032 63033 63034 63035 63036 63037 63038 63039 63040 63041 63042 63043 63044 63045 63046 63047 63048 63049 63050 63051 63052 63053 63054 63055 63056 63057 63058 63059 63060 63061 63062 63063 63064 63065 63066 63067 63068 63069 63070 63071 63072 63073 63074 63075 63076 63077 63078 63079 63080 63081 63082 63083 63084 63085 63086 63087 63088 63089 63090 63091 63092 63093 63094 63095 63096 63097 63098 63099 63100 63101 63102 63103 63104 63105 63106 63107 63108 63109 63110 63111 63112 63113 63114 63115 63116 63117 63118 63119 63120 63121 63122 63123 63124 63125 63126 63127 63128 63129 63130 63131 63132 63133 63134 63135 63136 63137 63138 63139 63140 63141 63142 63143 63144 63145 63146 63147 63148 63149 63150 63151 63152 63153 63154 63155 63156 63157 63158 63159 63160 63161 63162 63163 63164 63165 63166 63167 63168 63169 63170 63171 63172 63173 63174 63175 63176 63177 63178 63179 63180 63181 63182 63183 63184 63185 63186 63187 63188 63189 63190 63191 63192 63193 63194 63195 63196 63197 63198 63199 63200 63201 63202 63203 63204 63205 63206 63207 63208 63209 63210 63211 63212 63213 63214 63215 63216 63217 63218 63219 63220 63221 63222 63223 63224 63225 63226 63227 63228 63229 63230 63231 63232 63233 63234 63235 63236 63237 63238 63239 63240 63241 63242 63243 63244 63245 63246 63247 63248 63249 63250 63251 63252 63253 63254 63255 63256 63257 63258 63259 63260 63261 63262 63263 63264 63265 63266 63267 63268 63269 63270 63271 63272 63273 63274 63275 63276 63277 63278 63279 63280 63281 63282 63283 63284 63285 63286 63287 63288 63289 63290 63291 63292 63293 63294 63295 63296 63297 63298 63299 63300 63301 63302 63303 63304 63305 63306 63307 63308 63309 63310 63311 63312 63313 63314 63315 63316 63317 63318 63319 63320 63321 63322 63323 63324 63325 63326 63327 63328 63329 63330 63331 63332 63333 63334 63335 63336 63337 63338 63339 63340 63341 63342 63343 63344 63345 63346 63347 63348 63349 63350 63351 63352 63353 63354 63355 63356 63357 63358 63359 63360 63361 63362 63363 63364 63365 63366 63367 63368 63369 63370 63371 63372 63373 63374 63375 63376 63377 63378 63379 63380 63381 63382 63383 63384 63385 63386 63387 63388 63389 63390 63391 63392 63393 63394 63395 63396 63397 63398 63399 63400 63401 63402 63403 63404 63405 63406 63407 63408 63409 63410 63411 63412 63413 63414 63415 63416 63417 63418 63419 63420 63421 63422 63423 63424 63425 63426 63427 63428 63429 63430 63431 63432 63433 63434 63435 63436 63437 63438 63439 63440 63441 63442 63443 63444 63445 63446 63447 63448 63449 63450 63451 63452 63453 63454 63455 63456 63457 63458 63459 63460 63461 63462 63463 63464 63465 63466 63467 63468 63469 63470 63471 63472 63473 63474 63475 63476 63477 63478 63479 63480 63481 63482 63483 63484 63485 63486 63487 63488 63489 63490 63491 63492 63493 63494 63495 63496 63497 63498 63499 63500 63501 63502 63503 63504 63505 63506 63507 63508 63509 63510 63511 63512 63513 63514 63515 63516 63517 63518 63519 63520 63521 63522 63523 63524 63525 63526 63527 63528 63529 63530 63531 63532 63533 63534 63535 63536 63537 63538 63539 63540 63541 63542 63543 63544 63545 63546 63547 63548 63549 63550 63551 63552 63553 63554 63555 63556 63557 63558 63559 63560 63561 63562 63563 63564 63565 63566 63567 63568 63569 63570 63571 63572 63573 63574 63575 63576 63577 63578 63579 63580 63581 63582 63583 63584 63585 63586 63587 63588 63589 63590 63591 63592 63593 63594 63595 63596 63597 63598 63599 63600 63601 63602 63603 63604 63605 63606 63607 63608 63609 63610 63611 63612 63613 63614 63615 63616 63617 63618 63619 63620 63621 63622 63623 63624 63625 63626 63627 63628 63629 63630 63631 63632 63633 63634 63635 63636 63637 63638 63639 63640 63641 63642 63643 63644 63645 63646 63647 63648 63649 63650 63651 63652 63653 63654 63655 63656 63657 63658 63659 63660 63661 63662 63663 63664 63665 63666 63667 63668 63669 63670 63671 63672 63673 63674 63675 63676 63677 63678 63679 63680 63681 63682 63683 63684 63685 63686 63687 63688 63689 63690 63691 63692 63693 63694 63695 63696 63697 63698 63699 63700 63701 63702 63703 63704 63705 63706 63707 63708 63709 63710 63711 63712 63713 63714 63715 63716 63717 63718 63719 63720 63721 63722 63723 63724 63725 63726 63727 63728 63729 63730 63731 63732 63733 63734 63735 63736 63737 63738 63739 63740 63741 63742 63743 63744 63745 63746 63747 63748 63749 63750 63751 63752 63753 63754 63755 63756 63757 63758 63759 63760 63761 63762 63763 63764 63765 63766 63767 63768 63769 63770 63771 63772 63773 63774 63775 63776 63777 63778 63779 63780 63781 63782 63783 63784 63785 63786 63787 63788 63789 63790 63791 63792 63793 63794 63795 63796 63797 63798 63799 63800 63801 63802 63803 63804 63805 63806 63807 63808 63809 63810 63811 63812 63813 63814 63815 63816 63817 63818 63819 63820 63821 63822 63823 63824 63825 63826 63827 63828 63829 63830 63831 63832 63833 63834 63835 63836 63837 63838 63839 63840 63841 63842 63843 63844 63845 63846 63847 63848 63849 63850 63851 63852 63853 63854 63855 63856 63857 63858 63859 63860 63861 63862 63863 63864 63865 63866 63867 63868 63869 63870 63871 63872 63873 63874 63875 63876 63877 63878 63879 63880 63881 63882 63883 63884 63885 63886 63887 63888 63889 63890 63891 63892 63893 63894 63895 63896 63897 63898 63899 63900 63901 63902 63903 63904 63905 63906 63907 63908 63909 63910 63911 63912 63913 63914 63915 63916 63917 63918 63919 63920 63921 63922 63923 63924 63925 63926 63927 63928 63929 63930 63931 63932 63933 63934 63935 63936 63937 63938 63939 63940 63941 63942 63943 63944 63945 63946 63947 63948 63949 63950 63951 63952 63953 63954 63955 63956 63957 63958 63959 63960 63961 63962 63963 63964 63965 63966 63967 63968 63969 63970 63971 63972 63973 63974 63975 63976 63977 63978 63979 63980 63981 63982 63983 63984 63985 63986 63987 63988 63989 63990 63991 63992 63993 63994 63995 63996 63997 63998 63999 64000 64001 64002 64003 64004 64005 64006 64007 64008 64009 64010 64011 64012 64013 64014 64015 64016 64017 64018 64019 64020 64021 64022 64023 64024 64025 64026 64027 64028 64029 64030 64031 64032 64033 64034 64035 64036 64037 64038 64039 64040 64041 64042 64043 64044 64045 64046 64047 64048 64049 64050 64051 64052 64053 64054 64055 64056 64057 64058 64059 64060 64061 64062 64063 64064 64065 64066 64067 64068 64069 64070 64071 64072 64073 64074 64075 64076 64077 64078 64079 64080 64081 64082 64083 64084 64085 64086 64087 64088 64089 64090 64091 64092 64093 64094 64095 64096 64097 64098 64099 64100 64101 64102 64103 64104 64105 64106 64107 64108 64109 64110 64111 64112 64113 64114 64115 64116 64117 64118 64119 64120 64121 64122 64123 64124 64125 64126 64127 64128 64129 64130 64131 64132 64133 64134 64135 64136 64137 64138 64139 64140 64141 64142 64143 64144 64145 64146 64147 64148 64149 64150 64151 64152 64153 64154 64155 64156 64157 64158 64159 64160 64161 64162 64163 64164 64165 64166 64167 64168 64169 64170 64171 64172 64173 64174 64175 64176 64177 64178 64179 64180 64181 64182 64183 64184 64185 64186 64187 64188 64189 64190 64191 64192 64193 64194 64195 64196 64197 64198 64199 64200 64201 64202 64203 64204 64205 64206 64207 64208 64209 64210 64211 64212 64213 64214 64215 64216 64217 64218 64219 64220 64221 64222 64223 64224 64225 64226 64227 64228 64229 64230 64231 64232 64233 64234 64235 64236 64237 64238 64239 64240 64241 64242 64243 64244 64245 64246 64247 64248 64249 64250 64251 64252 64253 64254 64255 64256 64257 64258 64259 64260 64261 64262 64263 64264 64265 64266 64267 64268 64269 64270 64271 64272 64273 64274 64275 64276 64277 64278 64279 64280 64281 64282 64283 64284 64285 64286 64287 64288 64289 64290 64291 64292 64293 64294 64295 64296 64297 64298 64299 64300 64301 64302 64303 64304 64305 64306 64307 64308 64309 64310 64311 64312 64313 64314 64315 64316 64317 64318 64319 64320 64321 64322 64323 64324 64325 64326 64327 64328 64329 64330 64331 64332 64333 64334 64335 64336 64337 64338 64339 64340 64341 64342 64343 64344 64345 64346 64347 64348 64349 64350 64351 64352 64353 64354 64355 64356 64357 64358 64359 64360 64361 64362 64363 64364 64365 64366 64367 64368 64369 64370 64371 64372 64373 64374 64375 64376 64377 64378 64379 64380 64381 64382 64383 64384 64385 64386 64387 64388 64389 64390 64391 64392 64393 64394 64395 64396 64397 64398 64399 64400 64401 64402 64403 64404 64405 64406 64407 64408 64409 64410 64411 64412 64413 64414 64415 64416 64417 64418 64419 64420 64421 64422 64423 64424 64425 64426 64427 64428 64429 64430 64431 64432 64433 64434 64435 64436 64437 64438 64439 64440 64441 64442 64443 64444 64445 64446 64447 64448 64449 64450 64451 64452 64453 64454 64455 64456 64457 64458 64459 64460 64461 64462 64463 64464 64465 64466 64467 64468 64469 64470 64471 64472 64473 64474 64475 64476 64477 64478 64479 64480 64481 64482 64483 64484 64485 64486 64487 64488 64489 64490 64491 64492 64493 64494 64495 64496 64497 64498 64499 64500 64501 64502 64503 64504 64505 64506 64507 64508 64509 64510 64511 64512 64513 64514 64515 64516 64517 64518 64519 64520 64521 64522 64523 64524 64525 64526 64527 64528 64529 64530 64531 64532 64533 64534 64535 64536 64537 64538 64539 64540 64541 64542 64543 64544 64545 64546 64547 64548 64549 64550 64551 64552 64553 64554 64555 64556 64557 64558 64559 64560 64561 64562 64563 64564 64565 64566 64567 64568 64569 64570 64571 64572 64573 64574 64575 64576 64577 64578 64579 64580 64581 64582 64583 64584 64585 64586 64587 64588 64589 64590 64591 64592 64593 64594 64595 64596 64597 64598 64599 64600 64601 64602 64603 64604 64605 64606 64607 64608 64609 64610 64611 64612 64613 64614 64615 64616 64617 64618 64619 64620 64621 64622 64623 64624 64625 64626 64627 64628 64629 64630 64631 64632 64633 64634 64635 64636 64637 64638 64639 64640 64641 64642 64643 64644 64645 64646 64647 64648 64649 64650 64651 64652 64653 64654 64655 64656 64657 64658 64659 64660 64661 64662 64663 64664 64665 64666 64667 64668 64669 64670 64671 64672 64673 64674 64675 64676 64677 64678 64679 64680 64681 64682 64683 64684 64685 64686 64687 64688 64689 64690 64691 64692 64693 64694 64695 64696 64697 64698 64699 64700 64701 64702 64703 64704 64705 64706 64707 64708 64709 64710 64711 64712 64713 64714 64715 64716 64717 64718 64719 64720 64721 64722 64723 64724 64725 64726 64727 64728 64729 64730 64731 64732 64733 64734 64735 64736 64737 64738 64739 64740 64741 64742 64743 64744 64745 64746 64747 64748 64749 64750 64751 64752 64753 64754 64755 64756 64757 64758 64759 64760 64761 64762 64763 64764 64765 64766 64767 64768 64769 64770 64771 64772 64773 64774 64775 64776 64777 64778 64779 64780 64781 64782 64783 64784 64785 64786 64787 64788 64789 64790 64791 64792 64793 64794 64795 64796 64797 64798 64799 64800 64801 64802 64803 64804 64805 64806 64807 64808 64809 64810 64811 64812 64813 64814 64815 64816 64817 64818 64819 64820 64821 64822 64823 64824 64825 64826 64827 64828 64829 64830 64831 64832 64833 64834 64835 64836 64837 64838 64839 64840 64841 64842 64843 64844 64845 64846 64847 64848 64849 64850 64851 64852 64853 64854 64855 64856 64857 64858 64859 64860 64861 64862 64863 64864 64865 64866 64867 64868 64869 64870 64871 64872 64873 64874 64875 64876 64877 64878 64879 64880 64881 64882 64883 64884 64885 64886 64887 64888 64889 64890 64891 64892 64893 64894 64895 64896 64897 64898 64899 64900 64901 64902 64903 64904 64905 64906 64907 64908 64909 64910 64911 64912 64913 64914 64915 64916 64917 64918 64919 64920 64921 64922 64923 64924 64925 64926 64927 64928 64929 64930 64931 64932 64933 64934 64935 64936 64937 64938 64939 64940 64941 64942 64943 64944 64945 64946 64947 64948 64949 64950 64951 64952 64953 64954 64955 64956 64957 64958 64959 64960 64961 64962 64963 64964 64965 64966 64967 64968 64969 64970 64971 64972 64973 64974 64975 64976 64977 64978 64979 64980 64981 64982 64983 64984 64985 64986 64987 64988 64989 64990 64991 64992 64993 64994 64995 64996 64997 64998 64999 65000 65001 65002 65003 65004 65005 65006 65007 65008 65009 65010 65011 65012 65013 65014 65015 65016 65017 65018 65019 65020 65021 65022 65023 65024 65025 65026 65027 65028 65029 65030 65031 65032 65033 65034 65035 65036 65037 65038 65039 65040 65041 65042 65043 65044 65045 65046 65047 65048 65049 65050 65051 65052 65053 65054 65055 65056 65057 65058 65059 65060 65061 65062 65063 65064 65065 65066 65067 65068 65069 65070 65071 65072 65073 65074 65075 65076 65077 65078 65079 65080 65081 65082 65083 65084 65085 65086 65087 65088 65089 65090 65091 65092 65093 65094 65095 65096 65097 65098 65099 65100 65101 65102 65103 65104 65105 65106 65107 65108 65109 65110 65111 65112 65113 65114 65115 65116 65117 65118 65119 65120 65121 65122 65123 65124 65125 65126 65127 65128 65129 65130 65131 65132 65133 65134 65135 65136 65137 65138 65139 65140 65141 65142 65143 65144 65145 65146 65147 65148 65149 65150 65151 65152 65153 65154 65155 65156 65157 65158 65159 65160 65161 65162 65163 65164 65165 65166 65167 65168 65169 65170 65171 65172 65173 65174 65175 65176 65177 65178 65179 65180 65181 65182 65183 65184 65185 65186 65187 65188 65189 65190 65191 65192 65193 65194 65195 65196 65197 65198 65199 65200 65201 65202 65203 65204 65205 65206 65207 65208 65209 65210 65211 65212 65213 65214 65215 65216 65217 65218 65219 65220 65221 65222 65223 65224 65225 65226 65227 65228 65229 65230 65231 65232 65233 65234 65235 65236 65237 65238 65239 65240 65241 65242 65243 65244 65245 65246 65247 65248 65249 65250 65251 65252 65253 65254 65255 65256 65257 65258 65259 65260 65261 65262 65263 65264 65265 65266 65267 65268 65269 65270 65271 65272 65273 65274 65275 65276 65277 65278 65279 65280 65281 65282 65283 65284 65285 65286 65287 65288 65289 65290 65291 65292 65293 65294 65295 65296 65297 65298 65299 65300 65301 65302 65303 65304 65305 65306 65307 65308 65309 65310 65311 65312 65313 65314 65315 65316 65317 65318 65319 65320 65321 65322 65323 65324 65325 65326 65327 65328 65329 65330 65331 65332 65333 65334 65335 65336 65337 65338 65339 65340 65341 65342 65343 65344 65345 65346 65347 65348 65349 65350 65351 65352 65353 65354 65355 65356 65357 65358 65359 65360 65361 65362 65363 65364 65365 65366 65367 65368 65369 65370 65371 65372 65373 65374 65375 65376 65377 65378 65379 65380 65381 65382 65383 65384 65385 65386 65387 65388 65389 65390 65391 65392 65393 65394 65395 65396 65397 65398 65399 65400 65401 65402 65403 65404 65405 65406 65407 65408 65409 65410 65411 65412 65413 65414 65415 65416 65417 65418 65419 65420 65421 65422 65423 65424 65425 65426 65427 65428 65429 65430 65431 65432 65433 65434 65435 65436 65437 65438 65439 65440 65441 65442 65443 65444 65445 65446 65447 65448 65449 65450 65451 65452 65453 65454 65455 65456 65457 65458 65459 65460 65461 65462 65463 65464 65465 65466 65467 65468 65469 65470 65471 65472 65473 65474 65475 65476 65477 65478 65479 65480 65481 65482 65483 65484 65485 65486 65487 65488 65489 65490 65491 65492 65493 65494 65495 65496 65497 65498 65499 65500 65501 65502 65503 65504 65505 65506 65507 65508 65509 65510 65511 65512 65513 65514 65515 65516 65517 65518 65519 65520 65521 65522 65523 65524 65525 65526 65527 65528 65529 65530 65531 65532 65533 65534 65535 65536 65537 65538 65539 65540 65541 65542 65543 65544 65545 65546 65547 65548 65549 65550 65551 65552 65553 65554 65555 65556 65557 65558 65559 65560 65561 65562 65563 65564 65565 65566 65567 65568 65569 65570 65571 65572 65573 65574 65575 65576 65577 65578 65579 65580 65581 65582 65583 65584 65585 65586 65587 65588 65589 65590 65591 65592 65593 65594 65595 65596 65597 65598 65599 65600 65601 65602 65603 65604 65605 65606 65607 65608 65609 65610 65611 65612 65613 65614 65615 65616 65617 65618 65619 65620 65621 65622 65623 65624 65625 65626 65627 65628 65629 65630 65631 65632 65633 65634 65635 65636 65637 65638 65639 65640 65641 65642 65643 65644 65645 65646 65647 65648 65649 65650 65651 65652 65653 65654 65655 65656 65657 65658 65659 65660 65661 65662 65663 65664 65665 65666 65667 65668 65669 65670 65671 65672 65673 65674 65675 65676 65677 65678 65679 65680 65681 65682 65683 65684 65685 65686 65687 65688 65689 65690 65691 65692 65693 65694 65695 65696 65697 65698 65699 65700 65701 65702 65703 65704 65705 65706 65707 65708 65709 65710 65711 65712 65713 65714 65715 65716 65717 65718 65719 65720 65721 65722 65723 65724 65725 65726 65727 65728 65729 65730 65731 65732 65733 65734 65735 65736 65737 65738 65739 65740 65741 65742 65743 65744 65745 65746 65747 65748 65749 65750 65751 65752 65753 65754 65755 65756 65757 65758 65759 65760 65761 65762 65763 65764 65765 65766 65767 65768 65769 65770 65771 65772 65773 65774 65775 65776 65777 65778 65779 65780 65781 65782 65783 65784 65785 65786 65787 65788 65789 65790 65791 65792 65793 65794 65795 65796 65797 65798 65799 65800 65801 65802 65803 65804 65805 65806 65807 65808 65809 65810 65811 65812 65813 65814 65815 65816 65817 65818 65819 65820 65821 65822 65823 65824 65825 65826 65827 65828 65829 65830 65831 65832 65833 65834 65835 65836 65837 65838 65839 65840 65841 65842 65843 65844 65845 65846 65847 65848 65849 65850 65851 65852 65853 65854 65855 65856 65857 65858 65859 65860 65861 65862 65863 65864 65865 65866 65867 65868 65869 65870 65871 65872 65873 65874 65875 65876 65877 65878 65879 65880 65881 65882 65883 65884 65885 65886 65887 65888 65889 65890 65891 65892 65893 65894 65895 65896 65897 65898 65899 65900 65901 65902 65903 65904 65905 65906 65907 65908 65909 65910 65911 65912 65913 65914 65915 65916 65917 65918 65919 65920 65921 65922 65923 65924 65925 65926 65927 65928 65929 65930 65931 65932 65933 65934 65935 65936 65937 65938 65939 65940 65941 65942 65943 65944 65945 65946 65947 65948 65949 65950 65951 65952 65953 65954 65955 65956 65957 65958 65959 65960 65961 65962 65963 65964 65965 65966 65967 65968 65969 65970 65971 65972 65973 65974 65975 65976 65977 65978 65979 65980 65981 65982 65983 65984 65985 65986 65987 65988 65989 65990 65991 65992 65993 65994 65995 65996 65997 65998 65999 66000 66001 66002 66003 66004 66005 66006 66007 66008 66009 66010 66011 66012 66013 66014 66015 66016 66017 66018 66019 66020 66021 66022 66023 66024 66025 66026 66027 66028 66029 66030 66031 66032 66033 66034 66035 66036 66037 66038 66039 66040 66041 66042 66043 66044 66045 66046 66047 66048 66049 66050 66051 66052 66053 66054 66055 66056 66057 66058 66059 66060 66061 66062 66063 66064 66065 66066 66067 66068 66069 66070 66071 66072 66073 66074 66075 66076 66077 66078 66079 66080 66081 66082 66083 66084 66085 66086 66087 66088 66089 66090 66091 66092 66093 66094 66095 66096 66097 66098 66099 66100 66101 66102 66103 66104 66105 66106 66107 66108 66109 66110 66111 66112 66113 66114 66115 66116 66117 66118 66119 66120 66121 66122 66123 66124 66125 66126 66127 66128 66129 66130 66131 66132 66133 66134 66135 66136 66137 66138 66139 66140 66141 66142 66143 66144 66145 66146 66147 66148 66149 66150 66151 66152 66153 66154 66155 66156 66157 66158 66159 66160 66161 66162 66163 66164 66165 66166 66167 66168 66169 66170 66171 66172 66173 66174 66175 66176 66177 66178 66179 66180 66181 66182 66183 66184 66185 66186 66187 66188 66189 66190 66191 66192 66193 66194 66195 66196 66197 66198 66199 66200 66201 66202 66203 66204 66205 66206 66207 66208 66209 66210 66211 66212 66213 66214 66215 66216 66217 66218 66219 66220 66221 66222 66223 66224 66225 66226 66227 66228 66229 66230 66231 66232 66233 66234 66235 66236 66237 66238 66239 66240 66241 66242 66243 66244 66245 66246 66247 66248 66249 66250 66251 66252 66253 66254 66255 66256 66257 66258 66259 66260 66261 66262 66263 66264 66265 66266 66267 66268 66269 66270 66271 66272 66273 66274 66275 66276 66277 66278 66279 66280 66281 66282 66283 66284 66285 66286 66287 66288 66289 66290 66291 66292 66293 66294 66295 66296 66297 66298 66299 66300 66301 66302 66303 66304 66305 66306 66307 66308 66309 66310 66311 66312 66313 66314 66315 66316 66317 66318 66319 66320 66321 66322 66323 66324 66325 66326 66327 66328 66329 66330 66331 66332 66333 66334 66335 66336 66337 66338 66339 66340 66341 66342 66343 66344 66345 66346 66347 66348 66349 66350 66351 66352 66353 66354 66355 66356 66357 66358 66359 66360 66361 66362 66363 66364 66365 66366 66367 66368 66369 66370 66371 66372 66373 66374 66375 66376 66377 66378 66379 66380 66381 66382 66383 66384 66385 66386 66387 66388 66389 66390 66391 66392 66393 66394 66395 66396 66397 66398 66399 66400 66401 66402 66403 66404 66405 66406 66407 66408 66409 66410 66411 66412 66413 66414 66415 66416 66417 66418 66419 66420 66421 66422 66423 66424 66425 66426 66427 66428 66429 66430 66431 66432 66433 66434 66435 66436 66437 66438 66439 66440 66441 66442 66443 66444 66445 66446 66447 66448 66449 66450 66451 66452 66453 66454 66455 66456 66457 66458 66459 66460 66461 66462 66463 66464 66465 66466 66467 66468 66469 66470 66471 66472 66473 66474 66475 66476 66477 66478 66479 66480 66481 66482 66483 66484 66485 66486 66487 66488 66489 66490 66491 66492 66493 66494 66495 66496 66497 66498 66499 66500 66501 66502 66503 66504 66505 66506 66507 66508 66509 66510 66511 66512 66513 66514 66515 66516 66517 66518 66519 66520 66521 66522 66523 66524 66525 66526 66527 66528 66529 66530 66531 66532 66533 66534 66535 66536 66537 66538 66539 66540 66541 66542 66543 66544 66545 66546 66547 66548 66549 66550 66551 66552 66553 66554 66555 66556 66557 66558 66559 66560 66561 66562 66563 66564 66565 66566 66567 66568 66569 66570 66571 66572 66573 66574 66575 66576 66577 66578 66579 66580 66581 66582 66583 66584 66585 66586 66587 66588 66589 66590 66591 66592 66593 66594 66595 66596 66597 66598 66599 66600 66601 66602 66603 66604 66605 66606 66607 66608 66609 66610 66611 66612 66613 66614 66615 66616 66617 66618 66619 66620 66621 66622 66623 66624 66625 66626 66627 66628 66629 66630 66631 66632 66633 66634 66635 66636 66637 66638 66639 66640 66641 66642 66643 66644 66645 66646 66647 66648 66649 66650 66651 66652 66653 66654 66655 66656 66657 66658 66659 66660 66661 66662 66663 66664 66665 66666 66667 66668 66669 66670 66671 66672 66673 66674 66675 66676 66677 66678 66679 66680 66681 66682 66683 66684 66685 66686 66687 66688 66689 66690 66691 66692 66693 66694 66695 66696 66697 66698 66699 66700 66701 66702 66703 66704 66705 66706 66707 66708 66709 66710 66711 66712 66713 66714 66715 66716 66717 66718 66719 66720 66721 66722 66723 66724 66725 66726 66727 66728 66729 66730 66731 66732 66733 66734 66735 66736 66737 66738 66739 66740 66741 66742 66743 66744 66745 66746 66747 66748 66749 66750 66751 66752 66753 66754 66755 66756 66757 66758 66759 66760 66761 66762 66763 66764 66765 66766 66767 66768 66769 66770 66771 66772 66773 66774 66775 66776 66777 66778 66779 66780 66781 66782 66783 66784 66785 66786 66787 66788 66789 66790 66791 66792 66793 66794 66795 66796 66797 66798 66799 66800 66801 66802 66803 66804 66805 66806 66807 66808 66809 66810 66811 66812 66813 66814 66815 66816 66817 66818 66819 66820 66821 66822 66823 66824 66825 66826 66827 66828 66829 66830 66831 66832 66833 66834 66835 66836 66837 66838 66839 66840 66841 66842 66843 66844 66845 66846 66847 66848 66849 66850 66851 66852 66853 66854 66855 66856 66857 66858 66859 66860 66861 66862 66863 66864 66865 66866 66867 66868 66869 66870 66871 66872 66873 66874 66875 66876 66877 66878 66879 66880 66881 66882 66883 66884 66885 66886 66887 66888 66889 66890 66891 66892 66893 66894 66895 66896 66897 66898 66899 66900 66901 66902 66903 66904 66905 66906 66907 66908 66909 66910 66911 66912 66913 66914 66915 66916 66917 66918 66919 66920 66921 66922 66923 66924 66925 66926 66927 66928 66929 66930 66931 66932 66933 66934 66935 66936 66937 66938 66939 66940 66941 66942 66943 66944 66945 66946 66947 66948 66949 66950 66951 66952 66953 66954 66955 66956 66957 66958 66959 66960 66961 66962 66963 66964 66965 66966 66967 66968 66969 66970 66971 66972 66973 66974 66975 66976 66977 66978 66979 66980 66981 66982 66983 66984 66985 66986 66987 66988 66989 66990 66991 66992 66993 66994 66995 66996 66997 66998 66999 67000 67001 67002 67003 67004 67005 67006 67007 67008 67009 67010 67011 67012 67013 67014 67015 67016 67017 67018 67019 67020 67021 67022 67023 67024 67025 67026 67027 67028 67029 67030 67031 67032 67033 67034 67035 67036 67037 67038 67039 67040 67041 67042 67043 67044 67045 67046 67047 67048 67049 67050 67051 67052 67053 67054 67055 67056 67057 67058 67059 67060 67061 67062 67063 67064 67065 67066 67067 67068 67069 67070 67071 67072 67073 67074 67075 67076 67077 67078 67079 67080 67081 67082 67083 67084 67085 67086 67087 67088 67089 67090 67091 67092 67093 67094 67095 67096 67097 67098 67099 67100 67101 67102 67103 67104 67105 67106 67107 67108 67109 67110 67111 67112 67113 67114 67115 67116 67117 67118 67119 67120 67121 67122 67123 67124 67125 67126 67127 67128 67129 67130 67131 67132 67133 67134 67135 67136 67137 67138 67139 67140 67141 67142 67143 67144 67145 67146 67147 67148 67149 67150 67151 67152 67153 67154 67155 67156 67157 67158 67159 67160 67161 67162 67163 67164 67165 67166 67167 67168 67169 67170 67171 67172 67173 67174 67175 67176 67177 67178 67179 67180 67181 67182 67183 67184 67185 67186 67187 67188 67189 67190 67191 67192 67193 67194 67195 67196 67197 67198 67199 67200 67201 67202 67203 67204 67205 67206 67207 67208 67209 67210 67211 67212 67213 67214 67215 67216 67217 67218 67219 67220 67221 67222 67223 67224 67225 67226 67227 67228 67229 67230 67231 67232 67233 67234 67235 67236 67237 67238 67239 67240 67241 67242 67243 67244 67245 67246 67247 67248 67249 67250 67251 67252 67253 67254 67255 67256 67257 67258 67259 67260 67261 67262 67263 67264 67265 67266 67267 67268 67269 67270 67271 67272 67273 67274 67275 67276 67277 67278 67279 67280 67281 67282 67283 67284 67285 67286 67287 67288 67289 67290 67291 67292 67293 67294 67295 67296 67297 67298 67299 67300 67301 67302 67303 67304 67305 67306 67307 67308 67309 67310 67311 67312 67313 67314 67315 67316 67317 67318 67319 67320 67321 67322 67323 67324 67325 67326 67327 67328 67329 67330 67331 67332 67333 67334 67335 67336 67337 67338 67339 67340 67341 67342 67343 67344 67345 67346 67347 67348 67349 67350 67351 67352 67353 67354 67355 67356 67357 67358 67359 67360 67361 67362 67363 67364 67365 67366 67367 67368 67369 67370 67371 67372 67373 67374 67375 67376 67377 67378 67379 67380 67381 67382 67383 67384 67385 67386 67387 67388 67389 67390 67391 67392 67393 67394 67395 67396 67397 67398 67399 67400 67401 67402 67403 67404 67405 67406 67407 67408 67409 67410 67411 67412 67413 67414 67415 67416 67417 67418 67419 67420 67421 67422 67423 67424 67425 67426 67427 67428 67429 67430 67431 67432 67433 67434 67435 67436 67437 67438 67439 67440 67441 67442 67443 67444 67445 67446 67447 67448 67449 67450 67451 67452 67453 67454 67455 67456 67457 67458 67459 67460 67461 67462 67463 67464 67465 67466 67467 67468 67469 67470 67471 67472 67473 67474 67475 67476 67477 67478 67479 67480 67481 67482 67483 67484 67485 67486 67487 67488 67489 67490 67491 67492 67493 67494 67495 67496 67497 67498 67499 67500 67501 67502 67503 67504 67505 67506 67507 67508 67509 67510 67511 67512 67513 67514 67515 67516 67517 67518 67519 67520 67521 67522 67523 67524 67525 67526 67527 67528 67529 67530 67531 67532 67533 67534 67535 67536 67537 67538 67539 67540 67541 67542 67543 67544 67545 67546 67547 67548 67549 67550 67551 67552 67553 67554 67555 67556 67557 67558 67559 67560 67561 67562 67563 67564 67565 67566 67567 67568 67569 67570 67571 67572 67573 67574 67575 67576 67577 67578 67579 67580 67581 67582 67583 67584 67585 67586 67587 67588 67589 67590 67591 67592 67593 67594 67595 67596 67597 67598 67599 67600 67601 67602 67603 67604 67605 67606 67607 67608 67609 67610 67611 67612 67613 67614 67615 67616 67617 67618 67619 67620 67621 67622 67623 67624 67625 67626 67627 67628 67629 67630 67631 67632 67633 67634 67635 67636 67637 67638 67639 67640 67641 67642 67643 67644 67645 67646 67647 67648 67649 67650 67651 67652 67653 67654 67655 67656 67657 67658 67659 67660 67661 67662 67663 67664 67665 67666 67667 67668 67669 67670 67671 67672 67673 67674 67675 67676 67677 67678 67679 67680 67681 67682 67683 67684 67685 67686 67687 67688 67689 67690 67691 67692 67693 67694 67695 67696 67697 67698 67699 67700 67701 67702 67703 67704 67705 67706 67707 67708 67709 67710 67711 67712 67713 67714 67715 67716 67717 67718 67719 67720 67721 67722 67723 67724 67725 67726 67727 67728 67729 67730 67731 67732 67733 67734 67735 67736 67737 67738 67739 67740 67741 67742 67743 67744 67745 67746 67747 67748 67749 67750 67751 67752 67753 67754 67755 67756 67757 67758 67759 67760 67761 67762 67763 67764 67765 67766 67767 67768 67769 67770 67771 67772 67773 67774 67775 67776 67777 67778 67779 67780 67781 67782 67783 67784 67785 67786 67787 67788 67789 67790 67791 67792 67793 67794 67795 67796 67797 67798 67799 67800 67801 67802 67803 67804 67805 67806 67807 67808 67809 67810 67811 67812 67813 67814 67815 67816 67817 67818 67819 67820 67821 67822 67823 67824 67825 67826 67827 67828 67829 67830 67831 67832 67833 67834 67835 67836 67837 67838 67839 67840 67841 67842 67843 67844 67845 67846 67847 67848 67849 67850 67851 67852 67853 67854 67855 67856 67857 67858 67859 67860 67861 67862 67863 67864 67865 67866 67867 67868 67869 67870 67871 67872 67873 67874 67875 67876 67877 67878 67879 67880 67881 67882 67883 67884 67885 67886 67887 67888 67889 67890 67891 67892 67893 67894 67895 67896 67897 67898 67899 67900 67901 67902 67903 67904 67905 67906 67907 67908 67909 67910 67911 67912 67913 67914 67915 67916 67917 67918 67919 67920 67921 67922 67923 67924 67925 67926 67927 67928 67929 67930 67931 67932 67933 67934 67935 67936 67937 67938 67939 67940 67941 67942 67943 67944 67945 67946 67947 67948 67949 67950 67951 67952 67953 67954 67955 67956 67957 67958 67959 67960 67961 67962 67963 67964 67965 67966 67967 67968 67969 67970 67971 67972 67973 67974 67975 67976 67977 67978 67979 67980 67981 67982 67983 67984 67985 67986 67987 67988 67989 67990 67991 67992 67993 67994 67995 67996 67997 67998 67999 68000 68001 68002 68003 68004 68005 68006 68007 68008 68009 68010 68011 68012 68013 68014 68015 68016 68017 68018 68019 68020 68021 68022 68023 68024 68025 68026 68027 68028 68029 68030 68031 68032 68033 68034 68035 68036 68037 68038 68039 68040 68041 68042 68043 68044 68045 68046 68047 68048 68049 68050 68051 68052 68053 68054 68055 68056 68057 68058 68059 68060 68061 68062 68063 68064 68065 68066 68067 68068 68069 68070 68071 68072 68073 68074 68075 68076 68077 68078 68079 68080 68081 68082 68083 68084 68085 68086 68087 68088 68089 68090 68091 68092 68093 68094 68095 68096 68097 68098 68099 68100 68101 68102 68103 68104 68105 68106 68107 68108 68109 68110 68111 68112 68113 68114 68115 68116 68117 68118 68119 68120 68121 68122 68123 68124 68125 68126 68127 68128 68129 68130 68131 68132 68133 68134 68135 68136 68137 68138 68139 68140 68141 68142 68143 68144 68145 68146 68147 68148 68149 68150 68151 68152 68153 68154 68155 68156 68157 68158 68159 68160 68161 68162 68163 68164 68165 68166 68167 68168 68169 68170 68171 68172 68173 68174 68175 68176 68177 68178 68179 68180 68181 68182 68183 68184 68185 68186 68187 68188 68189 68190 68191 68192 68193 68194 68195 68196 68197 68198 68199 68200 68201 68202 68203 68204 68205 68206 68207 68208 68209 68210 68211 68212 68213 68214 68215 68216 68217 68218 68219 68220 68221 68222 68223 68224 68225 68226 68227 68228 68229 68230 68231 68232 68233 68234 68235 68236 68237 68238 68239 68240 68241 68242 68243 68244 68245 68246 68247 68248 68249 68250 68251 68252 68253 68254 68255 68256 68257 68258 68259 68260 68261 68262 68263 68264 68265 68266 68267 68268 68269 68270 68271 68272 68273 68274 68275 68276 68277 68278 68279 68280 68281 68282 68283 68284 68285 68286 68287 68288 68289 68290 68291 68292 68293 68294 68295 68296 68297 68298 68299 68300 68301 68302 68303 68304 68305 68306 68307 68308 68309 68310 68311 68312 68313 68314 68315 68316 68317 68318 68319 68320 68321 68322 68323 68324 68325 68326 68327 68328 68329 68330 68331 68332 68333 68334 68335 68336 68337 68338 68339 68340 68341 68342 68343 68344 68345 68346 68347 68348 68349 68350 68351 68352 68353 68354 68355 68356 68357 68358 68359 68360 68361 68362 68363 68364 68365 68366 68367 68368 68369 68370 68371 68372 68373 68374 68375 68376 68377 68378 68379 68380 68381 68382 68383 68384 68385 68386 68387 68388 68389 68390 68391 68392 68393 68394 68395 68396 68397 68398 68399 68400 68401 68402 68403 68404 68405 68406 68407 68408 68409 68410 68411 68412 68413 68414 68415 68416 68417 68418 68419 68420 68421 68422 68423 68424 68425 68426 68427 68428 68429 68430 68431 68432 68433 68434 68435 68436 68437 68438 68439 68440 68441 68442 68443 68444 68445 68446 68447 68448 68449 68450 68451 68452 68453 68454 68455 68456 68457 68458 68459 68460 68461 68462 68463 68464 68465 68466 68467 68468 68469 68470 68471 68472 68473 68474 68475 68476 68477 68478 68479 68480 68481 68482 68483 68484 68485 68486 68487 68488 68489 68490 68491 68492 68493 68494 68495 68496 68497 68498 68499 68500 68501 68502 68503 68504 68505 68506 68507 68508 68509 68510 68511 68512 68513 68514 68515 68516 68517 68518 68519 68520 68521 68522 68523 68524 68525 68526 68527 68528 68529 68530 68531 68532 68533 68534 68535 68536 68537 68538 68539 68540 68541 68542 68543 68544 68545 68546 68547 68548 68549 68550 68551 68552 68553 68554 68555 68556 68557 68558 68559 68560 68561 68562 68563 68564 68565 68566 68567 68568 68569 68570 68571 68572 68573 68574 68575 68576 68577 68578 68579 68580 68581 68582 68583 68584 68585 68586 68587 68588 68589 68590 68591 68592 68593 68594 68595 68596 68597 68598 68599 68600 68601 68602 68603 68604 68605 68606 68607 68608 68609 68610 68611 68612 68613 68614 68615 68616 68617 68618 68619 68620 68621 68622 68623 68624 68625 68626 68627 68628 68629 68630 68631 68632 68633 68634 68635 68636 68637 68638 68639 68640 68641 68642 68643 68644 68645 68646 68647 68648 68649 68650 68651 68652 68653 68654 68655 68656 68657 68658 68659 68660 68661 68662 68663 68664 68665 68666 68667 68668 68669 68670 68671 68672 68673 68674 68675 68676 68677 68678 68679 68680 68681 68682 68683 68684 68685 68686 68687 68688 68689 68690 68691 68692 68693 68694 68695 68696 68697 68698 68699 68700 68701 68702 68703 68704 68705 68706 68707 68708 68709 68710 68711 68712 68713 68714 68715 68716 68717 68718 68719 68720 68721 68722 68723 68724 68725 68726 68727 68728 68729 68730 68731 68732 68733 68734 68735 68736 68737 68738 68739 68740 68741 68742 68743 68744 68745 68746 68747 68748 68749 68750 68751 68752 68753 68754 68755 68756 68757 68758 68759 68760 68761 68762 68763 68764 68765 68766 68767 68768 68769 68770 68771 68772 68773 68774 68775 68776 68777 68778 68779 68780 68781 68782 68783 68784 68785 68786 68787 68788 68789 68790 68791 68792 68793 68794 68795 68796 68797 68798 68799 68800 68801 68802 68803 68804 68805 68806 68807 68808 68809 68810 68811 68812 68813 68814 68815 68816 68817 68818 68819 68820 68821 68822 68823 68824 68825 68826 68827 68828 68829 68830 68831 68832 68833 68834 68835 68836 68837 68838 68839 68840 68841 68842 68843 68844 68845 68846 68847 68848 68849 68850 68851 68852 68853 68854 68855 68856 68857 68858 68859 68860 68861 68862 68863 68864 68865 68866 68867 68868 68869 68870 68871 68872 68873 68874 68875 68876 68877 68878 68879 68880 68881 68882 68883 68884 68885 68886 68887 68888 68889 68890 68891 68892 68893 68894 68895 68896 68897 68898 68899 68900 68901 68902 68903 68904 68905 68906 68907 68908 68909 68910 68911 68912 68913 68914 68915 68916 68917 68918 68919 68920 68921 68922 68923 68924 68925 68926 68927 68928 68929 68930 68931 68932 68933 68934 68935 68936 68937 68938 68939 68940 68941 68942 68943 68944 68945 68946 68947 68948 68949 68950 68951 68952 68953 68954 68955 68956 68957 68958 68959 68960 68961 68962 68963 68964 68965 68966 68967 68968 68969 68970 68971 68972 68973 68974 68975 68976 68977 68978 68979 68980 68981 68982 68983 68984 68985 68986 68987 68988 68989 68990 68991 68992 68993 68994 68995 68996 68997 68998 68999 69000 69001 69002 69003 69004 69005 69006 69007 69008 69009 69010 69011 69012 69013 69014 69015 69016 69017 69018 69019 69020 69021 69022 69023 69024 69025 69026 69027 69028 69029 69030 69031 69032 69033 69034 69035 69036 69037 69038 69039 69040 69041 69042 69043 69044 69045 69046 69047 69048 69049 69050 69051 69052 69053 69054 69055 69056 69057 69058 69059 69060 69061 69062 69063 69064 69065 69066 69067 69068 69069 69070 69071 69072 69073 69074 69075 69076 69077 69078 69079 69080 69081 69082 69083 69084 69085 69086 69087 69088 69089 69090 69091 69092 69093 69094 69095 69096 69097 69098 69099 69100 69101 69102 69103 69104 69105 69106 69107 69108 69109 69110 69111 69112 69113 69114 69115 69116 69117 69118 69119 69120 69121 69122 69123 69124 69125 69126 69127 69128 69129 69130 69131 69132 69133 69134 69135 69136 69137 69138 69139 69140 69141 69142 69143 69144 69145 69146 69147 69148 69149 69150 69151 69152 69153 69154 69155 69156 69157 69158 69159 69160 69161 69162 69163 69164 69165 69166 69167 69168 69169 69170 69171 69172 69173 69174 69175 69176 69177 69178 69179 69180 69181 69182 69183 69184 69185 69186 69187 69188 69189 69190 69191 69192 69193 69194 69195 69196 69197 69198 69199 69200 69201 69202 69203 69204 69205 69206 69207 69208 69209 69210 69211 69212 69213 69214 69215 69216 69217 69218 69219 69220 69221 69222 69223 69224 69225 69226 69227 69228 69229 69230 69231 69232 69233 69234 69235 69236 69237 69238 69239 69240 69241 69242 69243 69244 69245 69246 69247 69248 69249 69250 69251 69252 69253 69254 69255 69256 69257 69258 69259 69260 69261 69262 69263 69264 69265 69266 69267 69268 69269 69270 69271 69272 69273 69274 69275 69276 69277 69278 69279 69280 69281 69282 69283 69284 69285 69286 69287 69288 69289 69290 69291 69292 69293 69294 69295 69296 69297 69298 69299 69300 69301 69302 69303 69304 69305 69306 69307 69308 69309 69310 69311 69312 69313 69314 69315 69316 69317 69318 69319 69320 69321 69322 69323 69324 69325 69326 69327 69328 69329 69330 69331 69332 69333 69334 69335 69336 69337 69338 69339 69340 69341 69342 69343 69344 69345 69346 69347 69348 69349 69350 69351 69352 69353 69354 69355 69356 69357 69358 69359 69360 69361 69362 69363 69364 69365 69366 69367 69368 69369 69370 69371 69372 69373 69374 69375 69376 69377 69378 69379 69380 69381 69382 69383 69384 69385 69386 69387 69388 69389 69390 69391 69392 69393 69394 69395 69396 69397 69398 69399 69400 69401 69402 69403 69404 69405 69406 69407 69408 69409 69410 69411 69412 69413 69414 69415 69416 69417 69418 69419 69420 69421 69422 69423 69424 69425 69426 69427 69428 69429 69430 69431 69432 69433 69434 69435 69436 69437 69438 69439 69440 69441 69442 69443 69444 69445 69446 69447 69448 69449 69450 69451 69452 69453 69454 69455 69456 69457 69458 69459 69460 69461 69462 69463 69464 69465 69466 69467 69468 69469 69470 69471 69472 69473 69474 69475 69476 69477 69478 69479 69480 69481 69482 69483 69484 69485 69486 69487 69488 69489 69490 69491 69492 69493 69494 69495 69496 69497 69498 69499 69500 69501 69502 69503 69504 69505 69506 69507 69508 69509 69510 69511 69512 69513 69514 69515 69516 69517 69518 69519 69520 69521 69522 69523 69524 69525 69526 69527 69528 69529 69530 69531 69532 69533 69534 69535 69536 69537 69538 69539 69540 69541 69542 69543 69544 69545 69546 69547 69548 69549 69550 69551 69552 69553 69554 69555 69556 69557 69558 69559 69560 69561 69562 69563 69564 69565 69566 69567 69568 69569 69570 69571 69572 69573 69574 69575 69576 69577 69578 69579 69580 69581 69582 69583 69584 69585 69586 69587 69588 69589 69590 69591 69592 69593 69594 69595 69596 69597 69598 69599 69600 69601 69602 69603 69604 69605 69606 69607 69608 69609 69610 69611 69612 69613 69614 69615 69616 69617 69618 69619 69620 69621 69622 69623 69624 69625 69626 69627 69628 69629 69630 69631 69632 69633 69634 69635 69636 69637 69638 69639 69640 69641 69642 69643 69644 69645 69646 69647 69648 69649 69650 69651 69652 69653 69654 69655 69656 69657 69658 69659 69660 69661 69662 69663 69664 69665 69666 69667 69668 69669 69670 69671 69672 69673 69674 69675 69676 69677 69678 69679 69680 69681 69682 69683 69684 69685 69686 69687 69688 69689 69690 69691 69692 69693 69694 69695 69696 69697 69698 69699 69700 69701 69702 69703 69704 69705 69706 69707 69708 69709 69710 69711 69712 69713 69714 69715 69716 69717 69718 69719 69720 69721 69722 69723 69724 69725 69726 69727 69728 69729 69730 69731 69732 69733 69734 69735 69736 69737 69738 69739 69740 69741 69742 69743 69744 69745 69746 69747 69748 69749 69750 69751 69752 69753 69754 69755 69756 69757 69758 69759 69760 69761 69762 69763 69764 69765 69766 69767 69768 69769 69770 69771 69772 69773 69774 69775 69776 69777 69778 69779 69780 69781 69782 69783 69784 69785 69786 69787 69788 69789 69790 69791 69792 69793 69794 69795 69796 69797 69798 69799 69800 69801 69802 69803 69804 69805 69806 69807 69808 69809 69810 69811 69812 69813 69814 69815 69816 69817 69818 69819 69820 69821 69822 69823 69824 69825 69826 69827 69828 69829 69830 69831 69832 69833 69834 69835 69836 69837 69838 69839 69840 69841 69842 69843 69844 69845 69846 69847 69848 69849 69850 69851 69852 69853 69854 69855 69856 69857 69858 69859 69860 69861 69862 69863 69864 69865 69866 69867 69868 69869 69870 69871 69872 69873 69874 69875 69876 69877 69878 69879 69880 69881 69882 69883 69884 69885 69886 69887 69888 69889 69890 69891 69892 69893 69894 69895 69896 69897 69898 69899 69900 69901 69902 69903 69904 69905 69906 69907 69908 69909 69910 69911 69912 69913 69914 69915 69916 69917 69918 69919 69920 69921 69922 69923 69924 69925 69926 69927 69928 69929 69930 69931 69932 69933 69934 69935 69936 69937 69938 69939 69940 69941 69942 69943 69944 69945 69946 69947 69948 69949 69950 69951 69952 69953 69954 69955 69956 69957 69958 69959 69960 69961 69962 69963 69964 69965 69966 69967 69968 69969 69970 69971 69972 69973 69974 69975 69976 69977 69978 69979 69980 69981 69982 69983 69984 69985 69986 69987 69988 69989 69990 69991 69992 69993 69994 69995 69996 69997 69998 69999 70000 70001 70002 70003 70004 70005 70006 70007 70008 70009 70010 70011 70012 70013 70014 70015 70016 70017 70018 70019 70020 70021 70022 70023 70024 70025 70026 70027 70028 70029 70030 70031 70032 70033 70034 70035 70036 70037 70038 70039 70040 70041 70042 70043 70044 70045 70046 70047 70048 70049 70050 70051 70052 70053 70054 70055 70056 70057 70058 70059 70060 70061 70062 70063 70064 70065 70066 70067 70068 70069 70070 70071 70072 70073 70074 70075 70076 70077 70078 70079 70080 70081 70082 70083 70084 70085 70086 70087 70088 70089 70090 70091 70092 70093 70094 70095 70096 70097 70098 70099 70100 70101 70102 70103 70104 70105 70106 70107 70108 70109 70110 70111 70112 70113 70114 70115 70116 70117 70118 70119 70120 70121 70122 70123 70124 70125 70126 70127 70128 70129 70130 70131 70132 70133 70134 70135 70136 70137 70138 70139 70140 70141 70142 70143 70144 70145 70146 70147 70148 70149 70150 70151 70152 70153 70154 70155 70156 70157 70158 70159 70160 70161 70162 70163 70164 70165 70166 70167 70168 70169 70170 70171 70172 70173 70174 70175 70176 70177 70178 70179 70180 70181 70182 70183 70184 70185 70186 70187 70188 70189 70190 70191 70192 70193 70194 70195 70196 70197 70198 70199 70200 70201 70202 70203 70204 70205 70206 70207 70208 70209 70210 70211 70212 70213 70214 70215 70216 70217 70218 70219 70220 70221 70222 70223 70224 70225 70226 70227 70228 70229 70230 70231 70232 70233 70234 70235 70236 70237 70238 70239 70240 70241 70242 70243 70244 70245 70246 70247 70248 70249 70250 70251 70252 70253 70254 70255 70256 70257 70258 70259 70260 70261 70262 70263 70264 70265 70266 70267 70268 70269 70270 70271 70272 70273 70274 70275 70276 70277 70278 70279 70280 70281 70282 70283 70284 70285 70286 70287 70288 70289 70290 70291 70292 70293 70294 70295 70296 70297 70298 70299 70300 70301 70302 70303 70304 70305 70306 70307 70308 70309 70310 70311 70312 70313 70314 70315 70316 70317 70318 70319 70320 70321 70322 70323 70324 70325 70326 70327 70328 70329 70330 70331 70332 70333 70334 70335 70336 70337 70338 70339 70340 70341 70342 70343 70344 70345 70346 70347 70348 70349 70350 70351 70352 70353 70354 70355 70356 70357 70358 70359 70360 70361 70362 70363 70364 70365 70366 70367 70368 70369 70370 70371 70372 70373 70374 70375 70376 70377 70378 70379 70380 70381 70382 70383 70384 70385 70386 70387 70388 70389 70390 70391 70392 70393 70394 70395 70396 70397 70398 70399 70400 70401 70402 70403 70404 70405 70406 70407 70408 70409 70410 70411 70412 70413 70414 70415 70416 70417 70418 70419 70420 70421 70422 70423 70424 70425 70426 70427 70428 70429 70430 70431 70432 70433 70434 70435 70436 70437 70438 70439 70440 70441 70442 70443 70444 70445 70446 70447 70448 70449 70450 70451 70452 70453 70454 70455 70456 70457 70458 70459 70460 70461 70462 70463 70464 70465 70466 70467 70468 70469 70470 70471 70472 70473 70474 70475 70476 70477 70478 70479 70480 70481 70482 70483 70484 70485 70486 70487 70488 70489 70490 70491 70492 70493 70494 70495 70496 70497 70498 70499 70500 70501 70502 70503 70504 70505 70506 70507 70508 70509 70510 70511 70512 70513 70514 70515 70516 70517 70518 70519 70520 70521 70522 70523 70524 70525 70526 70527 70528 70529 70530 70531 70532 70533 70534 70535 70536 70537 70538 70539 70540 70541 70542 70543 70544 70545 70546 70547 70548 70549 70550 70551 70552 70553 70554 70555 70556 70557 70558 70559 70560 70561 70562 70563 70564 70565 70566 70567 70568 70569 70570 70571 70572 70573 70574 70575 70576 70577 70578 70579 70580 70581 70582 70583 70584 70585 70586 70587 70588 70589 70590 70591 70592 70593 70594 70595 70596 70597 70598 70599 70600 70601 70602 70603 70604 70605 70606 70607 70608 70609 70610 70611 70612 70613 70614 70615 70616 70617 70618 70619 70620 70621 70622 70623 70624 70625 70626 70627 70628 70629 70630 70631 70632 70633 70634 70635 70636 70637 70638 70639 70640 70641 70642 70643 70644 70645 70646 70647 70648 70649 70650 70651 70652 70653 70654 70655 70656 70657 70658 70659 70660 70661 70662 70663 70664 70665 70666 70667 70668 70669 70670 70671 70672 70673 70674 70675 70676 70677 70678 70679 70680 70681 70682 70683 70684 70685 70686 70687 70688 70689 70690 70691 70692 70693 70694 70695 70696 70697 70698 70699 70700 70701 70702 70703 70704 70705 70706 70707 70708 70709 70710 70711 70712 70713 70714 70715 70716 70717 70718 70719 70720 70721 70722 70723 70724 70725 70726 70727 70728 70729 70730 70731 70732 70733 70734 70735 70736 70737 70738 70739 70740 70741 70742 70743 70744 70745 70746 70747 70748 70749 70750 70751 70752 70753 70754 70755 70756 70757 70758 70759 70760 70761 70762 70763 70764 70765 70766 70767 70768 70769 70770 70771 70772 70773 70774 70775 70776 70777 70778 70779 70780 70781 70782 70783 70784 70785 70786 70787 70788 70789 70790 70791 70792 70793 70794 70795 70796 70797 70798 70799 70800 70801 70802 70803 70804 70805 70806 70807 70808 70809 70810 70811 70812 70813 70814 70815 70816 70817 70818 70819 70820 70821 70822 70823 70824 70825 70826 70827 70828 70829 70830 70831 70832 70833 70834 70835 70836 70837 70838 70839 70840 70841 70842 70843 70844 70845 70846 70847 70848 70849 70850 70851 70852 70853 70854 70855 70856 70857 70858 70859 70860 70861 70862 70863 70864 70865 70866 70867 70868 70869 70870 70871 70872 70873 70874 70875 70876 70877 70878 70879 70880 70881 70882 70883 70884 70885 70886 70887 70888 70889 70890 70891 70892 70893 70894 70895 70896 70897 70898 70899 70900 70901 70902 70903 70904 70905 70906 70907 70908 70909 70910 70911 70912 70913 70914 70915 70916 70917 70918 70919 70920 70921 70922 70923 70924 70925 70926 70927 70928 70929 70930 70931 70932 70933 70934 70935 70936 70937 70938 70939 70940 70941 70942 70943 70944 70945 70946 70947 70948 70949 70950 70951 70952 70953 70954 70955 70956 70957 70958 70959 70960 70961 70962 70963 70964 70965 70966 70967 70968 70969 70970 70971 70972 70973 70974 70975 70976 70977 70978 70979 70980 70981 70982 70983 70984 70985 70986 70987 70988 70989 70990 70991 70992 70993 70994 70995 70996 70997 70998 70999 71000 71001 71002 71003 71004 71005 71006 71007 71008 71009 71010 71011 71012 71013 71014 71015 71016 71017 71018 71019 71020 71021 71022 71023 71024 71025 71026 71027 71028 71029 71030 71031 71032 71033 71034 71035 71036 71037 71038 71039 71040 71041 71042 71043 71044 71045 71046 71047 71048 71049 71050 71051 71052 71053 71054 71055 71056 71057 71058 71059 71060 71061 71062 71063 71064 71065 71066 71067 71068 71069 71070 71071 71072 71073 71074 71075 71076 71077 71078 71079 71080 71081 71082 71083 71084 71085 71086 71087 71088 71089 71090 71091 71092 71093 71094 71095 71096 71097 71098 71099 71100 71101 71102 71103 71104 71105 71106 71107 71108 71109 71110 71111 71112 71113 71114 71115 71116 71117 71118 71119 71120 71121 71122 71123 71124 71125 71126 71127 71128 71129 71130 71131 71132 71133 71134 71135 71136 71137 71138 71139 71140 71141 71142 71143 71144 71145 71146 71147 71148 71149 71150 71151 71152 71153 71154 71155 71156 71157 71158 71159 71160 71161 71162 71163 71164 71165 71166 71167 71168 71169 71170 71171 71172 71173 71174 71175 71176 71177 71178 71179 71180 71181 71182 71183 71184 71185 71186 71187 71188 71189 71190 71191 71192 71193 71194 71195 71196 71197 71198 71199 71200 71201 71202 71203 71204 71205 71206 71207 71208 71209 71210 71211 71212 71213 71214 71215 71216 71217 71218 71219 71220 71221 71222 71223 71224 71225 71226 71227 71228 71229 71230 71231 71232 71233 71234 71235 71236 71237 71238 71239 71240 71241 71242 71243 71244 71245 71246 71247 71248 71249 71250 71251 71252 71253 71254 71255 71256 71257 71258 71259 71260 71261 71262 71263 71264 71265 71266 71267 71268 71269 71270 71271 71272 71273 71274 71275 71276 71277 71278 71279 71280 71281 71282 71283 71284 71285 71286 71287 71288 71289 71290 71291 71292 71293 71294 71295 71296 71297 71298 71299 71300 71301 71302 71303 71304 71305 71306 71307 71308 71309 71310 71311 71312 71313 71314 71315 71316 71317 71318 71319 71320 71321 71322 71323 71324 71325 71326 71327 71328 71329 71330 71331 71332 71333 71334 71335 71336 71337 71338 71339 71340 71341 71342 71343 71344 71345 71346 71347 71348 71349 71350 71351 71352 71353 71354 71355 71356 71357 71358 71359 71360 71361 71362 71363 71364 71365 71366 71367 71368 71369 71370 71371 71372 71373 71374 71375 71376 71377 71378 71379 71380 71381 71382 71383 71384 71385 71386 71387 71388 71389 71390 71391 71392 71393 71394 71395 71396 71397 71398 71399 71400 71401 71402 71403 71404 71405 71406 71407 71408 71409 71410 71411 71412 71413 71414 71415 71416 71417 71418 71419 71420 71421 71422 71423 71424 71425 71426 71427 71428 71429 71430 71431 71432 71433 71434 71435 71436 71437 71438 71439 71440 71441 71442 71443 71444 71445 71446 71447 71448 71449 71450 71451 71452 71453 71454 71455 71456 71457 71458 71459 71460 71461 71462 71463 71464 71465 71466 71467 71468 71469 71470 71471 71472 71473 71474 71475 71476 71477 71478 71479 71480 71481 71482 71483 71484 71485 71486 71487 71488 71489 71490 71491 71492 71493 71494 71495 71496 71497 71498 71499 71500 71501 71502 71503 71504 71505 71506 71507 71508 71509 71510 71511 71512 71513 71514 71515 71516 71517 71518 71519 71520 71521 71522 71523 71524 71525 71526 71527 71528 71529 71530 71531 71532 71533 71534 71535 71536 71537 71538 71539 71540 71541 71542 71543 71544 71545 71546 71547 71548 71549 71550 71551 71552 71553 71554 71555 71556 71557 71558 71559 71560 71561 71562 71563 71564 71565 71566 71567 71568 71569 71570 71571 71572 71573 71574 71575 71576 71577 71578 71579 71580 71581 71582 71583 71584 71585 71586 71587 71588 71589 71590 71591 71592 71593 71594 71595 71596 71597 71598 71599 71600 71601 71602 71603 71604 71605 71606 71607 71608 71609 71610 71611 71612 71613 71614 71615 71616 71617 71618 71619 71620 71621 71622 71623 71624 71625 71626 71627 71628 71629 71630 71631 71632 71633 71634 71635 71636 71637 71638 71639 71640 71641 71642 71643 71644 71645 71646 71647 71648 71649 71650 71651 71652 71653 71654 71655 71656 71657 71658 71659 71660 71661 71662 71663 71664 71665 71666 71667 71668 71669 71670 71671 71672 71673 71674 71675 71676 71677 71678 71679 71680 71681 71682 71683 71684 71685 71686 71687 71688 71689 71690 71691 71692 71693 71694 71695 71696 71697 71698 71699 71700 71701 71702 71703 71704 71705 71706 71707 71708 71709 71710 71711 71712 71713 71714 71715 71716 71717 71718 71719 71720 71721 71722 71723 71724 71725 71726 71727 71728 71729 71730 71731 71732 71733 71734 71735 71736 71737 71738 71739 71740 71741 71742 71743 71744 71745 71746 71747 71748 71749 71750 71751 71752 71753 71754 71755 71756 71757 71758 71759 71760 71761 71762 71763 71764 71765 71766 71767 71768 71769 71770 71771 71772 71773 71774 71775 71776 71777 71778 71779 71780 71781 71782 71783 71784 71785 71786 71787 71788 71789 71790 71791 71792 71793 71794 71795 71796 71797 71798 71799 71800 71801 71802 71803 71804 71805 71806 71807 71808 71809 71810 71811 71812 71813 71814 71815 71816 71817 71818 71819 71820 71821 71822 71823 71824 71825 71826 71827 71828 71829 71830 71831 71832 71833 71834 71835 71836 71837 71838 71839 71840 71841 71842 71843 71844 71845 71846 71847 71848 71849 71850 71851 71852 71853 71854 71855 71856 71857 71858 71859 71860 71861 71862 71863 71864 71865 71866 71867 71868 71869 71870 71871 71872 71873 71874 71875 71876 71877 71878 71879 71880 71881 71882 71883 71884 71885 71886 71887 71888 71889 71890 71891 71892 71893 71894 71895 71896 71897 71898 71899 71900 71901 71902 71903 71904 71905 71906 71907 71908 71909 71910 71911 71912 71913 71914 71915 71916 71917 71918 71919 71920 71921 71922 71923 71924 71925 71926 71927 71928 71929 71930 71931 71932 71933 71934 71935 71936 71937 71938 71939 71940 71941 71942 71943 71944 71945 71946 71947 71948 71949 71950 71951 71952 71953 71954 71955 71956 71957 71958 71959 71960 71961 71962 71963 71964 71965 71966 71967 71968 71969 71970 71971 71972 71973 71974 71975 71976 71977 71978 71979 71980 71981 71982 71983 71984 71985 71986 71987 71988 71989 71990 71991 71992 71993 71994 71995 71996 71997 71998 71999 72000 72001 72002 72003 72004 72005 72006 72007 72008 72009 72010 72011 72012 72013 72014 72015 72016 72017 72018 72019 72020 72021 72022 72023 72024 72025 72026 72027 72028 72029 72030 72031 72032 72033 72034 72035 72036 72037 72038 72039 72040 72041 72042 72043 72044 72045 72046 72047 72048 72049 72050 72051 72052 72053 72054 72055 72056 72057 72058 72059 72060 72061 72062 72063 72064 72065 72066 72067 72068 72069 72070 72071 72072 72073 72074 72075 72076 72077 72078 72079 72080 72081 72082 72083 72084 72085 72086 72087 72088 72089 72090 72091 72092 72093 72094 72095 72096 72097 72098 72099 72100 72101 72102 72103 72104 72105 72106 72107 72108 72109 72110 72111 72112 72113 72114 72115 72116 72117 72118 72119 72120 72121 72122 72123 72124 72125 72126 72127 72128 72129 72130 72131 72132 72133 72134 72135 72136 72137 72138 72139 72140 72141 72142 72143 72144 72145 72146 72147 72148 72149 72150 72151 72152 72153 72154 72155 72156 72157 72158 72159 72160 72161 72162 72163 72164 72165 72166 72167 72168 72169 72170 72171 72172 72173 72174 72175 72176 72177 72178 72179 72180 72181 72182 72183 72184 72185 72186 72187 72188 72189 72190 72191 72192 72193 72194 72195 72196 72197 72198 72199 72200 72201 72202 72203 72204 72205 72206 72207 72208 72209 72210 72211 72212 72213 72214 72215 72216 72217 72218 72219 72220 72221 72222 72223 72224 72225 72226 72227 72228 72229 72230 72231 72232 72233 72234 72235 72236 72237 72238 72239 72240 72241 72242 72243 72244 72245 72246 72247 72248 72249 72250 72251 72252 72253 72254 72255 72256 72257 72258 72259 72260 72261 72262 72263 72264 72265 72266 72267 72268 72269 72270 72271 72272 72273 72274 72275 72276 72277 72278 72279 72280 72281 72282 72283 72284 72285 72286 72287 72288 72289 72290 72291 72292 72293 72294 72295 72296 72297 72298 72299 72300 72301 72302 72303 72304 72305 72306 72307 72308 72309 72310 72311 72312 72313 72314 72315 72316 72317 72318 72319 72320 72321 72322 72323 72324 72325 72326 72327 72328 72329 72330 72331 72332 72333 72334 72335 72336 72337 72338 72339 72340 72341 72342 72343 72344 72345 72346 72347 72348 72349 72350 72351 72352 72353 72354 72355 72356 72357 72358 72359 72360 72361 72362 72363 72364 72365 72366 72367 72368 72369 72370 72371 72372 72373 72374 72375 72376 72377 72378 72379 72380 72381 72382 72383 72384 72385 72386 72387 72388 72389 72390 72391 72392 72393 72394 72395 72396 72397 72398 72399 72400 72401 72402 72403 72404 72405 72406 72407 72408 72409 72410 72411 72412 72413 72414 72415 72416 72417 72418 72419 72420 72421 72422 72423 72424 72425 72426 72427 72428 72429 72430 72431 72432 72433 72434 72435 72436 72437 72438 72439 72440 72441 72442 72443 72444 72445 72446 72447 72448 72449 72450 72451 72452 72453 72454 72455 72456 72457 72458 72459 72460 72461 72462 72463 72464 72465 72466 72467 72468 72469 72470 72471 72472 72473 72474 72475 72476 72477 72478 72479 72480 72481 72482 72483 72484 72485 72486 72487 72488 72489 72490 72491 72492 72493 72494 72495 72496 72497 72498 72499 72500 72501 72502 72503 72504 72505 72506 72507 72508 72509 72510 72511 72512 72513 72514 72515 72516 72517 72518 72519 72520 72521 72522 72523 72524 72525 72526 72527 72528 72529 72530 72531 72532 72533 72534 72535 72536 72537 72538 72539 72540 72541 72542 72543 72544 72545 72546 72547 72548 72549 72550 72551 72552 72553 72554 72555 72556 72557 72558 72559 72560 72561 72562 72563 72564 72565 72566 72567 72568 72569 72570 72571 72572 72573 72574 72575 72576 72577 72578 72579 72580 72581 72582 72583 72584 72585 72586 72587 72588 72589 72590 72591 72592 72593 72594 72595 72596 72597 72598 72599 72600 72601 72602 72603 72604 72605 72606 72607 72608 72609 72610 72611 72612 72613 72614 72615 72616 72617 72618 72619 72620 72621 72622 72623 72624 72625 72626 72627 72628 72629 72630 72631 72632 72633 72634 72635 72636 72637 72638 72639 72640 72641 72642 72643 72644 72645 72646 72647 72648 72649 72650 72651 72652 72653 72654 72655 72656 72657 72658 72659 72660 72661 72662 72663 72664 72665 72666 72667 72668 72669 72670 72671 72672 72673 72674 72675 72676 72677 72678 72679 72680 72681 72682 72683 72684 72685 72686 72687 72688 72689 72690 72691 72692 72693 72694 72695 72696 72697 72698 72699 72700 72701 72702 72703 72704 72705 72706 72707 72708 72709 72710 72711 72712 72713 72714 72715 72716 72717 72718 72719 72720 72721 72722 72723 72724 72725 72726 72727 72728 72729 72730 72731 72732 72733 72734 72735 72736 72737 72738 72739 72740 72741 72742 72743 72744 72745 72746 72747 72748 72749 72750 72751 72752 72753 72754 72755 72756 72757 72758 72759 72760 72761 72762 72763 72764 72765 72766 72767 72768 72769 72770 72771 72772 72773 72774 72775 72776 72777 72778 72779 72780 72781 72782 72783 72784 72785 72786 72787 72788 72789 72790 72791 72792 72793 72794 72795 72796 72797 72798 72799 72800 72801 72802 72803 72804 72805 72806 72807 72808 72809 72810 72811 72812 72813 72814 72815 72816 72817 72818 72819 72820 72821 72822 72823 72824 72825 72826 72827 72828 72829 72830 72831 72832 72833 72834 72835 72836 72837 72838 72839 72840 72841 72842 72843 72844 72845 72846 72847 72848 72849 72850 72851 72852 72853 72854 72855 72856 72857 72858 72859 72860 72861 72862 72863 72864 72865 72866 72867 72868 72869 72870 72871 72872 72873 72874 72875 72876 72877 72878 72879 72880 72881 72882 72883 72884 72885 72886 72887 72888 72889 72890 72891 72892 72893 72894 72895 72896 72897 72898 72899 72900 72901 72902 72903 72904 72905 72906 72907 72908 72909 72910 72911 72912 72913 72914 72915 72916 72917 72918 72919 72920 72921 72922 72923 72924 72925 72926 72927 72928 72929 72930 72931 72932 72933 72934 72935 72936 72937 72938 72939 72940 72941 72942 72943 72944 72945 72946 72947 72948 72949 72950 72951 72952 72953 72954 72955 72956 72957 72958 72959 72960 72961 72962 72963 72964 72965 72966 72967 72968 72969 72970 72971 72972 72973 72974 72975 72976 72977 72978 72979 72980 72981 72982 72983 72984 72985 72986 72987 72988 72989 72990 72991 72992 72993 72994 72995 72996 72997 72998 72999 73000 73001 73002 73003 73004 73005 73006 73007 73008 73009 73010 73011 73012 73013 73014 73015 73016 73017 73018 73019 73020 73021 73022 73023 73024 73025 73026 73027 73028 73029 73030 73031 73032 73033 73034 73035 73036 73037 73038 73039 73040 73041 73042 73043 73044 73045 73046 73047 73048 73049 73050 73051 73052 73053 73054 73055 73056 73057 73058 73059 73060 73061 73062 73063 73064 73065 73066 73067 73068 73069 73070 73071 73072 73073 73074 73075 73076 73077 73078 73079 73080 73081 73082 73083 73084 73085 73086 73087 73088 73089 73090 73091 73092 73093 73094 73095 73096 73097 73098 73099 73100 73101 73102 73103 73104 73105 73106 73107 73108 73109 73110 73111 73112 73113 73114 73115 73116 73117 73118 73119 73120 73121 73122 73123 73124 73125 73126 73127 73128 73129 73130 73131 73132 73133 73134 73135 73136 73137 73138 73139 73140 73141 73142 73143 73144 73145 73146 73147 73148 73149 73150 73151 73152 73153 73154 73155 73156 73157 73158 73159 73160 73161 73162 73163 73164 73165 73166 73167 73168 73169 73170 73171 73172 73173 73174 73175 73176 73177 73178 73179 73180 73181 73182 73183 73184 73185 73186 73187 73188 73189 73190 73191 73192 73193 73194 73195 73196 73197 73198 73199 73200 73201 73202 73203 73204 73205 73206 73207 73208 73209 73210 73211 73212 73213 73214 73215 73216 73217 73218 73219 73220 73221 73222 73223 73224 73225 73226 73227 73228 73229 73230 73231 73232 73233 73234 73235 73236 73237 73238 73239 73240 73241 73242 73243 73244 73245 73246 73247 73248 73249 73250 73251 73252 73253 73254 73255 73256 73257 73258 73259 73260 73261 73262 73263 73264 73265 73266 73267 73268 73269 73270 73271 73272 73273 73274 73275 73276 73277 73278 73279 73280 73281 73282 73283 73284 73285 73286 73287 73288 73289 73290 73291 73292 73293 73294 73295 73296 73297 73298 73299 73300 73301 73302 73303 73304 73305 73306 73307 73308 73309 73310 73311 73312 73313 73314 73315 73316 73317 73318 73319 73320 73321 73322 73323 73324 73325 73326 73327 73328 73329 73330 73331 73332 73333 73334 73335 73336 73337 73338 73339 73340 73341 73342 73343 73344 73345 73346 73347 73348 73349 73350 73351 73352 73353 73354 73355 73356 73357 73358 73359 73360 73361 73362 73363 73364 73365 73366 73367 73368 73369 73370 73371 73372 73373 73374 73375 73376 73377 73378 73379 73380 73381 73382 73383 73384 73385 73386 73387 73388 73389 73390 73391 73392 73393 73394 73395 73396 73397 73398 73399 73400 73401 73402 73403 73404 73405 73406 73407 73408 73409 73410 73411 73412 73413 73414 73415 73416 73417 73418 73419 73420 73421 73422 73423 73424 73425 73426 73427 73428 73429 73430 73431 73432 73433 73434 73435 73436 73437 73438 73439 73440 73441 73442 73443 73444 73445 73446 73447 73448 73449 73450 73451 73452 73453 73454 73455 73456 73457 73458 73459 73460 73461 73462 73463 73464 73465 73466 73467 73468 73469 73470 73471 73472 73473 73474 73475 73476 73477 73478 73479 73480 73481 73482 73483 73484 73485 73486 73487 73488 73489 73490 73491 73492 73493 73494 73495 73496 73497 73498 73499 73500 73501 73502 73503 73504 73505 73506 73507 73508 73509 73510 73511 73512 73513 73514 73515 73516 73517 73518 73519 73520 73521 73522 73523 73524 73525 73526 73527 73528 73529 73530 73531 73532 73533 73534 73535 73536 73537 73538 73539 73540 73541 73542 73543 73544 73545 73546 73547 73548 73549 73550 73551 73552 73553 73554 73555 73556 73557 73558 73559 73560 73561 73562 73563 73564 73565 73566 73567 73568 73569 73570 73571 73572 73573 73574 73575 73576 73577 73578 73579 73580 73581 73582 73583 73584 73585 73586 73587 73588 73589 73590 73591 73592 73593 73594 73595 73596 73597 73598 73599 73600 73601 73602 73603 73604 73605 73606 73607 73608 73609 73610 73611 73612 73613 73614 73615 73616 73617 73618 73619 73620 73621 73622 73623 73624 73625 73626 73627 73628 73629 73630 73631 73632 73633 73634 73635 73636 73637 73638 73639 73640 73641 73642 73643 73644 73645 73646 73647 73648 73649 73650 73651 73652 73653 73654 73655 73656 73657 73658 73659 73660 73661 73662 73663 73664 73665 73666 73667 73668 73669 73670 73671 73672 73673 73674 73675 73676 73677 73678 73679 73680 73681 73682 73683 73684 73685 73686 73687 73688 73689 73690 73691 73692 73693 73694 73695 73696 73697 73698 73699 73700 73701 73702 73703 73704 73705 73706 73707 73708 73709 73710 73711 73712 73713 73714 73715 73716 73717 73718 73719 73720 73721 73722 73723 73724 73725 73726 73727 73728 73729 73730 73731 73732 73733 73734 73735 73736 73737 73738 73739 73740 73741 73742 73743 73744 73745 73746 73747 73748 73749 73750 73751 73752 73753 73754 73755 73756 73757 73758 73759 73760 73761 73762 73763 73764 73765 73766 73767 73768 73769 73770 73771 73772 73773 73774 73775 73776 73777 73778 73779 73780 73781 73782 73783 73784 73785 73786 73787 73788 73789 73790 73791 73792 73793 73794 73795 73796 73797 73798 73799 73800 73801 73802 73803 73804 73805 73806 73807 73808 73809 73810 73811 73812 73813 73814 73815 73816 73817 73818 73819 73820 73821 73822 73823 73824 73825 73826 73827 73828 73829 73830 73831 73832 73833 73834 73835 73836 73837 73838 73839 73840 73841 73842 73843 73844 73845 73846 73847 73848 73849 73850 73851 73852 73853 73854 73855 73856 73857 73858 73859 73860 73861 73862 73863 73864 73865 73866 73867 73868 73869 73870 73871 73872 73873 73874 73875 73876 73877 73878 73879 73880 73881 73882 73883 73884 73885 73886 73887 73888 73889 73890 73891 73892 73893 73894 73895 73896 73897 73898 73899 73900 73901 73902 73903 73904 73905 73906 73907 73908 73909 73910 73911 73912 73913 73914 73915 73916 73917 73918 73919 73920 73921 73922 73923 73924 73925 73926 73927 73928 73929 73930 73931 73932 73933 73934 73935 73936 73937 73938 73939 73940 73941 73942 73943 73944 73945 73946 73947 73948 73949 73950 73951 73952 73953 73954 73955 73956 73957 73958 73959 73960 73961 73962 73963 73964 73965 73966 73967 73968 73969 73970 73971 73972 73973 73974 73975 73976 73977 73978 73979 73980 73981 73982 73983 73984 73985 73986 73987 73988 73989 73990 73991 73992 73993 73994 73995 73996 73997 73998 73999 74000 74001 74002 74003 74004 74005 74006 74007 74008 74009 74010 74011 74012 74013 74014 74015 74016 74017 74018 74019 74020 74021 74022 74023 74024 74025 74026 74027 74028 74029 74030 74031 74032 74033 74034 74035 74036 74037 74038 74039 74040 74041 74042 74043 74044 74045 74046 74047 74048 74049 74050 74051 74052 74053 74054 74055 74056 74057 74058 74059 74060 74061 74062 74063 74064 74065 74066 74067 74068 74069 74070 74071 74072 74073 74074 74075 74076 74077 74078 74079 74080 74081 74082 74083 74084 74085 74086 74087 74088 74089 74090 74091 74092 74093 74094 74095 74096 74097 74098 74099 74100 74101 74102 74103 74104 74105 74106 74107 74108 74109 74110 74111 74112 74113 74114 74115 74116 74117 74118 74119 74120 74121 74122 74123 74124 74125 74126 74127 74128 74129 74130 74131 74132 74133 74134 74135 74136 74137 74138 74139 74140 74141 74142 74143 74144 74145 74146 74147 74148 74149 74150 74151 74152 74153 74154 74155 74156 74157 74158 74159 74160 74161 74162 74163 74164 74165 74166 74167 74168 74169 74170 74171 74172 74173 74174 74175 74176 74177 74178 74179 74180 74181 74182 74183 74184 74185 74186 74187 74188 74189 74190 74191 74192 74193 74194 74195 74196 74197 74198 74199 74200 74201 74202 74203 74204 74205 74206 74207 74208 74209 74210 74211 74212 74213 74214 74215 74216 74217 74218 74219 74220 74221 74222 74223 74224 74225 74226 74227 74228 74229 74230 74231 74232 74233 74234 74235 74236 74237 74238 74239 74240 74241 74242 74243 74244 74245 74246 74247 74248 74249 74250 74251 74252 74253 74254 74255 74256 74257 74258 74259 74260 74261 74262 74263 74264 74265 74266 74267 74268 74269 74270 74271 74272 74273 74274 74275 74276 74277 74278 74279 74280 74281 74282 74283 74284 74285 74286 74287 74288 74289 74290 74291 74292 74293 74294 74295 74296 74297 74298 74299 74300 74301 74302 74303 74304 74305 74306 74307 74308 74309 74310 74311 74312 74313 74314 74315 74316 74317 74318 74319 74320 74321 74322 74323 74324 74325 74326 74327 74328 74329 74330 74331 74332 74333 74334 74335 74336 74337 74338 74339 74340 74341 74342 74343 74344 74345 74346 74347 74348 74349 74350 74351 74352 74353 74354 74355 74356 74357 74358 74359 74360 74361 74362 74363 74364 74365 74366 74367 74368 74369 74370 74371 74372 74373 74374 74375 74376 74377 74378 74379 74380 74381 74382 74383 74384 74385 74386 74387 74388 74389 74390 74391 74392 74393 74394 74395 74396 74397 74398 74399 74400 74401 74402 74403 74404 74405 74406 74407 74408 74409 74410 74411 74412 74413 74414 74415 74416 74417 74418 74419 74420 74421 74422 74423 74424 74425 74426 74427 74428 74429 74430 74431 74432 74433 74434 74435 74436 74437 74438 74439 74440 74441 74442 74443 74444 74445 74446 74447 74448 74449 74450 74451 74452 74453 74454 74455 74456 74457 74458 74459 74460 74461 74462 74463 74464 74465 74466 74467 74468 74469 74470 74471 74472 74473 74474 74475 74476 74477 74478 74479 74480 74481 74482 74483 74484 74485 74486 74487 74488 74489 74490 74491 74492 74493 74494 74495 74496 74497 74498 74499 74500 74501 74502 74503 74504 74505 74506 74507 74508 74509 74510 74511 74512 74513 74514 74515 74516 74517 74518 74519 74520 74521 74522 74523 74524 74525 74526 74527 74528 74529 74530 74531 74532 74533 74534 74535 74536 74537 74538 74539 74540 74541 74542 74543 74544 74545 74546 74547 74548 74549 74550 74551 74552 74553 74554 74555 74556 74557 74558 74559 74560 74561 74562 74563 74564 74565 74566 74567 74568 74569 74570 74571 74572 74573 74574 74575 74576 74577 74578 74579 74580 74581 74582 74583 74584 74585 74586 74587 74588 74589 74590 74591 74592 74593 74594 74595 74596 74597 74598 74599 74600 74601 74602 74603 74604 74605 74606 74607 74608 74609 74610 74611 74612 74613 74614 74615 74616 74617 74618 74619 74620 74621 74622 74623 74624 74625 74626 74627 74628 74629 74630 74631 74632 74633 74634 74635 74636 74637 74638 74639 74640 74641 74642 74643 74644 74645 74646 74647 74648 74649 74650 74651 74652 74653 74654 74655 74656 74657 74658 74659 74660 74661 74662 74663 74664 74665 74666 74667 74668 74669 74670 74671 74672 74673 74674 74675 74676 74677 74678 74679 74680 74681 74682 74683 74684 74685 74686 74687 74688 74689 74690 74691 74692 74693 74694 74695 74696 74697 74698 74699 74700 74701 74702 74703 74704 74705 74706 74707 74708 74709 74710 74711 74712 74713 74714 74715 74716 74717 74718 74719 74720 74721 74722 74723 74724 74725 74726 74727 74728 74729 74730 74731 74732 74733 74734 74735 74736 74737 74738 74739 74740 74741 74742 74743 74744 74745 74746 74747 74748 74749 74750 74751 74752 74753 74754 74755 74756 74757 74758 74759 74760 74761 74762 74763 74764 74765 74766 74767 74768 74769 74770 74771 74772 74773 74774 74775 74776 74777 74778 74779 74780 74781 74782 74783 74784 74785 74786 74787 74788 74789 74790 74791 74792 74793 74794 74795 74796 74797 74798 74799 74800 74801 74802 74803 74804 74805 74806 74807 74808 74809 74810 74811 74812 74813 74814 74815 74816 74817 74818 74819 74820 74821 74822 74823 74824 74825 74826 74827 74828 74829 74830 74831 74832 74833 74834 74835 74836 74837 74838 74839 74840 74841 74842 74843 74844 74845 74846 74847 74848 74849 74850 74851 74852 74853 74854 74855 74856 74857 74858 74859 74860 74861 74862 74863 74864 74865 74866 74867 74868 74869 74870 74871 74872 74873 74874 74875 74876 74877 74878 74879 74880 74881 74882 74883 74884 74885 74886 74887 74888 74889 74890 74891 74892 74893 74894 74895 74896 74897 74898 74899 74900 74901 74902 74903 74904 74905 74906 74907 74908 74909 74910 74911 74912 74913 74914 74915 74916 74917 74918 74919 74920 74921 74922 74923 74924 74925 74926 74927 74928 74929 74930 74931 74932 74933 74934 74935 74936 74937 74938 74939 74940 74941 74942 74943 74944 74945 74946 74947 74948 74949 74950 74951 74952 74953 74954 74955 74956 74957 74958 74959 74960 74961 74962 74963 74964 74965 74966 74967 74968 74969 74970 74971 74972 74973 74974 74975 74976 74977 74978 74979 74980 74981 74982 74983 74984 74985 74986 74987 74988 74989 74990 74991 74992 74993 74994 74995 74996 74997 74998 74999 75000 75001 75002 75003 75004 75005 75006 75007 75008 75009 75010 75011 75012 75013 75014 75015 75016 75017 75018 75019 75020 75021 75022 75023 75024 75025 75026 75027 75028 75029 75030 75031 75032 75033 75034 75035 75036 75037 75038 75039 75040 75041 75042 75043 75044 75045 75046 75047 75048 75049 75050 75051 75052 75053 75054 75055 75056 75057 75058 75059 75060 75061 75062 75063 75064 75065 75066 75067 75068 75069 75070 75071 75072 75073 75074 75075 75076 75077 75078 75079 75080 75081 75082 75083 75084 75085 75086 75087 75088 75089 75090 75091 75092 75093 75094 75095 75096 75097 75098 75099 75100 75101 75102 75103 75104 75105 75106 75107 75108 75109 75110 75111 75112 75113 75114 75115 75116 75117 75118 75119 75120 75121 75122 75123 75124 75125 75126 75127 75128 75129 75130 75131 75132 75133 75134 75135 75136 75137 75138 75139 75140 75141 75142 75143 75144 75145 75146 75147 75148 75149 75150 75151 75152 75153 75154 75155 75156 75157 75158 75159 75160 75161 75162 75163 75164 75165 75166 75167 75168 75169 75170 75171 75172 75173 75174 75175 75176 75177 75178 75179 75180 75181 75182 75183 75184 75185 75186 75187 75188 75189 75190 75191 75192 75193 75194 75195 75196 75197 75198 75199 75200 75201 75202 75203 75204 75205 75206 75207 75208 75209 75210 75211 75212 75213 75214 75215 75216 75217 75218 75219 75220 75221 75222 75223 75224 75225 75226 75227 75228 75229 75230 75231 75232 75233 75234 75235 75236 75237 75238 75239 75240 75241 75242 75243 75244 75245 75246 75247 75248 75249 75250 75251 75252 75253 75254 75255 75256 75257 75258 75259 75260 75261 75262 75263 75264 75265 75266 75267 75268 75269 75270 75271 75272 75273 75274 75275 75276 75277 75278 75279 75280 75281 75282 75283 75284 75285 75286 75287 75288 75289 75290 75291 75292 75293 75294 75295 75296 75297 75298 75299 75300 75301 75302 75303 75304 75305 75306 75307 75308 75309 75310 75311 75312 75313 75314 75315 75316 75317 75318 75319 75320 75321 75322 75323 75324 75325 75326 75327 75328 75329 75330 75331 75332 75333 75334 75335 75336 75337 75338 75339 75340 75341 75342 75343 75344 75345 75346 75347 75348 75349 75350 75351 75352 75353 75354 75355 75356 75357 75358 75359 75360 75361 75362 75363 75364 75365 75366 75367 75368 75369 75370 75371 75372 75373 75374 75375 75376 75377 75378 75379 75380 75381 75382 75383 75384 75385 75386 75387 75388 75389 75390 75391 75392 75393 75394 75395 75396 75397 75398 75399 75400 75401 75402 75403 75404 75405 75406 75407 75408 75409 75410 75411 75412 75413 75414 75415 75416 75417 75418 75419 75420 75421 75422 75423 75424 75425 75426 75427 75428 75429 75430 75431 75432 75433 75434 75435 75436 75437 75438 75439 75440 75441 75442 75443 75444 75445 75446 75447 75448 75449 75450 75451 75452 75453 75454 75455 75456 75457 75458 75459 75460 75461 75462 75463 75464 75465 75466 75467 75468 75469 75470 75471 75472 75473 75474 75475 75476 75477 75478 75479 75480 75481 75482 75483 75484 75485 75486 75487 75488 75489 75490 75491 75492 75493 75494 75495 75496 75497 75498 75499 75500 75501 75502 75503 75504 75505 75506 75507 75508 75509 75510 75511 75512 75513 75514 75515 75516 75517 75518 75519 75520 75521 75522 75523 75524 75525 75526 75527 75528 75529 75530 75531 75532 75533 75534 75535 75536 75537 75538 75539 75540 75541 75542 75543 75544 75545 75546 75547 75548 75549 75550 75551 75552 75553 75554 75555 75556 75557 75558 75559 75560 75561 75562 75563 75564 75565 75566 75567 75568 75569 75570 75571 75572 75573 75574 75575 75576 75577 75578 75579 75580 75581 75582 75583 75584 75585 75586 75587 75588 75589 75590 75591 75592 75593 75594 75595 75596 75597 75598 75599 75600 75601 75602 75603 75604 75605 75606 75607 75608 75609 75610 75611 75612 75613 75614 75615 75616 75617 75618 75619 75620 75621 75622 75623 75624 75625 75626 75627 75628 75629 75630 75631 75632 75633 75634 75635 75636 75637 75638 75639 75640 75641 75642 75643 75644 75645 75646 75647 75648 75649 75650 75651 75652 75653 75654 75655 75656 75657 75658 75659 75660 75661 75662 75663 75664 75665 75666 75667 75668 75669 75670 75671 75672 75673 75674 75675 75676 75677 75678 75679 75680 75681 75682 75683 75684 75685 75686 75687 75688 75689 75690 75691 75692 75693 75694 75695 75696 75697 75698 75699 75700 75701 75702 75703 75704 75705 75706 75707 75708 75709 75710 75711 75712 75713 75714 75715 75716 75717 75718 75719 75720 75721 75722 75723 75724 75725 75726 75727 75728 75729 75730 75731 75732 75733 75734 75735 75736 75737 75738 75739 75740 75741 75742 75743 75744 75745 75746 75747 75748 75749 75750 75751 75752 75753 75754 75755 75756 75757 75758 75759 75760 75761 75762 75763 75764 75765 75766 75767 75768 75769 75770 75771 75772 75773 75774 75775 75776 75777 75778 75779 75780 75781 75782 75783 75784 75785 75786 75787 75788 75789 75790 75791 75792 75793 75794 75795 75796 75797 75798 75799 75800 75801 75802 75803 75804 75805 75806 75807 75808 75809 75810 75811 75812 75813 75814 75815 75816 75817 75818 75819 75820 75821 75822 75823 75824 75825 75826 75827 75828 75829 75830 75831 75832 75833 75834 75835 75836 75837 75838 75839 75840 75841 75842 75843 75844 75845 75846 75847 75848 75849 75850 75851 75852 75853 75854 75855 75856 75857 75858 75859 75860 75861 75862 75863 75864 75865 75866 75867 75868 75869 75870 75871 75872 75873 75874 75875 75876 75877 75878 75879 75880 75881 75882 75883 75884 75885 75886 75887 75888 75889 75890 75891 75892 75893 75894 75895 75896 75897 75898 75899 75900 75901 75902 75903 75904 75905 75906 75907 75908 75909 75910 75911 75912 75913 75914 75915 75916 75917 75918 75919 75920 75921 75922 75923 75924 75925 75926 75927 75928 75929 75930 75931 75932 75933 75934 75935 75936 75937 75938 75939 75940 75941 75942 75943 75944 75945 75946 75947 75948 75949 75950 75951 75952 75953 75954 75955 75956 75957 75958 75959 75960 75961 75962 75963 75964 75965 75966 75967 75968 75969 75970 75971 75972 75973 75974 75975 75976 75977 75978 75979 75980 75981 75982 75983 75984 75985 75986 75987 75988 75989 75990 75991 75992 75993 75994 75995 75996 75997 75998 75999 76000 76001 76002 76003 76004 76005 76006 76007 76008 76009 76010 76011 76012 76013 76014 76015 76016 76017 76018 76019 76020 76021 76022 76023 76024 76025 76026 76027 76028 76029 76030 76031 76032 76033 76034 76035 76036 76037 76038 76039 76040 76041 76042 76043 76044 76045 76046 76047 76048 76049 76050 76051 76052 76053 76054 76055 76056 76057 76058 76059 76060 76061 76062 76063 76064 76065 76066 76067 76068 76069 76070 76071 76072 76073 76074 76075 76076 76077 76078 76079 76080 76081 76082 76083 76084 76085 76086 76087 76088 76089 76090 76091 76092 76093 76094 76095 76096 76097 76098 76099 76100 76101 76102 76103 76104 76105 76106 76107 76108 76109 76110 76111 76112 76113 76114 76115 76116 76117 76118 76119 76120 76121 76122 76123 76124 76125 76126 76127 76128 76129 76130 76131 76132 76133 76134 76135 76136 76137 76138 76139 76140 76141 76142 76143 76144 76145 76146 76147 76148 76149 76150 76151 76152 76153 76154 76155 76156 76157 76158 76159 76160 76161 76162 76163 76164 76165 76166 76167 76168 76169 76170 76171 76172 76173 76174 76175 76176 76177 76178 76179 76180 76181 76182 76183 76184 76185 76186 76187 76188 76189 76190 76191 76192 76193 76194 76195 76196 76197 76198 76199 76200 76201 76202 76203 76204 76205 76206 76207 76208 76209 76210 76211 76212 76213 76214 76215 76216 76217 76218 76219 76220 76221 76222 76223 76224 76225 76226 76227 76228 76229 76230 76231 76232 76233 76234 76235 76236 76237 76238 76239 76240 76241 76242 76243 76244 76245 76246 76247 76248 76249 76250 76251 76252 76253 76254 76255 76256 76257 76258 76259 76260 76261 76262 76263 76264 76265 76266 76267 76268 76269 76270 76271 76272 76273 76274 76275 76276 76277 76278 76279 76280 76281 76282 76283 76284 76285 76286 76287 76288 76289 76290 76291 76292 76293 76294 76295 76296 76297 76298 76299 76300 76301 76302 76303 76304 76305 76306 76307 76308 76309 76310 76311 76312 76313 76314 76315 76316 76317 76318 76319 76320 76321 76322 76323 76324 76325 76326 76327 76328 76329 76330 76331 76332 76333 76334 76335 76336 76337 76338 76339 76340 76341 76342 76343 76344 76345 76346 76347 76348 76349 76350 76351 76352 76353 76354 76355 76356 76357 76358 76359 76360 76361 76362 76363 76364 76365 76366 76367 76368 76369 76370 76371 76372 76373 76374 76375 76376 76377 76378 76379 76380 76381 76382 76383 76384 76385 76386 76387 76388 76389 76390 76391 76392 76393 76394 76395 76396 76397 76398 76399 76400 76401 76402 76403 76404 76405 76406 76407 76408 76409 76410 76411 76412 76413 76414 76415 76416 76417 76418 76419 76420 76421 76422 76423 76424 76425 76426 76427 76428 76429 76430 76431 76432 76433 76434 76435 76436 76437 76438 76439 76440 76441 76442 76443 76444 76445 76446 76447 76448 76449 76450 76451 76452 76453 76454 76455 76456 76457 76458 76459 76460 76461 76462 76463 76464 76465 76466 76467 76468 76469 76470 76471 76472 76473 76474 76475 76476 76477 76478 76479 76480 76481 76482 76483 76484 76485 76486 76487 76488 76489 76490 76491 76492 76493 76494 76495 76496 76497 76498 76499 76500 76501 76502 76503 76504 76505 76506 76507 76508 76509 76510 76511 76512 76513 76514 76515 76516 76517 76518 76519 76520 76521 76522 76523 76524 76525 76526 76527 76528 76529 76530 76531 76532 76533 76534 76535 76536 76537 76538 76539 76540 76541 76542 76543 76544 76545 76546 76547 76548 76549 76550 76551 76552 76553 76554 76555 76556 76557 76558 76559 76560 76561 76562 76563 76564 76565 76566 76567 76568 76569 76570 76571 76572 76573 76574 76575 76576 76577 76578 76579 76580 76581 76582 76583 76584 76585 76586 76587 76588 76589 76590 76591 76592 76593 76594 76595 76596 76597 76598 76599 76600 76601 76602 76603 76604 76605 76606 76607 76608 76609 76610 76611 76612 76613 76614 76615 76616 76617 76618 76619 76620 76621 76622 76623 76624 76625 76626 76627 76628 76629 76630 76631 76632 76633 76634 76635 76636 76637 76638 76639 76640 76641 76642 76643 76644 76645 76646 76647 76648 76649 76650 76651 76652 76653 76654 76655 76656 76657 76658 76659 76660 76661 76662 76663 76664 76665 76666 76667 76668 76669 76670 76671 76672 76673 76674 76675 76676 76677 76678 76679 76680 76681 76682 76683 76684 76685 76686 76687 76688 76689 76690 76691 76692 76693 76694 76695 76696 76697 76698 76699 76700 76701 76702 76703 76704 76705 76706 76707 76708 76709 76710 76711 76712 76713 76714 76715 76716 76717 76718 76719 76720 76721 76722 76723 76724 76725 76726 76727 76728 76729 76730 76731 76732 76733 76734 76735 76736 76737 76738 76739 76740 76741 76742 76743 76744 76745 76746 76747 76748 76749 76750 76751 76752 76753 76754 76755 76756 76757 76758 76759 76760 76761 76762 76763 76764 76765 76766 76767 76768 76769 76770 76771 76772 76773 76774 76775 76776 76777 76778 76779 76780 76781 76782 76783 76784 76785 76786 76787 76788 76789 76790 76791 76792 76793 76794 76795 76796 76797 76798 76799 76800 76801 76802 76803 76804 76805 76806 76807 76808 76809 76810 76811 76812 76813 76814 76815 76816 76817 76818 76819 76820 76821 76822 76823 76824 76825 76826 76827 76828 76829 76830 76831 76832 76833 76834 76835 76836 76837 76838 76839 76840 76841 76842 76843 76844 76845 76846 76847 76848 76849 76850 76851 76852 76853 76854 76855 76856 76857 76858 76859 76860 76861 76862 76863 76864 76865 76866 76867 76868 76869 76870 76871 76872 76873 76874 76875 76876 76877 76878 76879 76880 76881 76882 76883 76884 76885 76886 76887 76888 76889 76890 76891 76892 76893 76894 76895 76896 76897 76898 76899 76900 76901 76902 76903 76904 76905 76906 76907 76908 76909 76910 76911 76912 76913 76914 76915 76916 76917 76918 76919 76920 76921 76922 76923 76924 76925 76926 76927 76928 76929 76930 76931 76932 76933 76934 76935 76936 76937 76938 76939 76940 76941 76942 76943 76944 76945 76946 76947 76948 76949 76950 76951 76952 76953 76954 76955 76956 76957 76958 76959 76960 76961 76962 76963 76964 76965 76966 76967 76968 76969 76970 76971 76972 76973 76974 76975 76976 76977 76978 76979 76980 76981 76982 76983 76984 76985 76986 76987 76988 76989 76990 76991 76992 76993 76994 76995 76996 76997 76998 76999 77000 77001 77002 77003 77004 77005 77006 77007 77008 77009 77010 77011 77012 77013 77014 77015 77016 77017 77018 77019 77020 77021 77022 77023 77024 77025 77026 77027 77028 77029 77030 77031 77032 77033 77034 77035 77036 77037 77038 77039 77040 77041 77042 77043 77044 77045 77046 77047 77048 77049 77050 77051 77052 77053 77054 77055 77056 77057 77058 77059 77060 77061 77062 77063 77064 77065 77066 77067 77068 77069 77070 77071 77072 77073 77074 77075 77076 77077 77078 77079 77080 77081 77082 77083 77084 77085 77086 77087 77088 77089 77090 77091 77092 77093 77094 77095 77096 77097 77098 77099 77100 77101 77102 77103 77104 77105 77106 77107 77108 77109 77110 77111 77112 77113 77114 77115 77116 77117 77118 77119 77120 77121 77122 77123 77124 77125 77126 77127 77128 77129 77130 77131 77132 77133 77134 77135 77136 77137 77138 77139 77140 77141 77142 77143 77144 77145 77146 77147 77148 77149 77150 77151 77152 77153 77154 77155 77156 77157 77158 77159 77160 77161 77162 77163 77164 77165 77166 77167 77168 77169 77170 77171 77172 77173 77174 77175 77176 77177 77178 77179 77180 77181 77182 77183 77184 77185 77186 77187 77188 77189 77190 77191 77192 77193 77194 77195 77196 77197 77198 77199 77200 77201 77202 77203 77204 77205 77206 77207 77208 77209 77210 77211 77212 77213 77214 77215 77216 77217 77218 77219 77220 77221 77222 77223 77224 77225 77226 77227 77228 77229 77230 77231 77232 77233 77234 77235 77236 77237 77238 77239 77240 77241 77242 77243 77244 77245 77246 77247 77248 77249 77250 77251 77252 77253 77254 77255 77256 77257 77258 77259 77260 77261 77262 77263 77264 77265 77266 77267 77268 77269 77270 77271 77272 77273 77274 77275 77276 77277 77278 77279 77280 77281 77282 77283 77284 77285 77286 77287 77288 77289 77290 77291 77292 77293 77294 77295 77296 77297 77298 77299 77300 77301 77302 77303 77304 77305 77306 77307 77308 77309 77310 77311 77312 77313 77314 77315 77316 77317 77318 77319 77320 77321 77322 77323 77324 77325 77326 77327 77328 77329 77330 77331 77332 77333 77334 77335 77336 77337 77338 77339 77340 77341 77342 77343 77344 77345 77346 77347 77348 77349 77350 77351 77352 77353 77354 77355 77356 77357 77358 77359 77360 77361 77362 77363 77364 77365 77366 77367 77368 77369 77370 77371 77372 77373 77374 77375 77376 77377 77378 77379 77380 77381 77382 77383 77384 77385 77386 77387 77388 77389 77390 77391 77392 77393 77394 77395 77396 77397 77398 77399 77400 77401 77402 77403 77404 77405 77406 77407 77408 77409 77410 77411 77412 77413 77414 77415 77416 77417 77418 77419 77420 77421 77422 77423 77424 77425 77426 77427 77428 77429 77430 77431 77432 77433 77434 77435 77436 77437 77438 77439 77440 77441 77442 77443 77444 77445 77446 77447 77448 77449 77450 77451 77452 77453 77454 77455 77456 77457 77458 77459 77460 77461 77462 77463 77464 77465 77466 77467 77468 77469 77470 77471 77472 77473 77474 77475 77476 77477 77478 77479 77480 77481 77482 77483 77484 77485 77486 77487 77488 77489 77490 77491 77492 77493 77494 77495 77496 77497 77498 77499 77500 77501 77502 77503 77504 77505 77506 77507 77508 77509 77510 77511 77512 77513 77514 77515 77516 77517 77518 77519 77520 77521 77522 77523 77524 77525 77526 77527 77528 77529 77530 77531 77532 77533 77534 77535 77536 77537 77538 77539 77540 77541 77542 77543 77544 77545 77546 77547 77548 77549 77550 77551 77552 77553 77554 77555 77556 77557 77558 77559 77560 77561 77562 77563 77564 77565 77566 77567 77568 77569 77570 77571 77572 77573 77574 77575 77576 77577 77578 77579 77580 77581 77582 77583 77584 77585 77586 77587 77588 77589 77590 77591 77592 77593 77594 77595 77596 77597 77598 77599 77600 77601 77602 77603 77604 77605 77606 77607 77608 77609 77610 77611 77612 77613 77614 77615 77616 77617 77618 77619 77620 77621 77622 77623 77624 77625 77626 77627 77628 77629 77630 77631 77632 77633 77634 77635 77636 77637 77638 77639 77640 77641 77642 77643 77644 77645 77646 77647 77648 77649 77650 77651 77652 77653 77654 77655 77656 77657 77658 77659 77660 77661 77662 77663 77664 77665 77666 77667 77668 77669 77670 77671 77672 77673 77674 77675 77676 77677 77678 77679 77680 77681 77682 77683 77684 77685 77686 77687 77688 77689 77690 77691 77692 77693 77694 77695 77696 77697 77698 77699 77700 77701 77702 77703 77704 77705 77706 77707 77708 77709 77710 77711 77712 77713 77714 77715 77716 77717 77718 77719 77720 77721 77722 77723 77724 77725 77726 77727 77728 77729 77730 77731 77732 77733 77734 77735 77736 77737 77738 77739 77740 77741 77742 77743 77744 77745 77746 77747 77748 77749 77750 77751 77752 77753 77754 77755 77756 77757 77758 77759 77760 77761 77762 77763 77764 77765 77766 77767 77768 77769 77770 77771 77772 77773 77774 77775 77776 77777 77778 77779 77780 77781 77782 77783 77784 77785 77786 77787 77788 77789 77790 77791 77792 77793 77794 77795 77796 77797 77798 77799 77800 77801 77802 77803 77804 77805 77806 77807 77808 77809 77810 77811 77812 77813 77814 77815 77816 77817 77818 77819 77820 77821 77822 77823 77824 77825 77826 77827 77828 77829 77830 77831 77832 77833 77834 77835 77836 77837 77838 77839 77840 77841 77842 77843 77844 77845 77846 77847 77848 77849 77850 77851 77852 77853 77854 77855 77856 77857 77858 77859 77860 77861 77862 77863 77864 77865 77866 77867 77868 77869 77870 77871 77872 77873 77874 77875 77876 77877 77878 77879 77880 77881 77882 77883 77884 77885 77886 77887 77888 77889 77890 77891 77892 77893 77894 77895 77896 77897 77898 77899 77900 77901 77902 77903 77904 77905 77906 77907 77908 77909 77910 77911 77912 77913 77914 77915 77916 77917 77918 77919 77920 77921 77922 77923 77924 77925 77926 77927 77928 77929 77930 77931 77932 77933 77934 77935 77936 77937 77938 77939 77940 77941 77942 77943 77944 77945 77946 77947 77948 77949 77950 77951 77952 77953 77954 77955 77956 77957 77958 77959 77960 77961 77962 77963 77964 77965 77966 77967 77968 77969 77970 77971 77972 77973 77974 77975 77976 77977 77978 77979 77980 77981 77982 77983 77984 77985 77986 77987 77988 77989 77990 77991 77992 77993 77994 77995 77996 77997 77998 77999 78000 78001 78002 78003 78004 78005 78006 78007 78008 78009 78010 78011 78012 78013 78014 78015 78016 78017 78018 78019 78020 78021 78022 78023 78024 78025 78026 78027 78028 78029 78030 78031 78032 78033 78034 78035 78036 78037 78038 78039 78040 78041 78042 78043 78044 78045 78046 78047 78048 78049 78050 78051 78052 78053 78054 78055 78056 78057 78058 78059 78060 78061 78062 78063 78064 78065 78066 78067 78068 78069 78070 78071 78072 78073 78074 78075 78076 78077 78078 78079 78080 78081 78082 78083 78084 78085 78086 78087 78088 78089 78090 78091 78092 78093 78094 78095 78096 78097 78098 78099 78100 78101 78102 78103 78104 78105 78106 78107 78108 78109 78110 78111 78112 78113 78114 78115 78116 78117 78118 78119 78120 78121 78122 78123 78124 78125 78126 78127 78128 78129 78130 78131 78132 78133 78134 78135 78136 78137 78138 78139 78140 78141 78142 78143 78144 78145 78146 78147 78148 78149 78150 78151 78152 78153 78154 78155 78156 78157 78158 78159 78160 78161 78162 78163 78164 78165 78166 78167 78168 78169 78170 78171 78172 78173 78174 78175 78176 78177 78178 78179 78180 78181 78182 78183 78184 78185 78186 78187 78188 78189 78190 78191 78192 78193 78194 78195 78196 78197 78198 78199 78200 78201 78202 78203 78204 78205 78206 78207 78208 78209 78210 78211 78212 78213 78214 78215 78216 78217 78218 78219 78220 78221 78222 78223 78224 78225 78226 78227 78228 78229 78230 78231 78232 78233 78234 78235 78236 78237 78238 78239 78240 78241 78242 78243 78244 78245 78246 78247 78248 78249 78250 78251 78252 78253 78254 78255 78256 78257 78258 78259 78260 78261 78262 78263 78264 78265 78266 78267 78268 78269 78270 78271 78272 78273 78274 78275 78276 78277 78278 78279 78280 78281 78282 78283 78284 78285 78286 78287 78288 78289 78290 78291 78292 78293 78294 78295 78296 78297 78298 78299 78300 78301 78302 78303 78304 78305 78306 78307 78308 78309 78310 78311 78312 78313 78314 78315 78316 78317 78318 78319 78320 78321 78322 78323 78324 78325 78326 78327 78328 78329 78330 78331 78332 78333 78334 78335 78336 78337 78338 78339 78340 78341 78342 78343 78344 78345 78346 78347 78348 78349 78350 78351 78352 78353 78354 78355 78356 78357 78358 78359 78360 78361 78362 78363 78364 78365 78366 78367 78368 78369 78370 78371 78372 78373 78374 78375 78376 78377 78378 78379 78380 78381 78382 78383 78384 78385 78386 78387 78388 78389 78390 78391 78392 78393 78394 78395 78396 78397 78398 78399 78400 78401 78402 78403 78404 78405 78406 78407 78408 78409 78410 78411 78412 78413 78414 78415 78416 78417 78418 78419 78420 78421 78422 78423 78424 78425 78426 78427 78428 78429 78430 78431 78432 78433 78434 78435 78436 78437 78438 78439 78440 78441 78442 78443 78444 78445 78446 78447 78448 78449 78450 78451 78452 78453 78454 78455 78456 78457 78458 78459 78460 78461 78462 78463 78464 78465 78466 78467 78468 78469 78470 78471 78472 78473 78474 78475 78476 78477 78478 78479 78480 78481 78482 78483 78484 78485 78486 78487 78488 78489 78490 78491 78492 78493 78494 78495 78496 78497 78498 78499 78500 78501 78502 78503 78504 78505 78506 78507 78508 78509 78510 78511 78512 78513 78514 78515 78516 78517 78518 78519 78520 78521 78522 78523 78524 78525 78526 78527 78528 78529 78530 78531 78532 78533 78534 78535 78536 78537 78538 78539 78540 78541 78542 78543 78544 78545 78546 78547 78548 78549 78550 78551 78552 78553 78554 78555 78556 78557 78558 78559 78560 78561 78562 78563 78564 78565 78566 78567 78568 78569 78570 78571 78572 78573 78574 78575 78576 78577 78578 78579 78580 78581 78582 78583 78584 78585 78586 78587 78588 78589 78590 78591 78592 78593 78594 78595 78596 78597 78598 78599 78600 78601 78602 78603 78604 78605 78606 78607 78608 78609 78610 78611 78612 78613 78614 78615 78616 78617 78618 78619 78620 78621 78622 78623 78624 78625 78626 78627 78628 78629 78630 78631 78632 78633 78634 78635 78636 78637 78638 78639 78640 78641 78642 78643 78644 78645 78646 78647 78648 78649 78650 78651 78652 78653 78654 78655 78656 78657 78658 78659 78660 78661 78662 78663 78664 78665 78666 78667 78668 78669 78670 78671 78672 78673 78674 78675 78676 78677 78678 78679 78680 78681 78682 78683 78684 78685 78686 78687 78688 78689 78690 78691 78692 78693 78694 78695 78696 78697 78698 78699 78700 78701 78702 78703 78704 78705 78706 78707 78708 78709 78710 78711 78712 78713 78714 78715 78716 78717 78718 78719 78720 78721 78722 78723 78724 78725 78726 78727 78728 78729 78730 78731 78732 78733 78734 78735 78736 78737 78738 78739 78740 78741 78742 78743 78744 78745 78746 78747 78748 78749 78750 78751 78752 78753 78754 78755 78756 78757 78758 78759 78760 78761 78762 78763 78764 78765 78766 78767 78768 78769 78770 78771 78772 78773 78774 78775 78776 78777 78778 78779 78780 78781 78782 78783 78784 78785 78786 78787 78788 78789 78790 78791 78792 78793 78794 78795 78796 78797 78798 78799 78800 78801 78802 78803 78804 78805 78806 78807 78808 78809 78810 78811 78812 78813 78814 78815 78816 78817 78818 78819 78820 78821 78822 78823 78824 78825 78826 78827 78828 78829 78830 78831 78832 78833 78834 78835 78836 78837 78838 78839 78840 78841 78842 78843 78844 78845 78846 78847 78848 78849 78850 78851 78852 78853 78854 78855 78856 78857 78858 78859 78860 78861 78862 78863 78864 78865 78866 78867 78868 78869 78870 78871 78872 78873 78874 78875 78876 78877 78878 78879 78880 78881 78882 78883 78884 78885 78886 78887 78888 78889 78890 78891 78892 78893 78894 78895 78896 78897 78898 78899 78900 78901 78902 78903 78904 78905 78906 78907 78908 78909 78910 78911 78912 78913 78914 78915 78916 78917 78918 78919 78920 78921 78922 78923 78924 78925 78926 78927 78928 78929 78930 78931 78932 78933 78934 78935 78936 78937 78938 78939 78940 78941 78942 78943 78944 78945 78946 78947 78948 78949 78950 78951 78952 78953 78954 78955 78956 78957 78958 78959 78960 78961 78962 78963 78964 78965 78966 78967 78968 78969 78970 78971 78972 78973 78974 78975 78976 78977 78978 78979 78980 78981 78982 78983 78984 78985 78986 78987 78988 78989 78990 78991 78992 78993 78994 78995 78996 78997 78998 78999 79000 79001 79002 79003 79004 79005 79006 79007 79008 79009 79010 79011 79012 79013 79014 79015 79016 79017 79018 79019 79020 79021 79022 79023 79024 79025 79026 79027 79028 79029 79030 79031 79032 79033 79034 79035 79036 79037 79038 79039 79040 79041 79042 79043 79044 79045 79046 79047 79048 79049 79050 79051 79052 79053 79054 79055 79056 79057 79058 79059 79060 79061 79062 79063 79064 79065 79066 79067 79068 79069 79070 79071 79072 79073 79074 79075 79076 79077 79078 79079 79080 79081 79082 79083 79084 79085 79086 79087 79088 79089 79090 79091 79092 79093 79094 79095 79096 79097 79098 79099 79100 79101 79102 79103 79104 79105 79106 79107 79108 79109 79110 79111 79112 79113 79114 79115 79116 79117 79118 79119 79120 79121 79122 79123 79124 79125 79126 79127 79128 79129 79130 79131 79132 79133 79134 79135 79136 79137 79138 79139 79140 79141 79142 79143 79144 79145 79146 79147 79148 79149 79150 79151 79152 79153 79154 79155 79156 79157 79158 79159 79160 79161 79162 79163 79164 79165 79166 79167 79168 79169 79170 79171 79172 79173 79174 79175 79176 79177 79178 79179 79180 79181 79182 79183 79184 79185 79186 79187 79188 79189 79190 79191 79192 79193 79194 79195 79196 79197 79198 79199 79200 79201 79202 79203 79204 79205 79206 79207 79208 79209 79210 79211 79212 79213 79214 79215 79216 79217 79218 79219 79220 79221 79222 79223 79224 79225 79226 79227 79228 79229 79230 79231 79232 79233 79234 79235 79236 79237 79238 79239 79240 79241 79242 79243 79244 79245 79246 79247 79248 79249 79250 79251 79252 79253 79254 79255 79256 79257 79258 79259 79260 79261 79262 79263 79264 79265 79266 79267 79268 79269 79270 79271 79272 79273 79274 79275 79276 79277 79278 79279 79280 79281 79282 79283 79284 79285 79286 79287 79288 79289 79290 79291 79292 79293 79294 79295 79296 79297 79298 79299 79300 79301 79302 79303 79304 79305 79306 79307 79308 79309 79310 79311 79312 79313 79314 79315 79316 79317 79318 79319 79320 79321 79322 79323 79324 79325 79326 79327 79328 79329 79330 79331 79332 79333 79334 79335 79336 79337 79338 79339 79340 79341 79342 79343 79344 79345 79346 79347 79348 79349 79350 79351 79352 79353 79354 79355 79356 79357 79358 79359 79360 79361 79362 79363 79364 79365 79366 79367 79368 79369 79370 79371 79372 79373 79374 79375 79376 79377 79378 79379 79380 79381 79382 79383 79384 79385 79386 79387 79388 79389 79390 79391 79392 79393 79394 79395 79396 79397 79398 79399 79400 79401 79402 79403 79404 79405 79406 79407 79408 79409 79410 79411 79412 79413 79414 79415 79416 79417 79418 79419 79420 79421 79422 79423 79424 79425 79426 79427 79428 79429 79430 79431 79432 79433 79434 79435 79436 79437 79438 79439 79440 79441 79442 79443 79444 79445 79446 79447 79448 79449 79450 79451 79452 79453 79454 79455 79456 79457 79458 79459 79460 79461 79462 79463 79464 79465 79466 79467 79468 79469 79470 79471 79472 79473 79474 79475 79476 79477 79478 79479 79480 79481 79482 79483 79484 79485 79486 79487 79488 79489 79490 79491 79492 79493 79494 79495 79496 79497 79498 79499 79500 79501 79502 79503 79504 79505 79506 79507 79508 79509 79510 79511 79512 79513 79514 79515 79516 79517 79518 79519 79520 79521 79522 79523 79524 79525 79526 79527 79528 79529 79530 79531 79532 79533 79534 79535 79536 79537 79538 79539 79540 79541 79542 79543 79544 79545 79546 79547 79548 79549 79550 79551 79552 79553 79554 79555 79556 79557 79558 79559 79560 79561 79562 79563 79564 79565 79566 79567 79568 79569 79570 79571 79572 79573 79574 79575 79576 79577 79578 79579 79580 79581 79582 79583 79584 79585 79586 79587 79588 79589 79590 79591 79592 79593 79594 79595 79596 79597 79598 79599 79600 79601 79602 79603 79604 79605 79606 79607 79608 79609 79610 79611 79612 79613 79614 79615 79616 79617 79618 79619 79620 79621 79622 79623 79624 79625 79626 79627 79628 79629 79630 79631 79632 79633 79634 79635 79636 79637 79638 79639 79640 79641 79642 79643 79644 79645 79646 79647 79648 79649 79650 79651 79652 79653 79654 79655 79656 79657 79658 79659 79660 79661 79662 79663 79664 79665 79666 79667 79668 79669 79670 79671 79672 79673 79674 79675 79676 79677 79678 79679 79680 79681 79682 79683 79684 79685 79686 79687 79688 79689 79690 79691 79692 79693 79694 79695 79696 79697 79698 79699 79700 79701 79702 79703 79704 79705 79706 79707 79708 79709 79710 79711 79712 79713 79714 79715 79716 79717 79718 79719 79720 79721 79722 79723 79724 79725 79726 79727 79728 79729 79730 79731 79732 79733 79734 79735 79736 79737 79738 79739 79740 79741 79742 79743 79744 79745 79746 79747 79748 79749 79750 79751 79752 79753 79754 79755 79756 79757 79758 79759 79760 79761 79762 79763 79764 79765 79766 79767 79768 79769 79770 79771 79772 79773 79774 79775 79776 79777 79778 79779 79780 79781 79782 79783 79784 79785 79786 79787 79788 79789 79790 79791 79792 79793 79794 79795 79796 79797 79798 79799 79800 79801 79802 79803 79804 79805 79806 79807 79808 79809 79810 79811 79812 79813 79814 79815 79816 79817 79818 79819 79820 79821 79822 79823 79824 79825 79826 79827 79828 79829 79830 79831 79832 79833 79834 79835 79836 79837 79838 79839 79840 79841 79842 79843 79844 79845 79846 79847 79848 79849 79850 79851 79852 79853 79854 79855 79856 79857 79858 79859 79860 79861 79862 79863 79864 79865 79866 79867 79868 79869 79870 79871 79872 79873 79874 79875 79876 79877 79878 79879 79880 79881 79882 79883 79884 79885 79886 79887 79888 79889 79890 79891 79892 79893 79894 79895 79896 79897 79898 79899 79900 79901 79902 79903 79904 79905 79906 79907 79908 79909 79910 79911 79912 79913 79914 79915 79916 79917 79918 79919 79920 79921 79922 79923 79924 79925 79926 79927 79928 79929 79930 79931 79932 79933 79934 79935 79936 79937 79938 79939 79940 79941 79942 79943 79944 79945 79946 79947 79948 79949 79950 79951 79952 79953 79954 79955 79956 79957 79958 79959 79960 79961 79962 79963 79964 79965 79966 79967 79968 79969 79970 79971 79972 79973 79974 79975 79976 79977 79978 79979 79980 79981 79982 79983 79984 79985 79986 79987 79988 79989 79990 79991 79992 79993 79994 79995 79996 79997 79998 79999 80000 80001 80002 80003 80004 80005 80006 80007 80008 80009 80010 80011 80012 80013 80014 80015 80016 80017 80018 80019 80020 80021 80022 80023 80024 80025 80026 80027 80028 80029 80030 80031 80032 80033 80034 80035 80036 80037 80038 80039 80040 80041 80042 80043 80044 80045 80046 80047 80048 80049 80050 80051 80052 80053 80054 80055 80056 80057 80058 80059 80060 80061 80062 80063 80064 80065 80066 80067 80068 80069 80070 80071 80072 80073 80074 80075 80076 80077 80078 80079 80080 80081 80082 80083 80084 80085 80086 80087 80088 80089 80090 80091 80092 80093 80094 80095 80096 80097 80098 80099 80100 80101 80102 80103 80104 80105 80106 80107 80108 80109 80110 80111 80112 80113 80114 80115 80116 80117 80118 80119 80120 80121 80122 80123 80124 80125 80126 80127 80128 80129 80130 80131 80132 80133 80134 80135 80136 80137 80138 80139 80140 80141 80142 80143 80144 80145 80146 80147 80148 80149 80150 80151 80152 80153 80154 80155 80156 80157 80158 80159 80160 80161 80162 80163 80164 80165 80166 80167 80168 80169 80170 80171 80172 80173 80174 80175 80176 80177 80178 80179 80180 80181 80182 80183 80184 80185 80186 80187 80188 80189 80190 80191 80192 80193 80194 80195 80196 80197 80198 80199 80200 80201 80202 80203 80204 80205 80206 80207 80208 80209 80210 80211 80212 80213 80214 80215 80216 80217 80218 80219 80220 80221 80222 80223 80224 80225 80226 80227 80228 80229 80230 80231 80232 80233 80234 80235 80236 80237 80238 80239 80240 80241 80242 80243 80244 80245 80246 80247 80248 80249 80250 80251 80252 80253 80254 80255 80256 80257 80258 80259 80260 80261 80262 80263 80264 80265 80266 80267 80268 80269 80270 80271 80272 80273 80274 80275 80276 80277 80278 80279 80280 80281 80282 80283 80284 80285 80286 80287 80288 80289 80290 80291 80292 80293 80294 80295 80296 80297 80298 80299 80300 80301 80302 80303 80304 80305 80306 80307 80308 80309 80310 80311 80312 80313 80314 80315 80316 80317 80318 80319 80320 80321 80322 80323 80324 80325 80326 80327 80328 80329 80330 80331 80332 80333 80334 80335 80336 80337 80338 80339 80340 80341 80342 80343 80344 80345 80346 80347 80348 80349 80350 80351 80352 80353 80354 80355 80356 80357 80358 80359 80360 80361 80362 80363 80364 80365 80366 80367 80368 80369 80370 80371 80372 80373 80374 80375 80376 80377 80378 80379 80380 80381 80382 80383 80384 80385 80386 80387 80388 80389 80390 80391 80392 80393 80394 80395 80396 80397 80398 80399 80400 80401 80402 80403 80404 80405 80406 80407 80408 80409 80410 80411 80412 80413 80414 80415 80416 80417 80418 80419 80420 80421 80422 80423 80424 80425 80426 80427 80428 80429 80430 80431 80432 80433 80434 80435 80436 80437 80438 80439 80440 80441 80442 80443 80444 80445 80446 80447 80448 80449 80450 80451 80452 80453 80454 80455 80456 80457 80458 80459 80460 80461 80462 80463 80464 80465 80466 80467 80468 80469 80470 80471 80472 80473 80474 80475 80476 80477 80478 80479 80480 80481 80482 80483 80484 80485 80486 80487 80488 80489 80490 80491 80492 80493 80494 80495 80496 80497 80498 80499 80500 80501 80502 80503 80504 80505 80506 80507 80508 80509 80510 80511 80512 80513 80514 80515 80516 80517 80518 80519 80520 80521 80522 80523 80524 80525 80526 80527 80528 80529 80530 80531 80532 80533 80534 80535 80536 80537 80538 80539 80540 80541 80542 80543 80544 80545 80546 80547 80548 80549 80550 80551 80552 80553 80554 80555 80556 80557 80558 80559 80560 80561 80562 80563 80564 80565 80566 80567 80568 80569 80570 80571 80572 80573 80574 80575 80576 80577 80578 80579 80580 80581 80582 80583 80584 80585 80586 80587 80588 80589 80590 80591 80592 80593 80594 80595 80596 80597 80598 80599 80600 80601 80602 80603 80604 80605 80606 80607 80608 80609 80610 80611 80612 80613 80614 80615 80616 80617 80618 80619 80620 80621 80622 80623 80624 80625 80626 80627 80628 80629 80630 80631 80632 80633 80634 80635 80636 80637 80638 80639 80640 80641 80642 80643 80644 80645 80646 80647 80648 80649 80650 80651 80652 80653 80654 80655 80656 80657 80658 80659 80660 80661 80662 80663 80664 80665 80666 80667 80668 80669 80670 80671 80672 80673 80674 80675 80676 80677 80678 80679 80680 80681 80682 80683 80684 80685 80686 80687 80688 80689 80690 80691 80692 80693 80694 80695 80696 80697 80698 80699 80700 80701 80702 80703 80704 80705 80706 80707 80708 80709 80710 80711 80712 80713 80714 80715 80716 80717 80718 80719 80720 80721 80722 80723 80724 80725 80726 80727 80728 80729 80730 80731 80732 80733 80734 80735 80736 80737 80738 80739 80740 80741 80742 80743 80744 80745 80746 80747 80748 80749 80750 80751 80752 80753 80754 80755 80756 80757 80758 80759 80760 80761 80762 80763 80764 80765 80766 80767 80768 80769 80770 80771 80772 80773 80774 80775 80776 80777 80778 80779 80780 80781 80782 80783 80784 80785 80786 80787 80788 80789 80790 80791 80792 80793 80794 80795 80796 80797 80798 80799 80800 80801 80802 80803 80804 80805 80806 80807 80808 80809 80810 80811 80812 80813 80814 80815 80816 80817 80818 80819 80820 80821 80822 80823 80824 80825 80826 80827 80828 80829 80830 80831 80832 80833 80834 80835 80836 80837 80838 80839 80840 80841 80842 80843 80844 80845 80846 80847 80848 80849 80850 80851 80852 80853 80854 80855 80856 80857 80858 80859 80860 80861 80862 80863 80864 80865 80866 80867 80868 80869 80870 80871 80872 80873 80874 80875 80876 80877 80878 80879 80880 80881 80882 80883 80884 80885 80886 80887 80888 80889 80890 80891 80892 80893 80894 80895 80896 80897 80898 80899 80900 80901 80902 80903 80904 80905 80906 80907 80908 80909 80910 80911 80912 80913 80914 80915 80916 80917 80918 80919 80920 80921 80922 80923 80924 80925 80926 80927 80928 80929 80930 80931 80932 80933 80934 80935 80936 80937 80938 80939 80940 80941 80942 80943 80944 80945 80946 80947 80948 80949 80950 80951 80952 80953 80954 80955 80956 80957 80958 80959 80960 80961 80962 80963 80964 80965 80966 80967 80968 80969 80970 80971 80972 80973 80974 80975 80976 80977 80978 80979 80980 80981 80982 80983 80984 80985 80986 80987 80988 80989 80990 80991 80992 80993 80994 80995 80996 80997 80998 80999 81000 81001 81002 81003 81004 81005 81006 81007 81008 81009 81010 81011 81012 81013 81014 81015 81016 81017 81018 81019 81020 81021 81022 81023 81024 81025 81026 81027 81028 81029 81030 81031 81032 81033 81034 81035 81036 81037 81038 81039 81040 81041 81042 81043 81044 81045 81046 81047 81048 81049 81050 81051 81052 81053 81054 81055 81056 81057 81058 81059 81060 81061 81062 81063 81064 81065 81066 81067 81068 81069 81070 81071 81072 81073 81074 81075 81076 81077 81078 81079 81080 81081 81082 81083 81084 81085 81086 81087 81088 81089 81090 81091 81092 81093 81094 81095 81096 81097 81098 81099 81100 81101 81102 81103 81104 81105 81106 81107 81108 81109 81110 81111 81112 81113 81114 81115 81116 81117 81118 81119 81120 81121 81122 81123 81124 81125 81126 81127 81128 81129 81130 81131 81132 81133 81134 81135 81136 81137 81138 81139 81140 81141 81142 81143 81144 81145 81146 81147 81148 81149 81150 81151 81152 81153 81154 81155 81156 81157 81158 81159 81160 81161 81162 81163 81164 81165 81166 81167 81168 81169 81170 81171 81172 81173 81174 81175 81176 81177 81178 81179 81180 81181 81182 81183 81184 81185 81186 81187 81188 81189 81190 81191 81192 81193 81194 81195 81196 81197 81198 81199 81200 81201 81202 81203 81204 81205 81206 81207 81208 81209 81210 81211 81212 81213 81214 81215 81216 81217 81218 81219 81220 81221 81222 81223 81224 81225 81226 81227 81228 81229 81230 81231 81232 81233 81234 81235 81236 81237 81238 81239 81240 81241 81242 81243 81244 81245 81246 81247 81248 81249 81250 81251 81252 81253 81254 81255 81256 81257 81258 81259 81260 81261 81262 81263 81264 81265 81266 81267 81268 81269 81270 81271 81272 81273 81274 81275 81276 81277 81278 81279 81280 81281 81282 81283 81284 81285 81286 81287 81288 81289 81290 81291 81292 81293 81294 81295 81296 81297 81298 81299 81300 81301 81302 81303 81304 81305 81306 81307 81308 81309 81310 81311 81312 81313 81314 81315 81316 81317 81318 81319 81320 81321 81322 81323 81324 81325 81326 81327 81328 81329 81330 81331 81332 81333 81334 81335 81336 81337 81338 81339 81340 81341 81342 81343 81344 81345 81346 81347 81348 81349 81350 81351 81352 81353 81354 81355 81356 81357 81358 81359 81360 81361 81362 81363 81364 81365 81366 81367 81368 81369 81370 81371 81372 81373 81374 81375 81376 81377 81378 81379 81380 81381 81382 81383 81384 81385 81386 81387 81388 81389 81390 81391 81392 81393 81394 81395 81396 81397 81398 81399 81400 81401 81402 81403 81404 81405 81406 81407 81408 81409 81410 81411 81412 81413 81414 81415 81416 81417 81418 81419 81420 81421 81422 81423 81424 81425 81426 81427 81428 81429 81430 81431 81432 81433 81434 81435 81436 81437 81438 81439 81440 81441 81442 81443 81444 81445 81446 81447 81448 81449 81450 81451 81452 81453 81454 81455 81456 81457 81458 81459 81460 81461 81462 81463 81464 81465 81466 81467 81468 81469 81470 81471 81472 81473 81474 81475 81476 81477 81478 81479 81480 81481 81482 81483 81484 81485 81486 81487 81488 81489 81490 81491 81492 81493 81494 81495 81496 81497 81498 81499 81500 81501 81502 81503 81504 81505 81506 81507 81508 81509 81510 81511 81512 81513 81514 81515 81516 81517 81518 81519 81520 81521 81522 81523 81524 81525 81526 81527 81528 81529 81530 81531 81532 81533 81534 81535 81536 81537 81538 81539 81540 81541 81542 81543 81544 81545 81546 81547 81548 81549 81550 81551 81552 81553 81554 81555 81556 81557 81558 81559 81560 81561 81562 81563 81564 81565 81566 81567 81568 81569 81570 81571 81572 81573 81574 81575 81576 81577 81578 81579 81580 81581 81582 81583 81584 81585 81586 81587 81588 81589 81590 81591 81592 81593 81594 81595 81596 81597 81598 81599 81600 81601 81602 81603 81604 81605 81606 81607 81608 81609 81610 81611 81612 81613 81614 81615 81616 81617 81618 81619 81620 81621 81622 81623 81624 81625 81626 81627 81628 81629 81630 81631 81632 81633 81634 81635 81636 81637 81638 81639 81640 81641 81642 81643 81644 81645 81646 81647 81648 81649 81650 81651 81652 81653 81654 81655 81656 81657 81658 81659 81660 81661 81662 81663 81664 81665 81666 81667 81668 81669 81670 81671 81672 81673 81674 81675 81676 81677 81678 81679 81680 81681 81682 81683 81684 81685 81686 81687 81688 81689 81690 81691 81692 81693 81694 81695 81696 81697 81698 81699 81700 81701 81702 81703 81704 81705 81706 81707 81708 81709 81710 81711 81712 81713 81714 81715 81716 81717 81718 81719 81720 81721 81722 81723 81724 81725 81726 81727 81728 81729 81730 81731 81732 81733 81734 81735 81736 81737 81738 81739 81740 81741 81742 81743 81744 81745 81746 81747 81748 81749 81750 81751 81752 81753 81754 81755 81756 81757 81758 81759 81760 81761 81762 81763 81764 81765 81766 81767 81768 81769 81770 81771 81772 81773 81774 81775 81776 81777 81778 81779 81780 81781 81782 81783 81784 81785 81786 81787 81788 81789 81790 81791 81792 81793 81794 81795 81796 81797 81798 81799 81800 81801 81802 81803 81804 81805 81806 81807 81808 81809 81810 81811 81812 81813 81814 81815 81816 81817 81818 81819 81820 81821 81822 81823 81824 81825 81826 81827 81828 81829 81830 81831 81832 81833 81834 81835 81836 81837 81838 81839 81840 81841 81842 81843 81844 81845 81846 81847 81848 81849 81850 81851 81852 81853 81854 81855 81856 81857 81858 81859 81860 81861 81862 81863 81864 81865 81866 81867 81868 81869 81870 81871 81872 81873 81874 81875 81876 81877 81878 81879 81880 81881 81882 81883 81884 81885 81886 81887 81888 81889 81890 81891 81892 81893 81894 81895 81896 81897 81898 81899 81900 81901 81902 81903 81904 81905 81906 81907 81908 81909 81910 81911 81912 81913 81914 81915 81916 81917 81918 81919 81920 81921 81922 81923 81924 81925 81926 81927 81928 81929 81930 81931 81932 81933 81934 81935 81936 81937 81938 81939 81940 81941 81942 81943 81944 81945 81946 81947 81948 81949 81950 81951 81952 81953 81954 81955 81956 81957 81958 81959 81960 81961 81962 81963 81964 81965 81966 81967 81968 81969 81970 81971 81972 81973 81974 81975 81976 81977 81978 81979 81980 81981 81982 81983 81984 81985 81986 81987 81988 81989 81990 81991 81992 81993 81994 81995 81996 81997 81998 81999 82000 82001 82002 82003 82004 82005 82006 82007 82008 82009 82010 82011 82012 82013 82014 82015 82016 82017 82018 82019 82020 82021 82022 82023 82024 82025 82026 82027 82028 82029 82030 82031 82032 82033 82034 82035 82036 82037 82038 82039 82040 82041 82042 82043 82044 82045 82046 82047 82048 82049 82050 82051 82052 82053 82054 82055 82056 82057 82058 82059 82060 82061 82062 82063 82064 82065 82066 82067 82068 82069 82070 82071 82072 82073 82074 82075 82076 82077 82078 82079 82080 82081 82082 82083 82084 82085 82086 82087 82088 82089 82090 82091 82092 82093 82094 82095 82096 82097 82098 82099 82100 82101 82102 82103 82104 82105 82106 82107 82108 82109 82110 82111 82112 82113 82114 82115 82116 82117 82118 82119 82120 82121 82122 82123 82124 82125 82126 82127 82128 82129 82130 82131 82132 82133 82134 82135 82136 82137 82138 82139 82140 82141 82142 82143 82144 82145 82146 82147 82148 82149 82150 82151 82152 82153 82154 82155 82156 82157 82158 82159 82160 82161 82162 82163 82164 82165 82166 82167 82168 82169 82170 82171 82172 82173 82174 82175 82176 82177 82178 82179 82180 82181 82182 82183 82184 82185 82186 82187 82188 82189 82190 82191 82192 82193 82194 82195 82196 82197 82198 82199 82200 82201 82202 82203 82204 82205 82206 82207 82208 82209 82210 82211 82212 82213 82214 82215 82216 82217 82218 82219 82220 82221 82222 82223 82224 82225 82226 82227 82228 82229 82230 82231 82232 82233 82234 82235 82236 82237 82238 82239 82240 82241 82242 82243 82244 82245 82246 82247 82248 82249 82250 82251 82252 82253 82254 82255 82256 82257 82258 82259 82260 82261 82262 82263 82264 82265 82266 82267 82268 82269 82270 82271 82272 82273 82274 82275 82276 82277 82278 82279 82280 82281 82282 82283 82284 82285 82286 82287 82288 82289 82290 82291 82292 82293 82294 82295 82296 82297 82298 82299 82300 82301 82302 82303 82304 82305 82306 82307 82308 82309 82310 82311 82312 82313 82314 82315 82316 82317 82318 82319 82320 82321 82322 82323 82324 82325 82326 82327 82328 82329 82330 82331 82332 82333 82334 82335 82336 82337 82338 82339 82340 82341 82342 82343 82344 82345 82346 82347 82348 82349 82350 82351 82352 82353 82354 82355 82356 82357 82358 82359 82360 82361 82362 82363 82364 82365 82366 82367 82368 82369 82370 82371 82372 82373 82374 82375 82376 82377 82378 82379 82380 82381 82382 82383 82384 82385 82386 82387 82388 82389 82390 82391 82392 82393 82394 82395 82396 82397 82398 82399 82400 82401 82402 82403 82404 82405 82406 82407 82408 82409 82410 82411 82412 82413 82414 82415 82416 82417 82418 82419 82420 82421 82422 82423 82424 82425 82426 82427 82428 82429 82430 82431 82432 82433 82434 82435 82436 82437 82438 82439 82440 82441 82442 82443 82444 82445 82446 82447 82448 82449 82450 82451 82452 82453 82454 82455 82456 82457 82458 82459 82460 82461 82462 82463 82464 82465 82466 82467 82468 82469 82470 82471 82472 82473 82474 82475 82476 82477 82478 82479 82480 82481 82482 82483 82484 82485 82486 82487 82488 82489 82490 82491 82492 82493 82494 82495 82496 82497 82498 82499 82500 82501 82502 82503 82504 82505 82506 82507 82508 82509 82510 82511 82512 82513 82514 82515 82516 82517 82518 82519 82520 82521 82522 82523 82524 82525 82526 82527 82528 82529 82530 82531 82532 82533 82534 82535 82536 82537 82538 82539 82540 82541 82542 82543 82544 82545 82546 82547 82548 82549 82550 82551 82552 82553 82554 82555 82556 82557 82558 82559 82560 82561 82562 82563 82564 82565 82566 82567 82568 82569 82570 82571 82572 82573 82574 82575 82576 82577 82578 82579 82580 82581 82582 82583 82584 82585 82586 82587 82588 82589 82590 82591 82592 82593 82594 82595 82596 82597 82598 82599 82600 82601 82602 82603 82604 82605 82606 82607 82608 82609 82610 82611 82612 82613 82614 82615 82616 82617 82618 82619 82620 82621 82622 82623 82624 82625 82626 82627 82628 82629 82630 82631 82632 82633 82634 82635 82636 82637 82638 82639 82640 82641 82642 82643 82644 82645 82646 82647 82648 82649 82650 82651 82652 82653 82654 82655 82656 82657 82658 82659 82660 82661 82662 82663 82664 82665 82666 82667 82668 82669 82670 82671 82672 82673 82674 82675 82676 82677 82678 82679 82680 82681 82682 82683 82684 82685 82686 82687 82688 82689 82690 82691 82692 82693 82694 82695 82696 82697 82698 82699 82700 82701 82702 82703 82704 82705 82706 82707 82708 82709 82710 82711 82712 82713 82714 82715 82716 82717 82718 82719 82720 82721 82722 82723 82724 82725 82726 82727 82728 82729 82730 82731 82732 82733 82734 82735 82736 82737 82738 82739 82740 82741 82742 82743 82744 82745 82746 82747 82748 82749 82750 82751 82752 82753 82754 82755 82756 82757 82758 82759 82760 82761 82762 82763 82764 82765 82766 82767 82768 82769 82770 82771 82772 82773 82774 82775 82776 82777 82778 82779 82780 82781 82782 82783 82784 82785 82786 82787 82788 82789 82790 82791 82792 82793 82794 82795 82796 82797 82798 82799 82800 82801 82802 82803 82804 82805 82806 82807 82808 82809 82810 82811 82812 82813 82814 82815 82816 82817 82818 82819 82820 82821 82822 82823 82824 82825 82826 82827 82828 82829 82830 82831 82832 82833 82834 82835 82836 82837 82838 82839 82840 82841 82842 82843 82844 82845 82846 82847 82848 82849 82850 82851 82852 82853 82854 82855 82856 82857 82858 82859 82860 82861 82862 82863 82864 82865 82866 82867 82868 82869 82870 82871 82872 82873 82874 82875 82876 82877 82878 82879 82880 82881 82882 82883 82884 82885 82886 82887 82888 82889 82890 82891 82892 82893 82894 82895 82896 82897 82898 82899 82900 82901 82902 82903 82904 82905 82906 82907 82908 82909 82910 82911 82912 82913 82914 82915 82916 82917 82918 82919 82920 82921 82922 82923 82924 82925 82926 82927 82928 82929 82930 82931 82932 82933 82934 82935 82936 82937 82938 82939 82940 82941 82942 82943 82944 82945 82946 82947 82948 82949 82950 82951 82952 82953 82954 82955 82956 82957 82958 82959 82960 82961 82962 82963 82964 82965 82966 82967 82968 82969 82970 82971 82972 82973 82974 82975 82976 82977 82978 82979 82980 82981 82982 82983 82984 82985 82986 82987 82988 82989 82990 82991 82992 82993 82994 82995 82996 82997 82998 82999 83000 83001 83002 83003 83004 83005 83006 83007 83008 83009 83010 83011 83012 83013 83014 83015 83016 83017 83018 83019 83020 83021 83022 83023 83024 83025 83026 83027 83028 83029 83030 83031 83032 83033 83034 83035 83036 83037 83038 83039 83040 83041 83042 83043 83044 83045 83046 83047 83048 83049 83050 83051 83052 83053 83054 83055 83056 83057 83058 83059 83060 83061 83062 83063 83064 83065 83066 83067 83068 83069 83070 83071 83072 83073 83074 83075 83076 83077 83078 83079 83080 83081 83082 83083 83084 83085 83086 83087 83088 83089 83090 83091 83092 83093 83094 83095 83096 83097 83098 83099 83100 83101 83102 83103 83104 83105 83106 83107 83108 83109 83110 83111 83112 83113 83114 83115 83116 83117 83118 83119 83120 83121 83122 83123 83124 83125 83126 83127 83128 83129 83130 83131 83132 83133 83134 83135 83136 83137 83138 83139 83140 83141 83142 83143 83144 83145 83146 83147 83148 83149 83150 83151 83152 83153 83154 83155 83156 83157 83158 83159 83160 83161 83162 83163 83164 83165 83166 83167 83168 83169 83170 83171 83172 83173 83174 83175 83176 83177 83178 83179 83180 83181 83182 83183 83184 83185 83186 83187 83188 83189 83190 83191 83192 83193 83194 83195 83196 83197 83198 83199 83200 83201 83202 83203 83204 83205 83206 83207 83208 83209 83210 83211 83212 83213 83214 83215 83216 83217 83218 83219 83220 83221 83222 83223 83224 83225 83226 83227 83228 83229 83230 83231 83232 83233 83234 83235 83236 83237 83238 83239 83240 83241 83242 83243 83244 83245 83246 83247 83248 83249 83250 83251 83252 83253 83254 83255 83256 83257 83258 83259 83260 83261 83262 83263 83264 83265 83266 83267 83268 83269 83270 83271 83272 83273 83274 83275 83276 83277 83278 83279 83280 83281 83282 83283 83284 83285 83286 83287 83288 83289 83290 83291 83292 83293 83294 83295 83296 83297 83298 83299 83300 83301 83302 83303 83304 83305 83306 83307 83308 83309 83310 83311 83312 83313 83314 83315 83316 83317 83318 83319 83320 83321 83322 83323 83324 83325 83326 83327 83328 83329 83330 83331 83332 83333 83334 83335 83336 83337 83338 83339 83340 83341 83342 83343 83344 83345 83346 83347 83348 83349 83350 83351 83352 83353 83354 83355 83356 83357 83358 83359 83360 83361 83362 83363 83364 83365 83366 83367 83368 83369 83370 83371 83372 83373 83374 83375 83376 83377 83378 83379 83380 83381 83382 83383 83384 83385 83386 83387 83388 83389 83390 83391 83392 83393 83394 83395 83396 83397 83398 83399 83400 83401 83402 83403 83404 83405 83406 83407 83408 83409 83410 83411 83412 83413 83414 83415 83416 83417 83418 83419 83420 83421 83422 83423 83424 83425 83426 83427 83428 83429 83430 83431 83432 83433 83434 83435 83436 83437 83438 83439 83440 83441 83442 83443 83444 83445 83446 83447 83448 83449 83450 83451 83452 83453 83454 83455 83456 83457 83458 83459 83460 83461 83462 83463 83464 83465 83466 83467 83468 83469 83470 83471 83472 83473 83474 83475 83476 83477 83478 83479 83480 83481 83482 83483 83484 83485 83486 83487 83488 83489 83490 83491 83492 83493 83494 83495 83496 83497 83498 83499 83500 83501 83502 83503 83504 83505 83506 83507 83508 83509 83510 83511 83512 83513 83514 83515 83516 83517 83518 83519 83520 83521 83522 83523 83524 83525 83526 83527 83528 83529 83530 83531 83532 83533 83534 83535 83536 83537 83538 83539 83540 83541 83542 83543 83544 83545 83546 83547 83548 83549 83550 83551 83552 83553 83554 83555 83556 83557 83558 83559 83560 83561 83562 83563 83564 83565 83566 83567 83568 83569 83570 83571 83572 83573 83574 83575 83576 83577 83578 83579 83580 83581 83582 83583 83584 83585 83586 83587 83588 83589 83590 83591 83592 83593 83594 83595 83596 83597 83598 83599 83600 83601 83602 83603 83604 83605 83606 83607 83608 83609 83610 83611 83612 83613 83614 83615 83616 83617 83618 83619 83620 83621 83622 83623 83624 83625 83626 83627 83628 83629 83630 83631 83632 83633 83634 83635 83636 83637 83638 83639 83640 83641 83642 83643 83644 83645 83646 83647 83648 83649 83650 83651 83652 83653 83654 83655 83656 83657 83658 83659 83660 83661 83662 83663 83664 83665 83666 83667 83668 83669 83670 83671 83672 83673 83674 83675 83676 83677 83678 83679 83680 83681 83682 83683 83684 83685 83686 83687 83688 83689 83690 83691 83692 83693 83694 83695 83696 83697 83698 83699 83700 83701 83702 83703 83704 83705 83706 83707 83708 83709 83710 83711 83712 83713 83714 83715 83716 83717 83718 83719 83720 83721 83722 83723 83724 83725 83726 83727 83728 83729 83730 83731 83732 83733 83734 83735 83736 83737 83738 83739 83740 83741 83742 83743 83744 83745 83746 83747 83748 83749 83750 83751 83752 83753 83754 83755 83756 83757 83758 83759 83760 83761 83762 83763 83764 83765 83766 83767 83768 83769 83770 83771 83772 83773 83774 83775 83776 83777 83778 83779 83780 83781 83782 83783 83784 83785 83786 83787 83788 83789 83790 83791 83792 83793 83794 83795 83796 83797 83798 83799 83800 83801 83802 83803 83804 83805 83806 83807 83808 83809 83810 83811 83812 83813 83814 83815 83816 83817 83818 83819 83820 83821 83822 83823 83824 83825 83826 83827 83828 83829 83830 83831 83832 83833 83834 83835 83836 83837 83838 83839 83840 83841 83842 83843 83844 83845 83846 83847 83848 83849 83850 83851 83852 83853 83854 83855 83856 83857 83858 83859 83860 83861 83862 83863 83864 83865 83866 83867 83868 83869 83870 83871 83872 83873 83874 83875 83876 83877 83878 83879 83880 83881 83882 83883 83884 83885 83886 83887 83888 83889 83890 83891 83892 83893 83894 83895 83896 83897 83898 83899 83900 83901 83902 83903 83904 83905 83906 83907 83908 83909 83910 83911 83912 83913 83914 83915 83916 83917 83918 83919 83920 83921 83922 83923 83924 83925 83926 83927 83928 83929 83930 83931 83932 83933 83934 83935 83936 83937 83938 83939 83940 83941 83942 83943 83944 83945 83946 83947 83948 83949 83950 83951 83952 83953 83954 83955 83956 83957 83958 83959 83960 83961 83962 83963 83964 83965 83966 83967 83968 83969 83970 83971 83972 83973 83974 83975 83976 83977 83978 83979 83980 83981 83982 83983 83984 83985 83986 83987 83988 83989 83990 83991 83992 83993 83994 83995 83996 83997 83998 83999 84000 84001 84002 84003 84004 84005 84006 84007 84008 84009 84010 84011 84012 84013 84014 84015 84016 84017 84018 84019 84020 84021 84022 84023 84024 84025 84026 84027 84028 84029 84030 84031 84032 84033 84034 84035 84036 84037 84038 84039 84040 84041 84042 84043 84044 84045 84046 84047 84048 84049 84050 84051 84052 84053 84054 84055 84056 84057 84058 84059 84060 84061 84062 84063 84064 84065 84066 84067 84068 84069 84070 84071 84072 84073 84074 84075 84076 84077 84078 84079 84080 84081 84082 84083 84084 84085 84086 84087 84088 84089 84090 84091 84092 84093 84094 84095 84096 84097 84098 84099 84100 84101 84102 84103 84104 84105 84106 84107 84108 84109 84110 84111 84112 84113 84114 84115 84116 84117 84118 84119 84120 84121 84122 84123 84124 84125 84126 84127 84128 84129 84130 84131 84132 84133 84134 84135 84136 84137 84138 84139 84140 84141 84142 84143 84144 84145 84146 84147 84148 84149 84150 84151 84152 84153 84154 84155 84156 84157 84158 84159 84160 84161 84162 84163 84164 84165 84166 84167 84168 84169 84170 84171 84172 84173 84174 84175 84176 84177 84178 84179 84180 84181 84182 84183 84184 84185 84186 84187 84188 84189 84190 84191 84192 84193 84194 84195 84196 84197 84198 84199 84200 84201 84202 84203 84204 84205 84206 84207 84208 84209 84210 84211 84212 84213 84214 84215 84216 84217 84218 84219 84220 84221 84222 84223 84224 84225 84226 84227 84228 84229 84230 84231 84232 84233 84234 84235 84236 84237 84238 84239 84240 84241 84242 84243 84244 84245 84246 84247 84248 84249 84250 84251 84252 84253 84254 84255 84256 84257 84258 84259 84260 84261 84262 84263 84264 84265 84266 84267 84268 84269 84270 84271 84272 84273 84274 84275 84276 84277 84278 84279 84280 84281 84282 84283 84284 84285 84286 84287 84288 84289 84290 84291 84292 84293 84294 84295 84296 84297 84298 84299 84300 84301 84302 84303 84304 84305 84306 84307 84308 84309 84310 84311 84312 84313 84314 84315 84316 84317 84318 84319 84320 84321 84322 84323 84324 84325 84326 84327 84328 84329 84330 84331 84332 84333 84334 84335 84336 84337 84338 84339 84340 84341 84342 84343 84344 84345 84346 84347 84348 84349 84350 84351 84352 84353 84354 84355 84356 84357 84358 84359 84360 84361 84362 84363 84364 84365 84366 84367 84368 84369 84370 84371 84372 84373 84374 84375 84376 84377 84378 84379 84380 84381 84382 84383 84384 84385 84386 84387 84388 84389 84390 84391 84392 84393 84394 84395 84396 84397 84398 84399 84400 84401 84402 84403 84404 84405 84406 84407 84408 84409 84410 84411 84412 84413 84414 84415 84416 84417 84418 84419 84420 84421 84422 84423 84424 84425 84426 84427 84428 84429 84430 84431 84432 84433 84434 84435 84436 84437 84438 84439 84440 84441 84442 84443 84444 84445 84446 84447 84448 84449 84450 84451 84452 84453 84454 84455 84456 84457 84458 84459 84460 84461 84462 84463 84464 84465 84466 84467 84468 84469 84470 84471 84472 84473 84474 84475 84476 84477 84478 84479 84480 84481 84482 84483 84484 84485 84486 84487 84488 84489 84490 84491 84492 84493 84494 84495 84496 84497 84498 84499 84500 84501 84502 84503 84504 84505 84506 84507 84508 84509 84510 84511 84512 84513 84514 84515 84516 84517 84518 84519 84520 84521 84522 84523 84524 84525 84526 84527 84528 84529 84530 84531 84532 84533 84534 84535 84536 84537 84538 84539 84540 84541 84542 84543 84544 84545 84546 84547 84548 84549 84550 84551 84552 84553 84554 84555 84556 84557 84558 84559 84560 84561 84562 84563 84564 84565 84566 84567 84568 84569 84570 84571 84572 84573 84574 84575 84576 84577 84578 84579 84580 84581 84582 84583 84584 84585 84586 84587 84588 84589 84590 84591 84592 84593 84594 84595 84596 84597 84598 84599 84600 84601 84602 84603 84604 84605 84606 84607 84608 84609 84610 84611 84612 84613 84614 84615 84616 84617 84618 84619 84620 84621 84622 84623 84624 84625 84626 84627 84628 84629 84630 84631 84632 84633 84634 84635 84636 84637 84638 84639 84640 84641 84642 84643 84644 84645 84646 84647 84648 84649 84650 84651 84652 84653 84654 84655 84656 84657 84658 84659 84660 84661 84662 84663 84664 84665 84666 84667 84668 84669 84670 84671 84672 84673 84674 84675 84676 84677 84678 84679 84680 84681 84682 84683 84684 84685 84686 84687 84688 84689 84690 84691 84692 84693 84694 84695 84696 84697 84698 84699 84700 84701 84702 84703 84704 84705 84706 84707 84708 84709 84710 84711 84712 84713 84714 84715 84716 84717 84718 84719 84720 84721 84722 84723 84724 84725 84726 84727 84728 84729 84730 84731 84732 84733 84734 84735 84736 84737 84738 84739 84740 84741 84742 84743 84744 84745 84746 84747 84748 84749 84750 84751 84752 84753 84754 84755 84756 84757 84758 84759 84760 84761 84762 84763 84764 84765 84766 84767 84768 84769 84770 84771 84772 84773 84774 84775 84776 84777 84778 84779 84780 84781 84782 84783 84784 84785 84786 84787 84788 84789 84790 84791 84792 84793 84794 84795 84796 84797 84798 84799 84800 84801 84802 84803 84804 84805 84806 84807 84808 84809 84810 84811 84812 84813 84814 84815 84816 84817 84818 84819 84820 84821 84822 84823 84824 84825 84826 84827 84828 84829 84830 84831 84832 84833 84834 84835 84836 84837 84838 84839 84840 84841 84842 84843 84844 84845 84846 84847 84848 84849 84850 84851 84852 84853 84854 84855 84856 84857 84858 84859 84860 84861 84862 84863 84864 84865 84866 84867 84868 84869 84870 84871 84872 84873 84874 84875 84876 84877 84878 84879 84880 84881 84882 84883 84884 84885 84886 84887 84888 84889 84890 84891 84892 84893 84894 84895 84896 84897 84898 84899 84900 84901 84902 84903 84904 84905 84906 84907 84908 84909 84910 84911 84912 84913 84914 84915 84916 84917 84918 84919 84920 84921 84922 84923 84924 84925 84926 84927 84928 84929 84930 84931 84932 84933 84934 84935 84936 84937 84938 84939 84940 84941 84942 84943 84944 84945 84946 84947 84948 84949 84950 84951 84952 84953 84954 84955 84956 84957 84958 84959 84960 84961 84962 84963 84964 84965 84966 84967 84968 84969 84970 84971 84972 84973 84974 84975 84976 84977 84978 84979 84980 84981 84982 84983 84984 84985 84986 84987 84988 84989 84990 84991 84992 84993 84994 84995 84996 84997 84998 84999 85000 85001 85002 85003 85004 85005 85006 85007 85008 85009 85010 85011 85012 85013 85014 85015 85016 85017 85018 85019 85020 85021 85022 85023 85024 85025 85026 85027 85028 85029 85030 85031 85032 85033 85034 85035 85036 85037 85038 85039 85040 85041 85042 85043 85044 85045 85046 85047 85048 85049 85050 85051 85052 85053 85054 85055 85056 85057 85058 85059 85060 85061 85062 85063 85064 85065 85066 85067 85068 85069 85070 85071 85072 85073 85074 85075 85076 85077 85078 85079 85080 85081 85082 85083 85084 85085 85086 85087 85088 85089 85090 85091 85092 85093 85094 85095 85096 85097 85098 85099 85100 85101 85102 85103 85104 85105 85106 85107 85108 85109 85110 85111 85112 85113 85114 85115 85116 85117 85118 85119 85120 85121 85122 85123 85124 85125 85126 85127 85128 85129 85130 85131 85132 85133 85134 85135 85136 85137 85138 85139 85140 85141 85142 85143 85144 85145 85146 85147 85148 85149 85150 85151 85152 85153 85154 85155 85156 85157 85158 85159 85160 85161 85162 85163 85164 85165 85166 85167 85168 85169 85170 85171 85172 85173 85174 85175 85176 85177 85178 85179 85180 85181 85182 85183 85184 85185 85186 85187 85188 85189 85190 85191 85192 85193 85194 85195 85196 85197 85198 85199 85200 85201 85202 85203 85204 85205 85206 85207 85208 85209 85210 85211 85212 85213 85214 85215 85216 85217 85218 85219 85220 85221 85222 85223 85224 85225 85226 85227 85228 85229 85230 85231 85232 85233 85234 85235 85236 85237 85238 85239 85240 85241 85242 85243 85244 85245 85246 85247 85248 85249 85250 85251 85252 85253 85254 85255 85256 85257 85258 85259 85260 85261 85262 85263 85264 85265 85266 85267 85268 85269 85270 85271 85272 85273 85274 85275 85276 85277 85278 85279 85280 85281 85282 85283 85284 85285 85286 85287 85288 85289 85290 85291 85292 85293 85294 85295 85296 85297 85298 85299 85300 85301 85302 85303 85304 85305 85306 85307 85308 85309 85310 85311 85312 85313 85314 85315 85316 85317 85318 85319 85320 85321 85322 85323 85324 85325 85326 85327 85328 85329 85330 85331 85332 85333 85334 85335 85336 85337 85338 85339 85340 85341 85342 85343 85344 85345 85346 85347 85348 85349 85350 85351 85352 85353 85354 85355 85356 85357 85358 85359 85360 85361 85362 85363 85364 85365 85366 85367 85368 85369 85370 85371 85372 85373 85374 85375 85376 85377 85378 85379 85380 85381 85382 85383 85384 85385 85386 85387 85388 85389 85390 85391 85392 85393 85394 85395 85396 85397 85398 85399 85400 85401 85402 85403 85404 85405 85406 85407 85408 85409 85410 85411 85412 85413 85414 85415 85416 85417 85418 85419 85420 85421 85422 85423 85424 85425 85426 85427 85428 85429 85430 85431 85432 85433 85434 85435 85436 85437 85438 85439 85440 85441 85442 85443 85444 85445 85446 85447 85448 85449 85450 85451 85452 85453 85454 85455 85456 85457 85458 85459 85460 85461 85462 85463 85464 85465 85466 85467 85468 85469 85470 85471 85472 85473 85474 85475 85476 85477 85478 85479 85480 85481 85482 85483 85484 85485 85486 85487 85488 85489 85490 85491 85492 85493 85494 85495 85496 85497 85498 85499 85500 85501 85502 85503 85504 85505 85506 85507 85508 85509 85510 85511 85512 85513 85514 85515 85516 85517 85518 85519 85520 85521 85522 85523 85524 85525 85526 85527 85528 85529 85530 85531 85532 85533 85534 85535 85536 85537 85538 85539 85540 85541 85542 85543 85544 85545 85546 85547 85548 85549 85550 85551 85552 85553 85554 85555 85556 85557 85558 85559 85560 85561 85562 85563 85564 85565 85566 85567 85568 85569 85570 85571 85572 85573 85574 85575 85576 85577 85578 85579 85580 85581 85582 85583 85584 85585 85586 85587 85588 85589 85590 85591 85592 85593 85594 85595 85596 85597 85598 85599 85600 85601 85602 85603 85604 85605 85606 85607 85608 85609 85610 85611 85612 85613 85614 85615 85616 85617 85618 85619 85620 85621 85622 85623 85624 85625 85626 85627 85628 85629 85630 85631 85632 85633 85634 85635 85636 85637 85638 85639 85640 85641 85642 85643 85644 85645 85646 85647 85648 85649 85650 85651 85652 85653 85654 85655 85656 85657 85658 85659 85660 85661 85662 85663 85664 85665 85666 85667 85668 85669 85670 85671 85672 85673 85674 85675 85676 85677 85678 85679 85680 85681 85682 85683 85684 85685 85686 85687 85688 85689 85690 85691 85692 85693 85694 85695 85696 85697 85698 85699 85700 85701 85702 85703 85704 85705 85706 85707 85708 85709 85710 85711 85712 85713 85714 85715 85716 85717 85718 85719 85720 85721 85722 85723 85724 85725 85726 85727 85728 85729 85730 85731 85732 85733 85734 85735 85736 85737 85738 85739 85740 85741 85742 85743 85744 85745 85746 85747 85748 85749 85750 85751 85752 85753 85754 85755 85756 85757 85758 85759 85760 85761 85762 85763 85764 85765 85766 85767 85768 85769 85770 85771 85772 85773 85774 85775 85776 85777 85778 85779 85780 85781 85782 85783 85784 85785 85786 85787 85788 85789 85790 85791 85792 85793 85794 85795 85796 85797 85798 85799 85800 85801 85802 85803 85804 85805 85806 85807 85808 85809 85810 85811 85812 85813 85814 85815 85816 85817 85818 85819 85820 85821 85822 85823 85824 85825 85826 85827 85828 85829 85830 85831 85832 85833 85834 85835 85836 85837 85838 85839 85840 85841 85842 85843 85844 85845 85846 85847 85848 85849 85850 85851 85852 85853 85854 85855 85856 85857 85858 85859 85860 85861 85862 85863 85864 85865 85866 85867 85868 85869 85870 85871 85872 85873 85874 85875 85876 85877 85878 85879 85880 85881 85882 85883 85884 85885 85886 85887 85888 85889 85890 85891 85892 85893 85894 85895 85896 85897 85898 85899 85900 85901 85902 85903 85904 85905 85906 85907 85908 85909 85910 85911 85912 85913 85914 85915 85916 85917 85918 85919 85920 85921 85922 85923 85924 85925 85926 85927 85928 85929 85930 85931 85932 85933 85934 85935 85936 85937 85938 85939 85940 85941 85942 85943 85944 85945 85946 85947 85948 85949 85950 85951 85952 85953 85954 85955 85956 85957 85958 85959 85960 85961 85962 85963 85964 85965 85966 85967 85968 85969 85970 85971 85972 85973 85974 85975 85976 85977 85978 85979 85980 85981 85982 85983 85984 85985 85986 85987 85988 85989 85990 85991 85992 85993 85994 85995 85996 85997 85998 85999 86000 86001 86002 86003 86004 86005 86006 86007 86008 86009 86010 86011 86012 86013 86014 86015 86016 86017 86018 86019 86020 86021 86022 86023 86024 86025 86026 86027 86028 86029 86030 86031 86032 86033 86034 86035 86036 86037 86038 86039 86040 86041 86042 86043 86044 86045 86046 86047 86048 86049 86050 86051 86052 86053 86054 86055 86056 86057 86058 86059 86060 86061 86062 86063 86064 86065 86066 86067 86068 86069 86070 86071 86072 86073 86074 86075 86076 86077 86078 86079 86080 86081 86082 86083 86084 86085 86086 86087 86088 86089 86090 86091 86092 86093 86094 86095 86096 86097 86098 86099 86100 86101 86102 86103 86104 86105 86106 86107 86108 86109 86110 86111 86112 86113 86114 86115 86116 86117 86118 86119 86120 86121 86122 86123 86124 86125 86126 86127 86128 86129 86130 86131 86132 86133 86134 86135 86136 86137 86138 86139 86140 86141 86142 86143 86144 86145 86146 86147 86148 86149 86150 86151 86152 86153 86154 86155 86156 86157 86158 86159 86160 86161 86162 86163 86164 86165 86166 86167 86168 86169 86170 86171 86172 86173 86174 86175 86176 86177 86178 86179 86180 86181 86182 86183 86184 86185 86186 86187 86188 86189 86190 86191 86192 86193 86194 86195 86196 86197 86198 86199 86200 86201 86202 86203 86204 86205 86206 86207 86208 86209 86210 86211 86212 86213 86214 86215 86216 86217 86218 86219 86220 86221 86222 86223 86224 86225 86226 86227 86228 86229 86230 86231 86232 86233 86234 86235 86236 86237 86238 86239 86240 86241 86242 86243 86244 86245 86246 86247 86248 86249 86250 86251 86252 86253 86254 86255 86256 86257 86258 86259 86260 86261 86262 86263 86264 86265 86266 86267 86268 86269 86270 86271 86272 86273 86274 86275 86276 86277 86278 86279 86280 86281 86282 86283 86284 86285 86286 86287 86288 86289 86290 86291 86292 86293 86294 86295 86296 86297 86298 86299 86300 86301 86302 86303 86304 86305 86306 86307 86308 86309 86310 86311 86312 86313 86314 86315 86316 86317 86318 86319 86320 86321 86322 86323 86324 86325 86326 86327 86328 86329 86330 86331 86332 86333 86334 86335 86336 86337 86338 86339 86340 86341 86342 86343 86344 86345 86346 86347 86348 86349 86350 86351 86352 86353 86354 86355 86356 86357 86358 86359 86360 86361 86362 86363 86364 86365 86366 86367 86368 86369 86370 86371 86372 86373 86374 86375 86376 86377 86378 86379 86380 86381 86382 86383 86384 86385 86386 86387 86388 86389 86390 86391 86392 86393 86394 86395 86396 86397 86398 86399 86400 86401 86402 86403 86404 86405 86406 86407 86408 86409 86410 86411 86412 86413 86414 86415 86416 86417 86418 86419 86420 86421 86422 86423 86424 86425 86426 86427 86428 86429 86430 86431 86432 86433 86434 86435 86436 86437 86438 86439 86440 86441 86442 86443 86444 86445 86446 86447 86448 86449 86450 86451 86452 86453 86454 86455 86456 86457 86458 86459 86460 86461 86462 86463 86464 86465 86466 86467 86468 86469 86470 86471 86472 86473 86474 86475 86476 86477 86478 86479 86480 86481 86482 86483 86484 86485 86486 86487 86488 86489 86490 86491 86492 86493 86494 86495 86496 86497 86498 86499 86500 86501 86502 86503 86504 86505 86506 86507 86508 86509 86510 86511 86512 86513 86514 86515 86516 86517 86518 86519 86520 86521 86522 86523 86524 86525 86526 86527 86528 86529 86530 86531 86532 86533 86534 86535 86536 86537 86538 86539 86540 86541 86542 86543 86544 86545 86546 86547 86548 86549 86550 86551 86552 86553 86554 86555 86556 86557 86558 86559 86560 86561 86562 86563 86564 86565 86566 86567 86568 86569 86570 86571 86572 86573 86574 86575 86576 86577 86578 86579 86580 86581 86582 86583 86584 86585 86586 86587 86588 86589 86590 86591 86592 86593 86594 86595 86596 86597 86598 86599 86600 86601 86602 86603 86604 86605 86606 86607 86608 86609 86610 86611 86612 86613 86614 86615 86616 86617 86618 86619 86620 86621 86622 86623 86624 86625 86626 86627 86628 86629 86630 86631 86632 86633 86634 86635 86636 86637 86638 86639 86640 86641 86642 86643 86644 86645 86646 86647 86648 86649 86650 86651 86652 86653 86654 86655 86656 86657 86658 86659 86660 86661 86662 86663 86664 86665 86666 86667 86668 86669 86670 86671 86672 86673 86674 86675 86676 86677 86678 86679 86680 86681 86682 86683 86684 86685 86686 86687 86688 86689 86690 86691 86692 86693 86694 86695 86696 86697 86698 86699 86700 86701 86702 86703 86704 86705 86706 86707 86708 86709 86710 86711 86712 86713 86714 86715 86716 86717 86718 86719 86720 86721 86722 86723 86724 86725 86726 86727 86728 86729 86730 86731 86732 86733 86734 86735 86736 86737 86738 86739 86740 86741 86742 86743 86744 86745 86746 86747 86748 86749 86750 86751 86752 86753 86754 86755 86756 86757 86758 86759 86760 86761 86762 86763 86764 86765 86766 86767 86768 86769 86770 86771 86772 86773 86774 86775 86776 86777 86778 86779 86780 86781 86782 86783 86784 86785 86786 86787 86788 86789 86790 86791 86792 86793 86794 86795 86796 86797 86798 86799 86800 86801 86802 86803 86804 86805 86806 86807 86808 86809 86810 86811 86812 86813 86814 86815 86816 86817 86818 86819 86820 86821 86822 86823 86824 86825 86826 86827 86828 86829 86830 86831 86832 86833 86834 86835 86836 86837 86838 86839 86840 86841 86842 86843 86844 86845 86846 86847 86848 86849 86850 86851 86852 86853 86854 86855 86856 86857 86858 86859 86860 86861 86862 86863 86864 86865 86866 86867 86868 86869 86870 86871 86872 86873 86874 86875 86876 86877 86878 86879 86880 86881 86882 86883 86884 86885 86886 86887 86888 86889 86890 86891 86892 86893 86894 86895 86896 86897 86898 86899 86900 86901 86902 86903 86904 86905 86906 86907 86908 86909 86910 86911 86912 86913 86914 86915 86916 86917 86918 86919 86920 86921 86922 86923 86924 86925 86926 86927 86928 86929 86930 86931 86932 86933 86934 86935 86936 86937 86938 86939 86940 86941 86942 86943 86944 86945 86946 86947 86948 86949 86950 86951 86952 86953 86954 86955 86956 86957 86958 86959 86960 86961 86962 86963 86964 86965 86966 86967 86968 86969 86970 86971 86972 86973 86974 86975 86976 86977 86978 86979 86980 86981 86982 86983 86984 86985 86986 86987 86988 86989 86990 86991 86992 86993 86994 86995 86996 86997 86998 86999 87000 87001 87002 87003 87004 87005 87006 87007 87008 87009 87010 87011 87012 87013 87014 87015 87016 87017 87018 87019 87020 87021 87022 87023 87024 87025 87026 87027 87028 87029 87030 87031 87032 87033 87034 87035 87036 87037 87038 87039 87040 87041 87042 87043 87044 87045 87046 87047 87048 87049 87050 87051 87052 87053 87054 87055 87056 87057 87058 87059 87060 87061 87062 87063 87064 87065 87066 87067 87068 87069 87070 87071 87072 87073 87074 87075 87076 87077 87078 87079 87080 87081 87082 87083 87084 87085 87086 87087 87088 87089 87090 87091 87092 87093 87094 87095 87096 87097 87098 87099 87100 87101 87102 87103 87104 87105 87106 87107 87108 87109 87110 87111 87112 87113 87114 87115 87116 87117 87118 87119 87120 87121 87122 87123 87124 87125 87126 87127 87128 87129 87130 87131 87132 87133 87134 87135 87136 87137 87138 87139 87140 87141 87142 87143 87144 87145 87146 87147 87148 87149 87150 87151 87152 87153 87154 87155 87156 87157 87158 87159 87160 87161 87162 87163 87164 87165 87166 87167 87168 87169 87170 87171 87172 87173 87174 87175 87176 87177 87178 87179 87180 87181 87182 87183 87184 87185 87186 87187 87188 87189 87190 87191 87192 87193 87194 87195 87196 87197 87198 87199 87200 87201 87202 87203 87204 87205 87206 87207 87208 87209 87210 87211 87212 87213 87214 87215 87216 87217 87218 87219 87220 87221 87222 87223 87224 87225 87226 87227 87228 87229 87230 87231 87232 87233 87234 87235 87236 87237 87238 87239 87240 87241 87242 87243 87244 87245 87246 87247 87248 87249 87250 87251 87252 87253 87254 87255 87256 87257 87258 87259 87260 87261 87262 87263 87264 87265 87266 87267 87268 87269 87270 87271 87272 87273 87274 87275 87276 87277 87278 87279 87280 87281 87282 87283 87284 87285 87286 87287 87288 87289 87290 87291 87292 87293 87294 87295 87296 87297 87298 87299 87300 87301 87302 87303 87304 87305 87306 87307 87308 87309 87310 87311 87312 87313 87314 87315 87316 87317 87318 87319 87320 87321 87322 87323 87324 87325 87326 87327 87328 87329 87330 87331 87332 87333 87334 87335 87336 87337 87338 87339 87340 87341 87342 87343 87344 87345 87346 87347 87348 87349 87350 87351 87352 87353 87354 87355 87356 87357 87358 87359 87360 87361 87362 87363 87364 87365 87366 87367 87368 87369 87370 87371 87372 87373 87374 87375 87376 87377 87378 87379 87380 87381 87382 87383 87384 87385 87386 87387 87388 87389 87390 87391 87392 87393 87394 87395 87396 87397 87398 87399 87400 87401 87402 87403 87404 87405 87406 87407 87408 87409 87410 87411 87412 87413 87414 87415 87416 87417 87418 87419 87420 87421 87422 87423 87424 87425 87426 87427 87428 87429 87430 87431 87432 87433 87434 87435 87436 87437 87438 87439 87440 87441 87442 87443 87444 87445 87446 87447 87448 87449 87450 87451 87452 87453 87454 87455 87456 87457 87458 87459 87460 87461 87462 87463 87464 87465 87466 87467 87468 87469 87470 87471 87472 87473 87474 87475 87476 87477 87478 87479 87480 87481 87482 87483 87484 87485 87486 87487 87488 87489 87490 87491 87492 87493 87494 87495 87496 87497 87498 87499 87500 87501 87502 87503 87504 87505 87506 87507 87508 87509 87510 87511 87512 87513 87514 87515 87516 87517 87518 87519 87520 87521 87522 87523 87524 87525 87526 87527 87528 87529 87530 87531 87532 87533 87534 87535 87536 87537 87538 87539 87540 87541 87542 87543 87544 87545 87546 87547 87548 87549 87550 87551 87552 87553 87554 87555 87556 87557 87558 87559 87560 87561 87562 87563 87564 87565 87566 87567 87568 87569 87570 87571 87572 87573 87574 87575 87576 87577 87578 87579 87580 87581 87582 87583 87584 87585 87586 87587 87588 87589 87590 87591 87592 87593 87594 87595 87596 87597 87598 87599 87600 87601 87602 87603 87604 87605 87606 87607 87608 87609 87610 87611 87612 87613 87614 87615 87616 87617 87618 87619 87620 87621 87622 87623 87624 87625 87626 87627 87628 87629 87630 87631 87632 87633 87634 87635 87636 87637 87638 87639 87640 87641 87642 87643 87644 87645 87646 87647 87648 87649 87650 87651 87652 87653 87654 87655 87656 87657 87658 87659 87660 87661 87662 87663 87664 87665 87666 87667 87668 87669 87670 87671 87672 87673 87674 87675 87676 87677 87678 87679 87680 87681 87682 87683 87684 87685 87686 87687 87688 87689 87690 87691 87692 87693 87694 87695 87696 87697 87698 87699 87700 87701 87702 87703 87704 87705 87706 87707 87708 87709 87710 87711 87712 87713 87714 87715 87716 87717 87718 87719 87720 87721 87722 87723 87724 87725 87726 87727 87728 87729 87730 87731 87732 87733 87734 87735 87736 87737 87738 87739 87740 87741 87742 87743 87744 87745 87746 87747 87748 87749 87750 87751 87752 87753 87754 87755 87756 87757 87758 87759 87760 87761 87762 87763 87764 87765 87766 87767 87768 87769 87770 87771 87772 87773 87774 87775 87776 87777 87778 87779 87780 87781 87782 87783 87784 87785 87786 87787 87788 87789 87790 87791 87792 87793 87794 87795 87796 87797 87798 87799 87800 87801 87802 87803 87804 87805 87806 87807 87808 87809 87810 87811 87812 87813 87814 87815 87816 87817 87818 87819 87820 87821 87822 87823 87824 87825 87826 87827 87828 87829 87830 87831 87832 87833 87834 87835 87836 87837 87838 87839 87840 87841 87842 87843 87844 87845 87846 87847 87848 87849 87850 87851 87852 87853 87854 87855 87856 87857 87858 87859 87860 87861 87862 87863 87864 87865 87866 87867 87868 87869 87870 87871 87872 87873 87874 87875 87876 87877 87878 87879 87880 87881 87882 87883 87884 87885 87886 87887 87888 87889 87890 87891 87892 87893 87894 87895 87896 87897 87898 87899 87900 87901 87902 87903 87904 87905 87906 87907 87908 87909 87910 87911 87912 87913 87914 87915 87916 87917 87918 87919 87920 87921 87922 87923 87924 87925 87926 87927 87928 87929 87930 87931 87932 87933 87934 87935 87936 87937 87938 87939 87940 87941 87942 87943 87944 87945 87946 87947 87948 87949 87950 87951 87952 87953 87954 87955 87956 87957 87958 87959 87960 87961 87962 87963 87964 87965 87966 87967 87968 87969 87970 87971 87972 87973 87974 87975 87976 87977 87978 87979 87980 87981 87982 87983 87984 87985 87986 87987 87988 87989 87990 87991 87992 87993 87994 87995 87996 87997 87998 87999 88000 88001 88002 88003 88004 88005 88006 88007 88008 88009 88010 88011 88012 88013 88014 88015 88016 88017 88018 88019 88020 88021 88022 88023 88024 88025 88026 88027 88028 88029 88030 88031 88032 88033 88034 88035 88036 88037 88038 88039 88040 88041 88042 88043 88044 88045 88046 88047 88048 88049 88050 88051 88052 88053 88054 88055 88056 88057 88058 88059 88060 88061 88062 88063 88064 88065 88066 88067 88068 88069 88070 88071 88072 88073 88074 88075 88076 88077 88078 88079 88080 88081 88082 88083 88084 88085 88086 88087 88088 88089 88090 88091 88092 88093 88094 88095 88096 88097 88098 88099 88100 88101 88102 88103 88104 88105 88106 88107 88108 88109 88110 88111 88112 88113 88114 88115 88116 88117 88118 88119 88120 88121 88122 88123 88124 88125 88126 88127 88128 88129 88130 88131 88132 88133 88134 88135 88136 88137 88138 88139 88140 88141 88142 88143 88144 88145 88146 88147 88148 88149 88150 88151 88152 88153 88154 88155 88156 88157 88158 88159 88160 88161 88162 88163 88164 88165 88166 88167 88168 88169 88170 88171 88172 88173 88174 88175 88176 88177 88178 88179 88180 88181 88182 88183 88184 88185 88186 88187 88188 88189 88190 88191 88192 88193 88194 88195 88196 88197 88198 88199 88200 88201 88202 88203 88204 88205 88206 88207 88208 88209 88210 88211 88212 88213 88214 88215 88216 88217 88218 88219 88220 88221 88222 88223 88224 88225 88226 88227 88228 88229 88230 88231 88232 88233 88234 88235 88236 88237 88238 88239 88240 88241 88242 88243 88244 88245 88246 88247 88248 88249 88250 88251 88252 88253 88254 88255 88256 88257 88258 88259 88260 88261 88262 88263 88264 88265 88266 88267 88268 88269 88270 88271 88272 88273 88274 88275 88276 88277 88278 88279 88280 88281 88282 88283 88284 88285 88286 88287 88288 88289 88290 88291 88292 88293 88294 88295 88296 88297 88298 88299 88300 88301 88302 88303 88304 88305 88306 88307 88308 88309 88310 88311 88312 88313 88314 88315 88316 88317 88318 88319 88320 88321 88322 88323 88324 88325 88326 88327 88328 88329 88330 88331 88332 88333 88334 88335 88336 88337 88338 88339 88340 88341 88342 88343 88344 88345 88346 88347 88348 88349 88350 88351 88352 88353 88354 88355 88356 88357 88358 88359 88360 88361 88362 88363 88364 88365 88366 88367 88368 88369 88370 88371 88372 88373 88374 88375 88376 88377 88378 88379 88380 88381 88382 88383 88384 88385 88386 88387 88388 88389 88390 88391 88392 88393 88394 88395 88396 88397 88398 88399 88400 88401 88402 88403 88404 88405 88406 88407 88408 88409 88410 88411 88412 88413 88414 88415 88416 88417 88418 88419 88420 88421 88422 88423 88424 88425 88426 88427 88428 88429 88430 88431 88432 88433 88434 88435 88436 88437 88438 88439 88440 88441 88442 88443 88444 88445 88446 88447 88448 88449 88450 88451 88452 88453 88454 88455 88456 88457 88458 88459 88460 88461 88462 88463 88464 88465 88466 88467 88468 88469 88470 88471 88472 88473 88474 88475 88476 88477 88478 88479 88480 88481 88482 88483 88484 88485 88486 88487 88488 88489 88490 88491 88492 88493 88494 88495 88496 88497 88498 88499 88500 88501 88502 88503 88504 88505 88506 88507 88508 88509 88510 88511 88512 88513 88514 88515 88516 88517 88518 88519 88520 88521 88522 88523 88524 88525 88526 88527 88528 88529 88530 88531 88532 88533 88534 88535 88536 88537 88538 88539 88540 88541 88542 88543 88544 88545 88546 88547 88548 88549 88550 88551 88552 88553 88554 88555 88556 88557 88558 88559 88560 88561 88562 88563 88564 88565 88566 88567 88568 88569 88570 88571 88572 88573 88574 88575 88576 88577 88578 88579 88580 88581 88582 88583 88584 88585 88586 88587 88588 88589 88590 88591 88592 88593 88594 88595 88596 88597 88598 88599 88600 88601 88602 88603 88604 88605 88606 88607 88608 88609 88610 88611 88612 88613 88614 88615 88616 88617 88618 88619 88620 88621 88622 88623 88624 88625 88626 88627 88628 88629 88630 88631 88632 88633 88634 88635 88636 88637 88638 88639 88640 88641 88642 88643 88644 88645 88646 88647 88648 88649 88650 88651 88652 88653 88654 88655 88656 88657 88658 88659 88660 88661 88662 88663 88664 88665 88666 88667 88668 88669 88670 88671 88672 88673 88674 88675 88676 88677 88678 88679 88680 88681 88682 88683 88684 88685 88686 88687 88688 88689 88690 88691 88692 88693 88694 88695 88696 88697 88698 88699 88700 88701 88702 88703 88704 88705 88706 88707 88708 88709 88710 88711 88712 88713 88714 88715 88716 88717 88718 88719 88720 88721 88722 88723 88724 88725 88726 88727 88728 88729 88730 88731 88732 88733 88734 88735 88736 88737 88738 88739 88740 88741 88742 88743 88744 88745 88746 88747 88748 88749 88750 88751 88752 88753 88754 88755 88756 88757 88758 88759 88760 88761 88762 88763 88764 88765 88766 88767 88768 88769 88770 88771 88772 88773 88774 88775 88776 88777 88778 88779 88780 88781 88782 88783 88784 88785 88786 88787 88788 88789 88790 88791 88792 88793 88794 88795 88796 88797 88798 88799 88800 88801 88802 88803 88804 88805 88806 88807 88808 88809 88810 88811 88812 88813 88814 88815 88816 88817 88818 88819 88820 88821 88822 88823 88824 88825 88826 88827 88828 88829 88830 88831 88832 88833 88834 88835 88836 88837 88838 88839 88840 88841 88842 88843 88844 88845 88846 88847 88848 88849 88850 88851 88852 88853 88854 88855 88856 88857 88858 88859 88860 88861 88862 88863 88864 88865 88866 88867 88868 88869 88870 88871 88872 88873 88874 88875 88876 88877 88878 88879 88880 88881 88882 88883 88884 88885 88886 88887 88888 88889 88890 88891 88892 88893 88894 88895 88896 88897 88898 88899 88900 88901 88902 88903 88904 88905 88906 88907 88908 88909 88910 88911 88912 88913 88914 88915 88916 88917 88918 88919 88920 88921 88922 88923 88924 88925 88926 88927 88928 88929 88930 88931 88932 88933 88934 88935 88936 88937 88938 88939 88940 88941 88942 88943 88944 88945 88946 88947 88948 88949 88950 88951 88952 88953 88954 88955 88956 88957 88958 88959 88960 88961 88962 88963 88964 88965 88966 88967 88968 88969 88970 88971 88972 88973 88974 88975 88976 88977 88978 88979 88980 88981 88982 88983 88984 88985 88986 88987 88988 88989 88990 88991 88992 88993 88994 88995 88996 88997 88998 88999 89000 89001 89002 89003 89004 89005 89006 89007 89008 89009 89010 89011 89012 89013 89014 89015 89016 89017 89018 89019 89020 89021 89022 89023 89024 89025 89026 89027 89028 89029 89030 89031 89032 89033 89034 89035 89036 89037 89038 89039 89040 89041 89042 89043 89044 89045 89046 89047 89048 89049 89050 89051 89052 89053 89054 89055 89056 89057 89058 89059 89060 89061 89062 89063 89064 89065 89066 89067 89068 89069 89070 89071 89072 89073 89074 89075 89076 89077 89078 89079 89080 89081 89082 89083 89084 89085 89086 89087 89088 89089 89090 89091 89092 89093 89094 89095 89096 89097 89098 89099 89100 89101 89102 89103 89104 89105 89106 89107 89108 89109 89110 89111 89112 89113 89114 89115 89116 89117 89118 89119 89120 89121 89122 89123 89124 89125 89126 89127 89128 89129 89130 89131 89132 89133 89134 89135 89136 89137 89138 89139 89140 89141 89142 89143 89144 89145 89146 89147 89148 89149 89150 89151 89152 89153 89154 89155 89156 89157 89158 89159 89160 89161 89162 89163 89164 89165 89166 89167 89168 89169 89170 89171 89172 89173 89174 89175 89176 89177 89178 89179 89180 89181 89182 89183 89184 89185 89186 89187 89188 89189 89190 89191 89192 89193 89194 89195 89196 89197 89198 89199 89200 89201 89202 89203 89204 89205 89206 89207 89208 89209 89210 89211 89212 89213 89214 89215 89216 89217 89218 89219 89220 89221 89222 89223 89224 89225 89226 89227 89228 89229 89230 89231 89232 89233 89234 89235 89236 89237 89238 89239 89240 89241 89242 89243 89244 89245 89246 89247 89248 89249 89250 89251 89252 89253 89254 89255 89256 89257 89258 89259 89260 89261 89262 89263 89264 89265 89266 89267 89268 89269 89270 89271 89272 89273 89274 89275 89276 89277 89278 89279 89280 89281 89282 89283 89284 89285 89286 89287 89288 89289 89290 89291 89292 89293 89294 89295 89296 89297 89298 89299 89300 89301 89302 89303 89304 89305 89306 89307 89308 89309 89310 89311 89312 89313 89314 89315 89316 89317 89318 89319 89320 89321 89322 89323 89324 89325 89326 89327 89328 89329 89330 89331 89332 89333 89334 89335 89336 89337 89338 89339 89340 89341 89342 89343 89344 89345 89346 89347 89348 89349 89350 89351 89352 89353 89354 89355 89356 89357 89358 89359 89360 89361 89362 89363 89364 89365 89366 89367 89368 89369 89370 89371 89372 89373 89374 89375 89376 89377 89378 89379 89380 89381 89382 89383 89384 89385 89386 89387 89388 89389 89390 89391 89392 89393 89394 89395 89396 89397 89398 89399 89400 89401 89402 89403 89404 89405 89406 89407 89408 89409 89410 89411 89412 89413 89414 89415 89416 89417 89418 89419 89420 89421 89422 89423 89424 89425 89426 89427 89428 89429 89430 89431 89432 89433 89434 89435 89436 89437 89438 89439 89440 89441 89442 89443 89444 89445 89446 89447 89448 89449 89450 89451 89452 89453 89454 89455 89456 89457 89458 89459 89460 89461 89462 89463 89464 89465 89466 89467 89468 89469 89470 89471 89472 89473 89474 89475 89476 89477 89478 89479 89480 89481 89482 89483 89484 89485 89486 89487 89488 89489 89490 89491 89492 89493 89494 89495 89496 89497 89498 89499 89500 89501 89502 89503 89504 89505 89506 89507 89508 89509 89510 89511 89512 89513 89514 89515 89516 89517 89518 89519 89520 89521 89522 89523 89524 89525 89526 89527 89528 89529 89530 89531 89532 89533 89534 89535 89536 89537 89538 89539 89540 89541 89542 89543 89544 89545 89546 89547 89548 89549 89550 89551 89552 89553 89554 89555 89556 89557 89558 89559 89560 89561 89562 89563 89564 89565 89566 89567 89568 89569 89570 89571 89572 89573 89574 89575 89576 89577 89578 89579 89580 89581 89582 89583 89584 89585 89586 89587 89588 89589 89590 89591 89592 89593 89594 89595 89596 89597 89598 89599 89600 89601 89602 89603 89604 89605 89606 89607 89608 89609 89610 89611 89612 89613 89614 89615 89616 89617 89618 89619 89620 89621 89622 89623 89624 89625 89626 89627 89628 89629 89630 89631 89632 89633 89634 89635 89636 89637 89638 89639 89640 89641 89642 89643 89644 89645 89646 89647 89648 89649 89650 89651 89652 89653 89654 89655 89656 89657 89658 89659 89660 89661 89662 89663 89664 89665 89666 89667 89668 89669 89670 89671 89672 89673 89674 89675 89676 89677 89678 89679 89680 89681 89682 89683 89684 89685 89686 89687 89688 89689 89690 89691 89692 89693 89694 89695 89696 89697 89698 89699 89700 89701 89702 89703 89704 89705 89706 89707 89708 89709 89710 89711 89712 89713 89714 89715 89716 89717 89718 89719 89720 89721 89722 89723 89724 89725 89726 89727 89728 89729 89730 89731 89732 89733 89734 89735 89736 89737 89738 89739 89740 89741 89742 89743 89744 89745 89746 89747 89748 89749 89750 89751 89752 89753 89754 89755 89756 89757 89758 89759 89760 89761 89762 89763 89764 89765 89766 89767 89768 89769 89770 89771 89772 89773 89774 89775 89776 89777 89778 89779 89780 89781 89782 89783 89784 89785 89786 89787 89788 89789 89790 89791 89792 89793 89794 89795 89796 89797 89798 89799 89800 89801 89802 89803 89804 89805 89806 89807 89808 89809 89810 89811 89812 89813 89814 89815 89816 89817 89818 89819 89820 89821 89822 89823 89824 89825 89826 89827 89828 89829 89830 89831 89832 89833 89834 89835 89836 89837 89838 89839 89840 89841 89842 89843 89844 89845 89846 89847 89848 89849 89850 89851 89852 89853 89854 89855 89856 89857 89858 89859 89860 89861 89862 89863 89864 89865 89866 89867 89868 89869 89870 89871 89872 89873 89874 89875 89876 89877 89878 89879 89880 89881 89882 89883 89884 89885 89886 89887 89888 89889 89890 89891 89892 89893 89894 89895 89896 89897 89898 89899 89900 89901 89902 89903 89904 89905 89906 89907 89908 89909 89910 89911 89912 89913 89914 89915 89916 89917 89918 89919 89920 89921 89922 89923 89924 89925 89926 89927 89928 89929 89930 89931 89932 89933 89934 89935 89936 89937 89938 89939 89940 89941 89942 89943 89944 89945 89946 89947 89948 89949 89950 89951 89952 89953 89954 89955 89956 89957 89958 89959 89960 89961 89962 89963 89964 89965 89966 89967 89968 89969 89970 89971 89972 89973 89974 89975 89976 89977 89978 89979 89980 89981 89982 89983 89984 89985 89986 89987 89988 89989 89990 89991 89992 89993 89994 89995 89996 89997 89998 89999 90000 90001 90002 90003 90004 90005 90006 90007 90008 90009 90010 90011 90012 90013 90014 90015 90016 90017 90018 90019 90020 90021 90022 90023 90024 90025 90026 90027 90028 90029 90030 90031 90032 90033 90034 90035 90036 90037 90038 90039 90040 90041 90042 90043 90044 90045 90046 90047 90048 90049 90050 90051 90052 90053 90054 90055 90056 90057 90058 90059 90060 90061 90062 90063 90064 90065 90066 90067 90068 90069 90070 90071 90072 90073 90074 90075 90076 90077 90078 90079 90080 90081 90082 90083 90084 90085 90086 90087 90088 90089 90090 90091 90092 90093 90094 90095 90096 90097 90098 90099 90100 90101 90102 90103 90104 90105 90106 90107 90108 90109 90110 90111 90112 90113 90114 90115 90116 90117 90118 90119 90120 90121 90122 90123 90124 90125 90126 90127 90128 90129 90130 90131 90132 90133 90134 90135 90136 90137 90138 90139 90140 90141 90142 90143 90144 90145 90146 90147 90148 90149 90150 90151 90152 90153 90154 90155 90156 90157 90158 90159 90160 90161 90162 90163 90164 90165 90166 90167 90168 90169 90170 90171 90172 90173 90174 90175 90176 90177 90178 90179 90180 90181 90182 90183 90184 90185 90186 90187 90188 90189 90190 90191 90192 90193 90194 90195 90196 90197 90198 90199 90200 90201 90202 90203 90204 90205 90206 90207 90208 90209 90210 90211 90212 90213 90214 90215 90216 90217 90218 90219 90220 90221 90222 90223 90224 90225 90226 90227 90228 90229 90230 90231 90232 90233 90234 90235 90236 90237 90238 90239 90240 90241 90242 90243 90244 90245 90246 90247 90248 90249 90250 90251 90252 90253 90254 90255 90256 90257 90258 90259 90260 90261 90262 90263 90264 90265 90266 90267 90268 90269 90270 90271 90272 90273 90274 90275 90276 90277 90278 90279 90280 90281 90282 90283 90284 90285 90286 90287 90288 90289 90290 90291 90292 90293 90294 90295 90296 90297 90298 90299 90300 90301 90302 90303 90304 90305 90306 90307 90308 90309 90310 90311 90312 90313 90314 90315 90316 90317 90318 90319 90320 90321 90322 90323 90324 90325 90326 90327 90328 90329 90330 90331 90332 90333 90334 90335 90336 90337 90338 90339 90340 90341 90342 90343 90344 90345 90346 90347 90348 90349 90350 90351 90352 90353 90354 90355 90356 90357 90358 90359 90360 90361 90362 90363 90364 90365 90366 90367 90368 90369 90370 90371 90372 90373 90374 90375 90376 90377 90378 90379 90380 90381 90382 90383 90384 90385 90386 90387 90388 90389 90390 90391 90392 90393 90394 90395 90396 90397 90398 90399 90400 90401 90402 90403 90404 90405 90406 90407 90408 90409 90410 90411 90412 90413 90414 90415 90416 90417 90418 90419 90420 90421 90422 90423 90424 90425 90426 90427 90428 90429 90430 90431 90432 90433 90434 90435 90436 90437 90438 90439 90440 90441 90442 90443 90444 90445 90446 90447 90448 90449 90450 90451 90452 90453 90454 90455 90456 90457 90458 90459 90460 90461 90462 90463 90464 90465 90466 90467 90468 90469 90470 90471 90472 90473 90474 90475 90476 90477 90478 90479 90480 90481 90482 90483 90484 90485 90486 90487 90488 90489 90490 90491 90492 90493 90494 90495 90496 90497 90498 90499 90500 90501 90502 90503 90504 90505 90506 90507 90508 90509 90510 90511 90512 90513 90514 90515 90516 90517 90518 90519 90520 90521 90522 90523 90524 90525 90526 90527 90528 90529 90530 90531 90532 90533 90534 90535 90536 90537 90538 90539 90540 90541 90542 90543 90544 90545 90546 90547 90548 90549 90550 90551 90552 90553 90554 90555 90556 90557 90558 90559 90560 90561 90562 90563 90564 90565 90566 90567 90568 90569 90570 90571 90572 90573 90574 90575 90576 90577 90578 90579 90580 90581 90582 90583 90584 90585 90586 90587 90588 90589 90590 90591 90592 90593 90594 90595 90596 90597 90598 90599 90600 90601 90602 90603 90604 90605 90606 90607 90608 90609 90610 90611 90612 90613 90614 90615 90616 90617 90618 90619 90620 90621 90622 90623 90624 90625 90626 90627 90628 90629 90630 90631 90632 90633 90634 90635 90636 90637 90638 90639 90640 90641 90642 90643 90644 90645 90646 90647 90648 90649 90650 90651 90652 90653 90654 90655 90656 90657 90658 90659 90660 90661 90662 90663 90664 90665 90666 90667 90668 90669 90670 90671 90672 90673 90674 90675 90676 90677 90678 90679 90680 90681 90682 90683 90684 90685 90686 90687 90688 90689 90690 90691 90692 90693 90694 90695 90696 90697 90698 90699 90700 90701 90702 90703 90704 90705 90706 90707 90708 90709 90710 90711 90712 90713 90714 90715 90716 90717 90718 90719 90720 90721 90722 90723 90724 90725 90726 90727 90728 90729 90730 90731 90732 90733 90734 90735 90736 90737 90738 90739 90740 90741 90742 90743 90744 90745 90746 90747 90748 90749 90750 90751 90752 90753 90754 90755 90756 90757 90758 90759 90760 90761 90762 90763 90764 90765 90766 90767 90768 90769 90770 90771 90772 90773 90774 90775 90776 90777 90778 90779 90780 90781 90782 90783 90784 90785 90786 90787 90788 90789 90790 90791 90792 90793 90794 90795 90796 90797 90798 90799 90800 90801 90802 90803 90804 90805 90806 90807 90808 90809 90810 90811 90812 90813 90814 90815 90816 90817 90818 90819 90820 90821 90822 90823 90824 90825 90826 90827 90828 90829 90830 90831 90832 90833 90834 90835 90836 90837 90838 90839 90840 90841 90842 90843 90844 90845 90846 90847 90848 90849 90850 90851 90852 90853 90854 90855 90856 90857 90858 90859 90860 90861 90862 90863 90864 90865 90866 90867 90868 90869 90870 90871 90872 90873 90874 90875 90876 90877 90878 90879 90880 90881 90882 90883 90884 90885 90886 90887 90888 90889 90890 90891 90892 90893 90894 90895 90896 90897 90898 90899 90900 90901 90902 90903 90904 90905 90906 90907 90908 90909 90910 90911 90912 90913 90914 90915 90916 90917 90918 90919 90920 90921 90922 90923 90924 90925 90926 90927 90928 90929 90930 90931 90932 90933 90934 90935 90936 90937 90938 90939 90940 90941 90942 90943 90944 90945 90946 90947 90948 90949 90950 90951 90952 90953 90954 90955 90956 90957 90958 90959 90960 90961 90962 90963 90964 90965 90966 90967 90968 90969 90970 90971 90972 90973 90974 90975 90976 90977 90978 90979 90980 90981 90982 90983 90984 90985 90986 90987 90988 90989 90990 90991 90992 90993 90994 90995 90996 90997 90998 90999 91000 91001 91002 91003 91004 91005 91006 91007 91008 91009 91010 91011 91012 91013 91014 91015 91016 91017 91018 91019 91020 91021 91022 91023 91024 91025 91026 91027 91028 91029 91030 91031 91032 91033 91034 91035 91036 91037 91038 91039 91040 91041 91042 91043 91044 91045 91046 91047 91048 91049 91050 91051 91052 91053 91054 91055 91056 91057 91058 91059 91060 91061 91062 91063 91064 91065 91066 91067 91068 91069 91070 91071 91072 91073 91074 91075 91076 91077 91078 91079 91080 91081 91082 91083 91084 91085 91086 91087 91088 91089 91090 91091 91092 91093 91094 91095 91096 91097 91098 91099 91100 91101 91102 91103 91104 91105 91106 91107 91108 91109 91110 91111 91112 91113 91114 91115 91116 91117 91118 91119 91120 91121 91122 91123 91124 91125 91126 91127 91128 91129 91130 91131 91132 91133 91134 91135 91136 91137 91138 91139 91140 91141 91142 91143 91144 91145 91146 91147 91148 91149 91150 91151 91152 91153 91154 91155 91156 91157 91158 91159 91160 91161 91162 91163 91164 91165 91166 91167 91168 91169 91170 91171 91172 91173 91174 91175 91176 91177 91178 91179 91180 91181 91182 91183 91184 91185 91186 91187 91188 91189 91190 91191 91192 91193 91194 91195 91196 91197 91198 91199 91200 91201 91202 91203 91204 91205 91206 91207 91208 91209 91210 91211 91212 91213 91214 91215 91216 91217 91218 91219 91220 91221 91222 91223 91224 91225 91226 91227 91228 91229 91230 91231 91232 91233 91234 91235 91236 91237 91238 91239 91240 91241 91242 91243 91244 91245 91246 91247 91248 91249 91250 91251 91252 91253 91254 91255 91256 91257 91258 91259 91260 91261 91262 91263 91264 91265 91266 91267 91268 91269 91270 91271 91272 91273 91274 91275 91276 91277 91278 91279 91280 91281 91282 91283 91284 91285 91286 91287 91288 91289 91290 91291 91292 91293 91294 91295 91296 91297 91298 91299 91300 91301 91302 91303 91304 91305 91306 91307 91308 91309 91310 91311 91312 91313 91314 91315 91316 91317 91318 91319 91320 91321 91322 91323 91324 91325 91326 91327 91328 91329 91330 91331 91332 91333 91334 91335 91336 91337 91338 91339 91340 91341 91342 91343 91344 91345 91346 91347 91348 91349 91350 91351 91352 91353 91354 91355 91356 91357 91358 91359 91360 91361 91362 91363 91364 91365 91366 91367 91368 91369 91370 91371 91372 91373 91374 91375 91376 91377 91378 91379 91380 91381 91382 91383 91384 91385 91386 91387 91388 91389 91390 91391 91392 91393 91394 91395 91396 91397 91398 91399 91400 91401 91402 91403 91404 91405 91406 91407 91408 91409 91410 91411 91412 91413 91414 91415 91416 91417 91418 91419 91420 91421 91422 91423 91424 91425 91426 91427 91428 91429 91430 91431 91432 91433 91434 91435 91436 91437 91438 91439 91440 91441 91442 91443 91444 91445 91446 91447 91448 91449 91450 91451 91452 91453 91454 91455 91456 91457 91458 91459 91460 91461 91462 91463 91464 91465 91466 91467 91468 91469 91470 91471 91472 91473 91474 91475 91476 91477 91478 91479 91480 91481 91482 91483 91484 91485 91486 91487 91488 91489 91490 91491 91492 91493 91494 91495 91496 91497 91498 91499 91500 91501 91502 91503 91504 91505 91506 91507 91508 91509 91510 91511 91512 91513 91514 91515 91516 91517 91518 91519 91520 91521 91522 91523 91524 91525 91526 91527 91528 91529 91530 91531 91532 91533 91534 91535 91536 91537 91538 91539 91540 91541 91542 91543 91544 91545 91546 91547 91548 91549 91550 91551 91552 91553 91554 91555 91556 91557 91558 91559 91560 91561 91562 91563 91564 91565 91566 91567 91568 91569 91570 91571 91572 91573 91574 91575 91576 91577 91578 91579 91580 91581 91582 91583 91584 91585 91586 91587 91588 91589 91590 91591 91592 91593 91594 91595 91596 91597 91598 91599 91600 91601 91602 91603 91604 91605 91606 91607 91608 91609 91610 91611 91612 91613 91614 91615 91616 91617 91618 91619 91620 91621 91622 91623 91624 91625 91626 91627 91628 91629 91630 91631 91632 91633 91634 91635 91636 91637 91638 91639 91640 91641 91642 91643 91644 91645 91646 91647 91648 91649 91650 91651 91652 91653 91654 91655 91656 91657 91658 91659 91660 91661 91662 91663 91664 91665 91666 91667 91668 91669 91670 91671 91672 91673 91674 91675 91676 91677 91678 91679 91680 91681 91682 91683 91684 91685 91686 91687 91688 91689 91690 91691 91692 91693 91694 91695 91696 91697 91698 91699 91700 91701 91702 91703 91704 91705 91706 91707 91708 91709 91710 91711 91712 91713 91714 91715 91716 91717 91718 91719 91720 91721 91722 91723 91724 91725 91726 91727 91728 91729 91730 91731 91732 91733 91734 91735 91736 91737 91738 91739 91740 91741 91742 91743 91744 91745 91746 91747 91748 91749 91750 91751 91752 91753 91754 91755 91756 91757 91758 91759 91760 91761 91762 91763 91764 91765 91766 91767 91768 91769 91770 91771 91772 91773 91774 91775 91776 91777 91778 91779 91780 91781 91782 91783 91784 91785 91786 91787 91788 91789 91790 91791 91792 91793 91794 91795 91796 91797 91798 91799 91800 91801 91802 91803 91804 91805 91806 91807 91808 91809 91810 91811 91812 91813 91814 91815 91816 91817 91818 91819 91820 91821 91822 91823 91824 91825 91826 91827 91828 91829 91830 91831 91832 91833 91834 91835 91836 91837 91838 91839 91840 91841 91842 91843 91844 91845 91846 91847 91848 91849 91850 91851 91852 91853 91854 91855 91856 91857 91858 91859 91860 91861 91862 91863 91864 91865 91866 91867 91868 91869 91870 91871 91872 91873 91874 91875 | <ns0:data-stream-collection xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://scap.nist.gov/schema/scap/source/1.2" xmlns:ns1="http://www.w3.org/1999/xlink" xmlns:ns10="http://checklists.nist.gov/xccdf/1.2" xmlns:ns13="http://cpe.mitre.org/dictionary/2.0" xmlns:ns2="urn:oasis:names:tc:entity:xmlns:xml:catalog" xmlns:ns3="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:ns5="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:ns6="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:ns7="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:ns8="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ns9="http://scap.nist.gov/schema/ocil/2.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" id="scap_org.open-scap_collection_from_xccdf_ssg-rhel6-xccdf-1.2.xml" schematron-version="1.2">
<ns0:data-stream id="scap_org.open-scap_datastream_from_xccdf_ssg-rhel6-xccdf-1.2.xml" scap-version="1.2" use-case="OTHER"><ns0:dictionaries><ns0:component-ref id="scap_org.open-scap_cref_output--ssg-rhel6-cpe-dictionary.xml" ns1:href="#scap_org.open-scap_comp_output--ssg-rhel6-cpe-dictionary.xml"><ns2:catalog><ns2:uri name="ssg-rhel6-cpe-oval.xml" uri="#scap_org.open-scap_cref_output--ssg-rhel6-cpe-oval.xml" /></ns2:catalog></ns0:component-ref></ns0:dictionaries>
<ns0:checklists>
<ns0:component-ref id="scap_org.open-scap_cref_ssg-rhel6-xccdf-1.2.xml" ns1:href="#scap_org.open-scap_comp_ssg-rhel6-xccdf-1.2.xml">
<ns2:catalog>
<ns2:uri name="ssg-rhel6-oval.xml" uri="#scap_org.open-scap_cref_ssg-rhel6-oval.xml" />
<ns2:uri name="ssg-rhel6-ocil.xml" uri="#scap_org.open-scap_cref_ssg-rhel6-ocil.xml" />
</ns2:catalog>
</ns0:component-ref>
<ns0:component-ref id="scap_org.open-scap_cref_output--ssg-rhel6-pcidss-xccdf-1.2.xml" ns1:href="#scap_org.open-scap_comp_output--ssg-rhel6-pcidss-xccdf-1.2.xml">
<ns2:catalog>
<ns2:uri name="ssg-rhel6-oval.xml" uri="#scap_org.open-scap_cref_output--ssg-rhel6-oval.xml" />
<ns2:uri name="ssg-rhel6-ocil.xml" uri="#scap_org.open-scap_cref_output--ssg-rhel6-ocil.xml" />
</ns2:catalog>
</ns0:component-ref>
</ns0:checklists>
<ns0:checks>
<ns0:component-ref id="scap_org.open-scap_cref_ssg-rhel6-oval.xml" ns1:href="#scap_org.open-scap_comp_ssg-rhel6-oval.xml" />
<ns0:component-ref id="scap_org.open-scap_cref_ssg-rhel6-ocil.xml" ns1:href="#scap_org.open-scap_comp_ssg-rhel6-ocil.xml" />
<ns0:component-ref id="scap_org.open-scap_cref_output--ssg-rhel6-oval.xml" ns1:href="#scap_org.open-scap_comp_output--ssg-rhel6-oval.xml" />
<ns0:component-ref id="scap_org.open-scap_cref_output--ssg-rhel6-ocil.xml" ns1:href="#scap_org.open-scap_comp_output--ssg-rhel6-ocil.xml" />
<ns0:component-ref id="scap_org.open-scap_cref_output--ssg-rhel6-cpe-oval.xml" ns1:href="#scap_org.open-scap_comp_output--ssg-rhel6-cpe-oval.xml" /></ns0:checks>
</ns0:data-stream>
<ns0:component id="scap_org.open-scap_comp_ssg-rhel6-oval.xml" timestamp="2017-08-11T21:23:31">
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<ns3:generator>
<ns5:product_name>python</ns5:product_name>
<ns5:product_version>2.7.13+</ns5:product_version>
<ns5:schema_version>5.11</ns5:schema_version>
<ns5:timestamp>2017-08-11T21:23:24</ns5:timestamp>
</ns3:generator>
<ns3:definitions>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_groupownership:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All syslog log files should be owned by the appropriate group.</ns3:description>
<ns3:reference ref_id="rsyslog_files_groupownership" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if all system log files are owned by root group" test_ref="oval:ssg-test_rsyslog_files_groupownership:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_ownership:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All syslog log files should be owned by the appropriate user.</ns3:description>
<ns3:reference ref_id="rsyslog_files_ownership" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if all system log files are owned by root user" test_ref="oval:ssg-test_rsyslog_files_ownership:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_permissions:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for all syslog log files should be set correctly.</ns3:description>
<ns3:reference ref_id="rsyslog_files_permissions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check permissions of all system log files" test_ref="oval:ssg-test_rsyslog_files_permissions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_dcredit:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password dcredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password dcredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_dcredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib dcredit" test_ref="oval:ssg-test_password_pam_cracklib_dcredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_difok:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password difok Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password difok should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_difok" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib difok" test_ref="oval:ssg-test_password_pam_cracklib_difok:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_lcredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password lcredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password lcredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_lcredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib lcredit" test_ref="oval:ssg-test_password_pam_cracklib_lcredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_maxrepeat:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password maxrepeat Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password maxrepeat should meet minimum
requirements using pam_pwquality</ns3:description>
<ns3:reference ref_id="accounts_password_pam_maxrepeat" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib maxrepeat" test_ref="oval:ssg-test_password_pam_cracklib_maxrepeat:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_minclass:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password minclass Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password minclass should meet the minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_minclass" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib minclass" test_ref="oval:ssg-test_password_pam_cracklib_minclass:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_minlen:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password minlen Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password minlen should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_minlen" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib" test_ref="oval:ssg-test_password_pam_minlen:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_ocredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password ocredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password ocredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_ocredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib ocredit" test_ref="oval:ssg-test_password_pam_cracklib_ocredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_retry:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password retry Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password retry should meet minimum
requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_retry" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib" test_ref="oval:ssg-test_password_pam_cracklib_retry:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_ucredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password ucredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password ucredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_ucredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib ucredit" test_ref="oval:ssg-test_password_pam_cracklib_ucredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chmod:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - chmod</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_chmod" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification chmod x32" test_ref="oval:ssg-test_audit_rules_dac_modification_chmod_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification chmod x64" test_ref="oval:ssg-test_audit_rules_dac_modification_chmod_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - chown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_chown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification chown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_chown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification chown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_chown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmod:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchmod</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchmod" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchmod x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmod_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchmod x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmod_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchmodat</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchmodat" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchmodat x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmodat_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchmodat x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmodat_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchownat:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchownat</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchownat" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchownat x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchownat_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchownat x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchownat_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fremovexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fremovexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fremovexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fremovexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fsetxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fsetxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fsetxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fsetxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lchown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lchown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lchown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lchown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lchown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lchown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lchown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lremovexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lremovexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lremovexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lremovexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lsetxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lsetxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lsetxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lsetxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_removexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - removexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_removexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification removexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_removexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification removexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_removexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_setxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - setxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_setxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification setxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_setxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification setxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_setxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_file_deletion_events:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit File Deletion Events</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit files deletion events.</ns3:description>
<ns3:reference ref_id="audit_rules_file_deletion_events" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit file delete" test_ref="oval:ssg-test_audit_rules_file_deletion_events:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_immutable:def:1" version="1">
<ns3:metadata>
<ns3:title>Make Audit Configuration Immutable</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Force a reboot to change audit rules is
enabled</ns3:description>
<ns3:reference ref_id="audit_rules_immutable" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="immutable" test_ref="oval:ssg-test_audit_rules_immutable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_kernel_module_loading:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit Kernel Module Loading and Unloading</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The audit rules should be configured to log information about kernel module loading and unloading.</ns3:description>
<ns3:reference ref_id="audit_rules_kernel_module_loading" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="audit insmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_insmod:tst:1" />
<ns3:criterion comment="audit rmmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_rmmod:tst:1" />
<ns3:criterion comment="audit rmmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_modprobe:tst:1" />
<ns3:criterion comment="audit module syscalls" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_syscall:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_login_events:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Login and Logout Events</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</ns3:description>
<ns3:reference ref_id="audit_rules_login_events" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="tallylog" test_ref="oval:ssg-test_audit_rules_login_events_tallylog:tst:1" />
<ns3:criterion comment="faillock" test_ref="oval:ssg-test_audit_rules_login_events_faillock:tst:1" />
<ns3:criterion comment="lastlog" test_ref="oval:ssg-test_audit_rules_login_events_lastlog:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_mac_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Events that Modify the System's Mandatory Access Controls</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules that detect changes to the system's mandatory access controls (SELinux) are enabled.</ns3:description>
<ns3:reference ref_id="audit_rules_mac_modification" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit changes selinux" test_ref="oval:ssg-test_audit_rules_mac_modification:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_media_export:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Information Export To Media</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules that detect the mounting of filesystems should be enabled.</ns3:description>
<ns3:reference ref_id="audit_rules_media_export" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit mount" test_ref="oval:ssg-test_audit_rules_media_export:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_networkconfig_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Events that Modify the System's Network Environment</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The network environment should not be modified by anything other than
administrator action. Any change to network parameters should be audited.</ns3:description>
<ns3:reference ref_id="audit_rules_networkconfig_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="network modification syscall" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_syscall:tst:1" />
<ns3:criterion comment="/etc/issue modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue:tst:1" />
<ns3:criterion comment="/etc/issue.net modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue_net:tst:1" />
<ns3:criterion comment="/etc/hosts modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_hosts:tst:1" />
<ns3:criterion comment="/etc/sysconfig/network modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_sysconfig_network:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands:def:1" version="3">
<ns3:metadata>
<ns3:title>
Ensure auditd Collects Information on the Use of Privileged Commands
</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules about the Information on the Use of Privileged
Commands are enabled</ns3:description>
<ns3:reference ref_id="audit_rules_privileged_commands" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/etc/audit/audit.rules contains -a always,exit -F path=path_to_binary -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged for each setuid or setgid executable on the system" test_ref="oval:ssg-test_audit_rules_privileged_commands:tst:1" />
<ns3:criterion comment="check if count of privileged commands on the system matches the count of defined audit.rules in the expected form" test_ref="oval:ssg-test_sets_dimension_match:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_session_events:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Process and Session Initiation Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should capture information about session initiation.</ns3:description>
<ns3:reference ref_id="audit_rules_session_events" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="utmp" test_ref="oval:ssg-test_audit_rules_session_events_utmp:tst:1" />
<ns3:criterion comment="btmp" test_ref="oval:ssg-test_audit_rules_session_events_btmp:tst:1" />
<ns3:criterion comment="wtmp" test_ref="oval:ssg-test_audit_rules_session_events_wtmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_sysadmin_actions:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit System Administrator Actions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit actions taken by system administrators on the system.</ns3:description>
<ns3:reference ref_id="audit_rules_sysadmin_actions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit sudoers" test_ref="oval:ssg-test_audit_rules_sysadmin_actions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_adjtimex:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Adjtimex</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through adjtimex.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_adjtimex" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line adjtimex and key present" test_ref="oval:ssg-test_audit_rules_time_adjtimex_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for adjtimex and key present" test_ref="oval:ssg-test_audit_rules_time_adjtimex_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_clock_settime:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Clock_settime</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through clock_settime.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_clock_settime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line clock_settime and key present" test_ref="oval:ssg-test_audit_rules_time_clock_settime_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for clock_settime and key present" test_ref="oval:ssg-test_audit_rules_time_clock_settime_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_settimeofday:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Settimeofday</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through settimeofday.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_settimeofday" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line settimeofday and key present" test_ref="oval:ssg-test_audit_rules_time_settimeofday_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for settimeofday and key present" test_ref="oval:ssg-test_audit_rules_time_settimeofday_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_stime:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Stime</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through stime. Note that on
64-bit architectures the stime system call is not defined in the audit
system calls lookup table.</ns3:description>
<ns3:reference ref_id="audit_rules_time_stime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="32-bit or 64-bit system and 32-bit arch stime line and key present" operator="AND">
<ns3:criteria comment="32-bit or 64-bit system" operator="OR">
<ns3:extend_definition comment="32-bit system" definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
</ns3:criteria>
<ns3:criterion comment="32-bit arch stime line and key present" test_ref="oval:ssg-test_audit_rules_time_stime_x86:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_watch_localtime:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through the Localtime File</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through /etc/localtime
</ns3:description>
<ns3:reference ref_id="audit_rules_time_watch_localtime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for localtime file being watched">
<ns3:criterion comment="watch localtime file" test_ref="oval:ssg-test_audit_rules_time_watch_localtime:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification:def:1" version="3">
<ns3:metadata>
<ns3:title>Ensure auditd Collects Unauthorized Access Attempts to
Files (unsuccessful)</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled</ns3:description>
<ns3:reference ref_id="audit_rules_unsuccessful_file_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="32-bit audit file eacces" test_ref="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" />
<ns3:criterion comment="32-bit audit file eperm" test_ref="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="64-bit" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criteria operator="AND">
<ns3:criterion comment="64-bit audit file eacces" test_ref="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" />
<ns3:criterion comment="64-bit audit file eperm" test_ref="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit User/Group Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should detect modification to system files that hold information about users and groups.</ns3:description>
<ns3:reference ref_id="audit_rules_usergroup_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group:tst:1" />
<ns3:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd:tst:1" />
<ns3:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow:tst:1" />
<ns3:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow:tst:1" />
<ns3:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_check_ttl:def:1" version="1">
<ns3:metadata>
<ns3:title>Check Avahi Responses' to TTL Field</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Check that Avahi is ignoring packets
unless the TTL field is 255.
</ns3:description>
<ns3:reference ref_id="avahi_check_ttl" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check Avahi TTL setting" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Avahi TTL setting is enabled" test_ref="oval:ssg-test_avahi_ttl_setting:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_disable_publishing:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Avahi Publishing</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable Avahi from publishing records.</ns3:description>
<ns3:reference ref_id="avahi_disable_publishing" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Disable Avahi Publishing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Avahi publishing is disabled" test_ref="oval:ssg-test_avahi_disable_publishing:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_ip_only:def:1" version="1">
<ns3:metadata>
<ns3:title>Serve Avahi Only via Required Protocol</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require Avahi to run on IPv4 or IPv6.</ns3:description>
<ns3:reference ref_id="avahi_ip_only" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check Avahi IPv4 and IPv6 settings" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criteria comment="Test that Avahi IPv4 is enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is enabled" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is disabled" negate="true" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
<ns3:criteria comment="Test that Avahi IPv6 is enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is disabled" negate="true" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is enabled" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
<ns3:criteria comment="Test that Avahi IPv4 and IPv6 are enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is enabled" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is enabled" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_prevent_port_sharing:def:1" version="1">
<ns3:metadata>
<ns3:title>Prevent Other Programs from using Avahi's Port</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Ensures that only Avahi is responsible for mDNS
traffic coming from the port on the system.
</ns3:description>
<ns3:reference ref_id="avahi_prevent_port_sharing" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Prevent Avahi Port Sharing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Prevent Avahi Port Sharing" test_ref="oval:ssg-test_avahi_port_sharing:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_restrict_published_information:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Information Published by Avahi</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevent user applications from using Avahi
to publish services.
</ns3:description>
<ns3:reference ref_id="avahi_restrict_published_information" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Restrict Avahi Publishing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criteria comment="Test that Avahi publishing information is disabled" operator="AND">
<ns3:criterion comment="Avahi user publishing information is disabled" test_ref="oval:ssg-test_avahi_restrict_user_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Address Publishing" test_ref="oval:ssg-test_avahi_restrict_address_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict HW Publishing" test_ref="oval:ssg-test_avahi_restrict_CPU_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Workstation Publishing" test_ref="oval:ssg-test_avahi_restrict_workstation_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Domain Publishing" test_ref="oval:ssg-test_avahi_restrict_domain_publishing:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_audit_argument:def:1" version="3">
<ns3:metadata>
<ns3:title>Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument audit=1 in the kernel line in /etc/grub.conf.</ns3:description>
<ns3:reference ref_id="bootloader_audit_argument" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="check for audit=1 in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_audit_argument:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_nousb_argument:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Kernel Support for USB via Bootloader Configuration</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument "nousb" in the kernel line in /etc/grub.conf</ns3:description>
<ns3:reference ref_id="bootloader_nousb_argument" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="look for argument 'nousb' in the kernel line in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_nousb_argument:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_password:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Boot Loader Password</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub boot loader should have password protection enabled.</ns3:description>
<ns3:reference ref_id="bootloader_password" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="make sure a password is defined in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_password:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_client_restrict_options:def:1" version="1">
<ns3:metadata>
<ns3:title>Minimize DHCP Client Configured Options</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the options that the DHCP gets
and applies to the DHCP client.</ns3:description>
<ns3:reference ref_id="dhcp_client_restrict_options" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="Minimize DHCP client configured options" operator="AND">
<ns3:criterion comment="Check domain-name in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_domain-named:tst:1" />
<ns3:criterion comment="Check domain-name-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_domain-name-servers:tst:1" />
<ns3:criterion comment="Check nis-domain in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_nis-domain:tst:1" />
<ns3:criterion comment="Check nis-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_nis-servers:tst:1" />
<ns3:criterion comment="Check ntp-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_ntp-servers:tst:1" />
<ns3:criterion comment="Check routers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_routers:tst:1" />
<ns3:criterion comment="Check time-offset in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_time-offset:tst:1" />
<ns3:criterion comment="Check subnet-mask in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_subnet-mask:tst:1" />
<ns3:criterion comment="Check broadcast-address in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_broadcast-address:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_configure_logging:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure DHCP Logging</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure rsyslog to record
DHCP daemon errors.</ns3:description>
<ns3:reference ref_id="dhcp_server_configure_logging" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check for daemon in /etc/rsyslog.conf" test_ref="oval:ssg-test_dhcp_server_configure_logging:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_deny_bootp:def:1" version="1">
<ns3:metadata>
<ns3:title>Deny BOOTP Requests</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents the DHCP from responding to
BOOTP requests.</ns3:description>
<ns3:reference ref_id="dhcp_server_deny_bootp" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check bootp /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_disable_bootp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_deny_decline:def:1" version="1">
<ns3:metadata>
<ns3:title>Deny Decline Messages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents the DHCP from responding to the
DHCPDECLINE messages.</ns3:description>
<ns3:reference ref_id="dhcp_server_deny_decline" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check deny declines /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_deny_declines:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_disable_ddns:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Dynamic DNS</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents DHCP from publishing information
about their clients using Dynamic DNS.</ns3:description>
<ns3:reference ref_id="dhcp_server_disable_ddns" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check ddns-update-style in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_disable_ddns:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_minimize_served_info:def:1" version="1">
<ns3:metadata>
<ns3:title>Minimize Served DHCP Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limits the amount of information that
that the DHCP server provides to clients.</ns3:description>
<ns3:reference ref_id="dhcp_server_minimize_served_info" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="Minimize DHCP served info" operator="AND">
<ns3:criterion comment="Check domain-name in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_domain-named_info:tst:1" />
<ns3:criterion comment="Check domain-name-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_domain-name-servers_info:tst:1" />
<ns3:criterion comment="Check nis-domain in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_nis-domain_info:tst:1" />
<ns3:criterion comment="Check nis-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_nis-servers_info:tst:1" />
<ns3:criterion comment="Check ntp-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_ntp-servers_info:tst:1" />
<ns3:criterion comment="Check routers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_routers_info:tst:1" />
<ns3:criterion comment="Check time-offset in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_time-offset_info:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_world_writable_system_owned:def:1" version="1">
<ns3:metadata>
<ns3:title>Find world writable directories not owned by a system account</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All world writable directories should be owned by a system user.</ns3:description>
<ns3:reference ref_id="dir_perms_world_writable_system_owned" source="ssg" /></ns3:metadata>
<ns3:criteria comment="check for local directories that are world writable and have uid greater than or equal to 500" negate="true">
<ns3:criterion comment="check for local directories that are world writable and have uid greater than or equal to 500" test_ref="oval:ssg-test_dir_world_writable_uid_gt_500:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_ctrlaltdel_reboot:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Ctrl-Alt-Del Reboot Activation</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, the system will reboot when the
Ctrl-Alt-Del key sequence is pressed.</ns3:description>
<ns3:reference ref_id="disable_ctrlaltdel_reboot" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Disable Ctrl-Alt-Del key sequence" test_ref="oval:ssg-test_disable_ctrlaltdel:tst:1" />
<ns3:criterion comment="Disable Ctrl-Alt-Del key sequence override exists" test_ref="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_interactive_boot:def:1" version="3">
<ns3:metadata>
<ns3:title>Disable Interactive Boot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ability for users to perform interactive startups should
be disabled.</ns3:description>
<ns3:reference ref_id="disable_interactive_boot" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check the value of PROMPT option in /etc/sysconfig/init. Fail if other than 'no'." test_ref="oval:ssg-test_interactive_boot_disabled_in_sysconfig_init:tst:1" />
<ns3:criterion comment="Check the presence of 'confirm' kernel boot argument in /etc/grub.conf. Fail if found." test_ref="oval:ssg-test_confirm_kernel_boot_argument_not_present:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-display_login_attempts:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Last Login/Access Notification</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure the system to notify users of last login/access using pam_lastlog.</ns3:description>
<ns3:reference ref_id="display_login_attempts" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions for pam_lastlog are satisfied" test_ref="oval:ssg-test_display_login_attempts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dovecot_disable_plaintext_auth:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Plaintext Authentication in Dovecot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Plaintext authentication of mail clients should be disabled.</ns3:description>
<ns3:reference ref_id="dovecot_disable_plaintext_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Disable Plaintext Authentication in Dovecot" operator="OR">
<ns3:extend_definition comment="dovecot service is disabled" definition_ref="oval:ssg-service_dovecot_disabled:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dovecot_disable_plaintext_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dovecot_enable_ssl:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SSL in Dovecot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSL capabilities should be enabled for the mail server.</ns3:description>
<ns3:reference ref_id="dovecot_enable_ssl" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Enable SSL in Dovecot" operator="OR">
<ns3:extend_definition comment="dovecot service is disabled" definition_ref="oval:ssg-service_dovecot_disabled:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dovecot_enable_ssl:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-enable_selinux_bootloader:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SELinux in /etc/grub.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Check if selinux=0 OR enforcing=0 within /etc/grub.conf lines, fail if found.
</ns3:description>
<ns3:reference ref_id="enable_selinux_bootloader" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" test_ref="oval:ssg-test_selinux_grub:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_group_owner_grub_conf:def:1" version="1">
<ns3:metadata>
<ns3:title>File grub.conf Owned By root Group </ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub.conf file should be owned by the root group. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf</ns3:description>
<ns3:reference ref_id="file_group_owner_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion test_ref="oval:ssg-test_file_group_owner_grub_conf:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_file_group_owner_efi_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_grub_conf:def:1" version="2">
<ns3:metadata>
<ns3:title>File /boot/grub/grub.conf Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for /boot/grub/grub.conf should be set to 0600 (or stronger).</ns3:description>
<ns3:reference ref_id="file_permissions_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_sgid:def:1" version="1">
<ns3:metadata>
<ns3:title>Find setgid files system packages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files with setgid should be owned by a base system package</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_sgid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all setgid files" test_ref="oval:ssg-check_setgid_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_suid:def:1" version="1">
<ns3:metadata>
<ns3:title>Find setuid files from system packages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files with setuid should be owned by a base system package</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_suid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all setuid files" test_ref="oval:ssg-check_setuid_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_user_owner_grub_conf:def:1" version="1">
<ns3:metadata>
<ns3:title>File grub.conf Owned By root User</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub.conf file should be owned by the root user. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf</ns3:description>
<ns3:reference ref_id="file_user_owner_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion test_ref="oval:ssg-test_file_user_owner_grub_conf:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_file_user_owner_efi_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_configure_firewall:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure the Firewall to Protect the FTP Server</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure the FTP connection tracking module
in iptables.</ns3:description>
<ns3:reference ref_id="ftp_configure_firewall" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Configure FTP firewall" test_ref="oval:ssg-test_ftp_configure_firewall:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_disable_uploads:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable FTP Uploads</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable FTP Uploads.</ns3:description>
<ns3:reference ref_id="ftp_disable_uploads" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Disable uploads" test_ref="oval:ssg-test_ftp_disable_uploads:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_limit_users:def:1" version="1">
<ns3:metadata>
<ns3:title>Limit Users Allowed to Access FTP</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Only authorized users should be able to access FTP.</ns3:description>
<ns3:reference ref_id="ftp_limit_users" source="ssg" /></ns3:metadata>
<ns3:criteria comment="FTP is not being used or the conditions are met" operator="OR">
<ns3:extend_definition comment="vsftp package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criteria comment="FTP configuration conditions are not set or are met" operator="AND">
<ns3:criterion comment="Enable ftp user list" test_ref="oval:ssg-test_ftp_user_list_enable:tst:1" />
<ns3:criterion comment="Set ftp user list file" test_ref="oval:ssg-test_ftp_user_list_file:tst:1" />
<ns3:criterion comment="Use ftp user list" test_ref="oval:ssg-test_ftp_user_list_deny:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_restrict_to_anon:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Anonymous Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable anonymous access to FTP.</ns3:description>
<ns3:reference ref_id="ftp_restrict_to_anon" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Disable anonymous access" test_ref="oval:ssg-test_ftp_restrict_to_anon:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_disable_user_list:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the User List</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GUI listing of all known users on the login screen.</ns3:description>
<ns3:reference ref_id="gconf_gdm_disable_user_list" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check etc settings tree" test_ref="oval:ssg-test_tree_gconf_gdm_disable_user_list:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_disable_user_list:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_enable_warning_gui_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable GUI Warning Banner</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable the GUI warning banner.</ns3:description>
<ns3:reference ref_id="gconf_gdm_enable_warning_gui_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check var settings" test_ref="oval:ssg-test_gconf_gdm_enable_warning_gui_banner:tst:1" />
<ns3:criterion comment="check etc settings tree" test_ref="oval:ssg-test_tree_gconf_gdm_enable_warning_gui_banner:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_enable_warning_gui_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_set_login_banner_text:def:1" version="1">
<ns3:metadata>
<ns3:title>Set GUI Warning Banner Text</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The text to be displayed in the GUI warning banner should be set correctly.</ns3:description>
<ns3:reference ref_id="gconf_gdm_set_login_banner_text" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check var settings" test_ref="oval:ssg-test_gconf_gdm_set_login_banner_text:tst:1" />
<ns3:criterion comment="check etc settings with tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_set_login_banner_text:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_tree_gconf_gdm_set_login_banner_text:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_automount:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable GNOME Automounting</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system's default desktop environment, GNOME, will mount
devices and removable media (such as DVDs, CDs and USB flash drives)
whenever they are inserted into the system. Disable automount and autorun
within GNOME.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_automount" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Disable automount in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_automount:tst:1" />
<ns3:criterion comment="Disable automount in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_automount:tst:1" />
<ns3:criterion comment="Disable autorun in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_automount_autorun:tst:1" />
<ns3:criterion comment="Disable autorun in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_automount_autorun:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_clock_temperature:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Clock Temperature Feature</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The GNOME clock temperature feature should be disabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_clock_temperature" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="temperature is disabled" test_ref="oval:ssg-test_disable_clock_temperature:tst:1" />
<ns3:criterion comment="temperature is disabled" test_ref="oval:ssg-test_gconf_tree_disable_clock_temperature:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_clock_weather:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Clock Weather Feature</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The GNOME clock weather feature should be disabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_clock_weather" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="weather is disabled" test_ref="oval:ssg-test_disable_clock_weather:tst:1" />
<ns3:criterion comment="weather is disabled" test_ref="oval:ssg-test_gconf_tree_disable_clock_weather:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_ctrlaltdel_reboot:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The Ctrl-Alt-Del reboot key sequence should be set to nothing.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_ctrlaltdel_reboot" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="set Ctrl-Alt-Del key sequence to nothing" test_ref="oval:ssg-test_gnome_disable_ctrlaltdel_reboot:tst:1" />
<ns3:criterion comment="set Ctrl-Alt-Del key sequence to nothing" test_ref="oval:ssg-test_gconf_tree_gnome_disable_ctrlaltdel_reboot:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_restart_shutdown:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Login Restart and Shutdown Buttons</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME Login restart and shutdown buttons to prevent
users from restarting or powering off the system from the login screen.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_restart_shutdown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="disable restart/shutdown buttons" test_ref="oval:ssg-test_disable_restart_shutdown:tst:1" />
<ns3:criterion comment="disable restart/shutdown buttons" test_ref="oval:ssg-test_gconf_tree_disable_restart_shutdown:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_thumbnailers:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable All GNOME Thumbnailers</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system's default desktop environment, GNOME, uses a
number of different thumbnailer programs to generate thumbnails for any
new or modified content in an opened folder. Disable the execution of
these thumbnail applications within GNOME.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_thumbnailers" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Disable thumbnailers in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_thumbnailers:tst:1" />
<ns3:criterion comment="Disable thumbnailers in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_thumbnailers:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_create:def:1" version="1">
<ns3:metadata>
<ns3:title>>Disable WIFI Network Connection Creation in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to create a wifi connection.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_create" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="wifi creation is disabled" test_ref="oval:ssg-test_disable_wifi_create:tst:1" />
<ns3:criterion comment="wifi creation is disabled" test_ref="oval:ssg-test_gconf_tree_disable_wifi_create:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_disconnect:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable WIFI Network Disconnect Notification in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to notify users when disconnecting
from a wifi network.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_disconnect" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="disable wifi disconnect" test_ref="oval:ssg-test_disable_wifi_disconnect:tst:1" />
<ns3:criterion comment="disable wifi disconnect" test_ref="oval:ssg-test_gconf_tree_disable_wifi_disconnect:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_notification:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable WIFI Network Connection Notification in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to notify users when connecting
to a wifi network.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_notification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="wifi connection notification is disabled" test_ref="oval:ssg-test_disable_wifi_notification:tst:1" />
<ns3:criterion comment="wifi connection notification is disabled" test_ref="oval:ssg-test_gconf_tree_disable_wifi_notification:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_idle_activation_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement idle activation of screen saver</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle activation of the screen saver should be
enabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_idle_activation_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="gnome screensaver is activated on idle" test_ref="oval:ssg-test_gnome_screensaver_idle_activated:tst:1" />
<ns3:criterion comment="gnome screensaver is activated on idle" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_idle_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_idle_delay:def:1" version="2">
<ns3:metadata>
<ns3:title>Configure GUI Screen Locking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The allowed period of inactivity before the screensaver is
activated.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_idle_delay" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="check value of idle_delay in GCONF" test_ref="oval:ssg-test_gnome_screensaver_idle_delay:tst:1" />
<ns3:criterion comment="check value of idle_delay in GCONF" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_idle_delay:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_lock_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement idle activation of screen lock</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle activation of the screen lock should be
enabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_lock_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="screensaver lock is enabled" test_ref="oval:ssg-test_screensaver_lock_enabled:tst:1" />
<ns3:criterion comment="screensaver lock is enabled" test_ref="oval:ssg-test_gconf_tree_screensaver_lock_enabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_max_idle_action:def:1" version="1">
<ns3:metadata>
<ns3:title>Set GNOME Login Maximum Allowed Inactivity Action</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle GNOME users should be logged off after a defined
period of time.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_max_idle_action" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Force log off users" test_ref="oval:ssg-test_gnome_screensaver_max_idle_action:tst:1" />
<ns3:criterion comment="Force log off users" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_max_idle_time:def:1" version="2">
<ns3:metadata>
<ns3:title>Set GNOME Login Maximum Allowed Inactivity</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The allowed period of inactivity before a user is logged
off the system.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_max_idle_time" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="check value of max_idle_time in GCONF" test_ref="oval:ssg-test_gnome_screensaver_max_idle_time:tst:1" />
<ns3:criterion comment="check value of max_idle_time in GCONF" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_time:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_mode_blank:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement blank screen saver</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The screen saver should be blank.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_mode_blank" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="gnome screensaver set to blank screen" test_ref="oval:ssg-test_gnome_screensaver_mode:tst:1" />
<ns3:criterion comment="gnome screensaver set to blank screen" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-grub_enable_fips_mode:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable FIPS Mode in GRUB</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument fips=1 in the kernel line in /etc/grub.conf.</ns3:description>
<ns3:reference ref_id="grub_enable_fips_mode" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="prelink disabled" definition_ref="oval:ssg-disable_prelink:def:1" />
<ns3:extend_definition comment="package dracut-fips installed" definition_ref="oval:ssg-package_dracut-fips_installed:def:1" />
<ns3:criterion comment="check for fips=1 in /etc/grub.conf" test_ref="oval:ssg-test_grub_enable_fips_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-iptables_sshd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disallow inbound firewall access to the SSH Server port.</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>If inbound SSH access is not needed, the firewall should disallow or reject access to
the SSH port (22).</ns3:description>
<ns3:reference ref_id="iptables_sshd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test ipv4 port 22 Deny" test_ref="oval:ssg-test_iptables_sshd_disabled_ipv4:tst:1" />
<ns3:criterion comment="Test ipv6 port 22 Deny" test_ref="oval:ssg-test_iptables_sshd_disabled_ipv6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_disable_entropy_contribution_for_solid_state_drives:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure solid-state drives (SSDs) not to contribute to random-number entropy pool</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The add_random sysfs variable should be set correctly for each SSD drive on the system.</ns3:description>
<ns3:reference ref_id="kernel_disable_entropy_contribution_for_solid_state_drives" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check add_random sysfs variable set to '0' for each SSD drive. Fail if not" test_ref="oval:ssg-test_kernel_disable_entropy_contribution_for_solid_state_drives:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_bluetooth_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable bluetooth Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module bluetooth should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_bluetooth_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module bluetooth disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_bluetooth_disabled:tst:1" />
<ns3:criterion comment="kernel module bluetooth disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_cramfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable cramfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module cramfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_cramfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module cramfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_cramfs_disabled:tst:1" />
<ns3:criterion comment="kernel module cramfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_dccp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable dccp Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module dccp should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_dccp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module dccp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_dccp_disabled:tst:1" />
<ns3:criterion comment="kernel module dccp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_freevxfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable freevxfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module freevxfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_freevxfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module freevxfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_freevxfs_disabled:tst:1" />
<ns3:criterion comment="kernel module freevxfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_hfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable hfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module hfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_hfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module hfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfs_disabled:tst:1" />
<ns3:criterion comment="kernel module hfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_hfsplus_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable hfsplus Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module hfsplus should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_hfsplus_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module hfsplus disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfsplus_disabled:tst:1" />
<ns3:criterion comment="kernel module hfsplus disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_ipv6_option_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable IPv6 Kernel Module Functionality via Disable Option</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The disable option will allow the IPv6 module to be inserted, but prevent address assignment and activation of the network stack.</ns3:description>
<ns3:reference ref_id="kernel_module_ipv6_option_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="ipv6 disabled any modprobe conf file" test_ref="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_jffs2_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable jffs2 Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module jffs2 should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_jffs2_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module jffs2 disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_jffs2_disabled:tst:1" />
<ns3:criterion comment="kernel module jffs2 disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_rds_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable rds Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module rds should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_rds_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module rds disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_rds_disabled:tst:1" />
<ns3:criterion comment="kernel module rds disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_rds_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_sctp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable sctp Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module sctp should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_sctp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module sctp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_sctp_disabled:tst:1" />
<ns3:criterion comment="kernel module sctp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_squashfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable squashfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module squashfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_squashfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module squashfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_squashfs_disabled:tst:1" />
<ns3:criterion comment="kernel module squashfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_tipc_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable tipc Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module tipc should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_tipc_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module tipc disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_tipc_disabled:tst:1" />
<ns3:criterion comment="kernel module tipc disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_tipc_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_udf_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable udf Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module udf should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_udf_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module udf disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_udf_disabled:tst:1" />
<ns3:criterion comment="kernel module udf disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_udf_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_usb-storage_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable usb-storage Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module usb-storage should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_usb-storage_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module usb-storage disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_usb-storage_disabled:tst:1" />
<ns3:criterion comment="kernel module usb-storage disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ldap_client_start_tls:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure LDAP to Use TLS for All Transactions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require the use of TLS for ldap clients.</ns3:description>
<ns3:reference ref_id="ldap_client_start_tls" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pam_ldap is not present" operator="OR">
<ns3:extend_definition comment="pam_ldap not present or not in use" definition_ref="oval:ssg-package_pam_ldap_removed:def:1" />
<ns3:criterion comment="look for ssl start_tls in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_start_tls_ssl:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ldap_client_tls_cacertpath:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure LDAP CA Certificate Path</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require the use of TLS for ldap clients.</ns3:description>
<ns3:reference ref_id="ldap_client_tls_cacertpath" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pam_ldap is not present" operator="OR">
<ns3:extend_definition comment="pam_ldap not present or in use" definition_ref="oval:ssg-package_pam_ldap_removed:def:1" />
<ns3:criterion comment="look for tls_cacertdir in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_tls_cacertdir:tst:1" />
<ns3:criterion comment="look for tls_cacertfile in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_tls_cacertfile:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_default_gateway:def:1" version="1">
<ns3:metadata>
<ns3:title>Manually Assign IPv6 Router Address</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Define default gateways for IPv6 traffic</ns3:description>
<ns3:reference ref_id="network_ipv6_default_gateway" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Define default gateways" test_ref="oval:ssg-test_network_ipv6_default_gateway:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_privacy_extensions:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable Privacy Extensions for IPv6</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable privacy extensions for IPv6</ns3:description>
<ns3:reference ref_id="network_ipv6_privacy_extensions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Enable privacy extensions per interface" test_ref="oval:ssg-test_network_ipv6_privacy_extensions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_static_address:def:1" version="1">
<ns3:metadata>
<ns3:title>Manually Assign Global IPv6 Address</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Manually configure addresses for IPv6</ns3:description>
<ns3:reference ref_id="network_ipv6_static_address" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Set static IPv6 address on each interface" test_ref="oval:ssg-test_network_ipv6_static_address:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ntpd_specify_multiple_servers:def:1" version="2">
<ns3:metadata>
<ns3:title>Specify Multiple Remote ntpd NTP Server for Time Data</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Multiple ntpd NTP Servers for time synchronization should be specified.</ns3:description>
<ns3:reference ref_id="ntpd_specify_multiple_servers" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ntp.conf conditions are met">
<ns3:criterion test_ref="oval:ssg-test_ntpd_multiple_servers:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ntpd_specify_remote_server:def:1" version="2">
<ns3:metadata>
<ns3:title>Specify a Remote ntpd NTP Server for Time Data</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>A remote ntpd NTP Server for time synchronization should be
specified (and dependencies are met)</ns3:description>
<ns3:reference ref_id="ntpd_specify_remote_server" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ntp.conf conditions are met">
<ns3:criterion test_ref="oval:ssg-test_ntp_remote_server:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_GConf2_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package GConf2 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package GConf2 should be installed.</ns3:description>
<ns3:reference ref_id="package_GConf2_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package GConf2 is installed" test_ref="oval:ssg-test_package_GConf2_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_abrt_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package abrt Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package abrt should be removed.</ns3:description>
<ns3:reference ref_id="package_abrt_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package abrt is removed" test_ref="oval:ssg-test_package_abrt_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_at_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package at Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package at should be removed.</ns3:description>
<ns3:reference ref_id="package_at_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package at is removed" test_ref="oval:ssg-test_package_at_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_autofs_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package autofs Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package autofs should be removed.</ns3:description>
<ns3:reference ref_id="package_autofs_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package autofs is removed" test_ref="oval:ssg-test_package_autofs_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_avahi_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package avahi Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package avahi should be installed.</ns3:description>
<ns3:reference ref_id="package_avahi_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package avahi is installed" test_ref="oval:ssg-test_package_avahi_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_bluez_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package bluez Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package bluez should be removed.</ns3:description>
<ns3:reference ref_id="package_bluez_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package bluez is removed" test_ref="oval:ssg-test_package_bluez_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cpuspeed_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cpuspeed Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cpuspeed should be removed.</ns3:description>
<ns3:reference ref_id="package_cpuspeed_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cpuspeed is removed" test_ref="oval:ssg-test_package_cpuspeed_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cronie_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cronie Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cronie should be installed.</ns3:description>
<ns3:reference ref_id="package_cronie_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cronie is installed" test_ref="oval:ssg-test_package_cronie_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cups_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cups Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cups should be removed.</ns3:description>
<ns3:reference ref_id="package_cups_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cups is removed" test_ref="oval:ssg-test_package_cups_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cyrus-sasl_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cyrus-sasl Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cyrus-sasl should be removed.</ns3:description>
<ns3:reference ref_id="package_cyrus-sasl_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cyrus-sasl is removed" test_ref="oval:ssg-test_package_cyrus-sasl_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dbus_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dbus Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dbus should be removed.</ns3:description>
<ns3:reference ref_id="package_dbus_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dbus is removed" test_ref="oval:ssg-test_package_dbus_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_esc_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package esc Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package esc should be installed.</ns3:description>
<ns3:reference ref_id="package_esc_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package esc is installed" test_ref="oval:ssg-test_package_esc_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_gdm_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package gdm Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package gdm should be installed.</ns3:description>
<ns3:reference ref_id="package_gdm_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package gdm is installed" test_ref="oval:ssg-test_package_gdm_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_hal_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package hal Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package hal should be removed.</ns3:description>
<ns3:reference ref_id="package_hal_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package hal is removed" test_ref="oval:ssg-test_package_hal_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iptables-ipv6_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iptables-ipv6 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iptables-ipv6 should be installed.</ns3:description>
<ns3:reference ref_id="package_iptables-ipv6_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iptables-ipv6 is installed" test_ref="oval:ssg-test_package_iptables-ipv6_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iptables_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iptables Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iptables should be installed.</ns3:description>
<ns3:reference ref_id="package_iptables_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iptables is installed" test_ref="oval:ssg-test_package_iptables_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iputils_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iputils Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iputils should be removed.</ns3:description>
<ns3:reference ref_id="package_iputils_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iputils is removed" test_ref="oval:ssg-test_package_iputils_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_irqbalance_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package irqbalance Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package irqbalance should be installed.</ns3:description>
<ns3:reference ref_id="package_irqbalance_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package irqbalance is installed" test_ref="oval:ssg-test_package_irqbalance_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_kexec-tools_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package kexec-tools Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package kexec-tools should be removed.</ns3:description>
<ns3:reference ref_id="package_kexec-tools_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package kexec-tools is removed" test_ref="oval:ssg-test_package_kexec-tools_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_libcgroup_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package libcgroup Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package libcgroup should be removed.</ns3:description>
<ns3:reference ref_id="package_libcgroup_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package libcgroup is removed" test_ref="oval:ssg-test_package_libcgroup_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_mdadm_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package mdadm Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package mdadm should be removed.</ns3:description>
<ns3:reference ref_id="package_mdadm_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package mdadm is removed" test_ref="oval:ssg-test_package_mdadm_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_nfs-utils_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package nfs-utils Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package nfs-utils should be removed.</ns3:description>
<ns3:reference ref_id="package_nfs-utils_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package nfs-utils is removed" test_ref="oval:ssg-test_package_nfs-utils_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ntpdate_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ntpdate Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ntpdate should be removed.</ns3:description>
<ns3:reference ref_id="package_ntpdate_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ntpdate is removed" test_ref="oval:ssg-test_package_ntpdate_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_oddjob_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package oddjob Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package oddjob should be removed.</ns3:description>
<ns3:reference ref_id="package_oddjob_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package oddjob is removed" test_ref="oval:ssg-test_package_oddjob_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openswan_installed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package openswan / libreswan Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openswan / libreswan should be installed.</ns3:description>
<ns3:reference ref_id="package_openswan_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openswan is installed" test_ref="oval:ssg-test_package_openswan_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pam_ldap_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pam_ldap Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pam_ldap should be removed.</ns3:description>
<ns3:reference ref_id="package_pam_ldap_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pam_ldap is removed" test_ref="oval:ssg-test_package_pam_ldap_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pam_pkcs11_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pam_pkcs11 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pam_pkcs11 should be installed.</ns3:description>
<ns3:reference ref_id="package_pam_pkcs11_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pam_pkcs11 is installed" test_ref="oval:ssg-test_package_pam_pkcs11_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pcsc-lite_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pcsc-lite Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pcsc-lite should be installed.</ns3:description>
<ns3:reference ref_id="package_pcsc-lite_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pcsc-lite is installed" test_ref="oval:ssg-test_package_pcsc-lite_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_policycoreutils_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package policycoreutils Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package policycoreutils should be installed.</ns3:description>
<ns3:reference ref_id="package_policycoreutils_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package policycoreutils is installed" test_ref="oval:ssg-test_package_policycoreutils_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_portreserve_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package portreserve Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package portreserve should be removed.</ns3:description>
<ns3:reference ref_id="package_portreserve_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package portreserve is removed" test_ref="oval:ssg-test_package_portreserve_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_postfix_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package postfix Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package postfix should be installed.</ns3:description>
<ns3:reference ref_id="package_postfix_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package postfix is installed" test_ref="oval:ssg-test_package_postfix_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_psacct_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package psacct Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package psacct should be installed.</ns3:description>
<ns3:reference ref_id="package_psacct_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package psacct is installed" test_ref="oval:ssg-test_package_psacct_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_qpid-cpp-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package qpid-cpp-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package qpid-cpp-server should be removed.</ns3:description>
<ns3:reference ref_id="package_qpid-cpp-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package qpid-cpp-server is removed" test_ref="oval:ssg-test_package_qpid-cpp-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_quota_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package quota Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package quota should be removed.</ns3:description>
<ns3:reference ref_id="package_quota_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package quota is removed" test_ref="oval:ssg-test_package_quota_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rhnsd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rhnsd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rhnsd should be removed.</ns3:description>
<ns3:reference ref_id="package_rhnsd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rhnsd is removed" test_ref="oval:ssg-test_package_rhnsd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rpcbind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rpcbind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rpcbind should be removed.</ns3:description>
<ns3:reference ref_id="package_rpcbind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rpcbind is removed" test_ref="oval:ssg-test_package_rpcbind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba should be removed.</ns3:description>
<ns3:reference ref_id="package_samba_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba is removed" test_ref="oval:ssg-test_package_samba_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_smartmontools_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package smartmontools Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package smartmontools should be removed.</ns3:description>
<ns3:reference ref_id="package_smartmontools_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package smartmontools is removed" test_ref="oval:ssg-test_package_smartmontools_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_subscription-manager_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package subscription-manager Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package subscription-manager should be removed.</ns3:description>
<ns3:reference ref_id="package_subscription-manager_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package subscription-manager is removed" test_ref="oval:ssg-test_package_subscription-manager_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_sysstat_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package sysstat Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package sysstat should be removed.</ns3:description>
<ns3:reference ref_id="package_sysstat_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package sysstat is removed" test_ref="oval:ssg-test_package_sysstat_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_xorg-x11-server-common_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package xorg-x11-server-common Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package xorg-x11-server-common should be removed.</ns3:description>
<ns3:reference ref_id="package_xorg-x11-server-common_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package xorg-x11-server-common is removed" test_ref="oval:ssg-test_package_xorg-x11-server-common_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-postfix_network_listening_disabled:def:1" version="2">
<ns3:metadata>
<ns3:title>Postfix network listening should be disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Postfix network listening should be disabled</ns3:description>
<ns3:reference ref_id="postfix_network_listening_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Postfix installed and configured to start" definition_ref="oval:ssg-service_postfix_enabled:def:1" negate="true" />
<ns3:criterion comment="Check inet_interfaces in /etc/postfix/main.cf" test_ref="oval:ssg-test_postfix_network_listening_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-require_singleuser_auth:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Authentication for Single-User Mode</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The requirement for a password to boot into single-user mode
should be configured correctly.</ns3:description>
<ns3:reference ref_id="require_singleuser_auth" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions are satisfied" test_ref="oval:ssg-test_require_singleuser_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_abrtd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service abrtd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The abrtd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_abrtd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package abrt removed or service abrtd is not configured to start" operator="OR">
<ns3:extend_definition comment="abrt removed" definition_ref="oval:ssg-package_abrt_removed:def:1" />
<ns3:criteria comment="service abrtd is not configured to start" operator="AND">
<ns3:criterion comment="abrtd runlevel 0" test_ref="oval:ssg-test_runlevel0_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 1" test_ref="oval:ssg-test_runlevel1_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 2" test_ref="oval:ssg-test_runlevel2_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 3" test_ref="oval:ssg-test_runlevel3_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 4" test_ref="oval:ssg-test_runlevel4_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 5" test_ref="oval:ssg-test_runlevel5_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 6" test_ref="oval:ssg-test_runlevel6_abrtd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_acpid_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service acpid Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The acpid service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_acpid_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service acpid is not configured to start" operator="AND">
<ns3:criterion comment="acpid runlevel 0" test_ref="oval:ssg-test_runlevel0_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 1" test_ref="oval:ssg-test_runlevel1_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 2" test_ref="oval:ssg-test_runlevel2_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 3" test_ref="oval:ssg-test_runlevel3_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 4" test_ref="oval:ssg-test_runlevel4_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 5" test_ref="oval:ssg-test_runlevel5_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 6" test_ref="oval:ssg-test_runlevel6_acpid:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_atd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service atd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The atd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_atd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package at removed or service atd is not configured to start" operator="OR">
<ns3:extend_definition comment="at removed" definition_ref="oval:ssg-package_at_removed:def:1" />
<ns3:criteria comment="service atd is not configured to start" operator="AND">
<ns3:criterion comment="atd runlevel 0" test_ref="oval:ssg-test_runlevel0_atd:tst:1" />
<ns3:criterion comment="atd runlevel 1" test_ref="oval:ssg-test_runlevel1_atd:tst:1" />
<ns3:criterion comment="atd runlevel 2" test_ref="oval:ssg-test_runlevel2_atd:tst:1" />
<ns3:criterion comment="atd runlevel 3" test_ref="oval:ssg-test_runlevel3_atd:tst:1" />
<ns3:criterion comment="atd runlevel 4" test_ref="oval:ssg-test_runlevel4_atd:tst:1" />
<ns3:criterion comment="atd runlevel 5" test_ref="oval:ssg-test_runlevel5_atd:tst:1" />
<ns3:criterion comment="atd runlevel 6" test_ref="oval:ssg-test_runlevel6_atd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_auditd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service auditd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The auditd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_auditd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package audit installed and service auditd is configured to start" operator="AND">
<ns3:extend_definition comment="audit installed" definition_ref="oval:ssg-package_audit_installed:def:1" />
<ns3:criteria comment="service auditd is configured to start" operator="OR">
<ns3:criterion comment="auditd runlevel 0" test_ref="oval:ssg-test_runlevel0_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 1" test_ref="oval:ssg-test_runlevel1_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 2" test_ref="oval:ssg-test_runlevel2_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 3" test_ref="oval:ssg-test_runlevel3_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 4" test_ref="oval:ssg-test_runlevel4_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 5" test_ref="oval:ssg-test_runlevel5_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 6" test_ref="oval:ssg-test_runlevel6_auditd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_autofs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service autofs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The autofs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_autofs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package autofs removed or service autofs is not configured to start" operator="OR">
<ns3:extend_definition comment="autofs removed" definition_ref="oval:ssg-package_autofs_removed:def:1" />
<ns3:criteria comment="service autofs is not configured to start" operator="AND">
<ns3:criterion comment="autofs runlevel 0" test_ref="oval:ssg-test_runlevel0_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 1" test_ref="oval:ssg-test_runlevel1_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 2" test_ref="oval:ssg-test_runlevel2_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 3" test_ref="oval:ssg-test_runlevel3_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 4" test_ref="oval:ssg-test_runlevel4_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 5" test_ref="oval:ssg-test_runlevel5_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 6" test_ref="oval:ssg-test_runlevel6_autofs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_avahi-daemon_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service avahi-daemon Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The avahi-daemon service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_avahi-daemon_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service avahi-daemon is not configured to start" operator="AND">
<ns3:criterion comment="avahi-daemon runlevel 0" test_ref="oval:ssg-test_runlevel0_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 1" test_ref="oval:ssg-test_runlevel1_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 2" test_ref="oval:ssg-test_runlevel2_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 3" test_ref="oval:ssg-test_runlevel3_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 4" test_ref="oval:ssg-test_runlevel4_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 5" test_ref="oval:ssg-test_runlevel5_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 6" test_ref="oval:ssg-test_runlevel6_avahi-daemon:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_bluetooth_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service bluetooth Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The bluetooth service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_bluetooth_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="rpm package bluez removed" definition_ref="oval:ssg-package_bluez_removed:def:1" />
<ns3:criteria comment="service bluetooth is not configured to start" operator="AND">
<ns3:criterion comment="bluetooth runlevel 0" test_ref="oval:ssg-test_runlevel0_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 1" test_ref="oval:ssg-test_runlevel1_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 2" test_ref="oval:ssg-test_runlevel2_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 3" test_ref="oval:ssg-test_runlevel3_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 4" test_ref="oval:ssg-test_runlevel4_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 5" test_ref="oval:ssg-test_runlevel5_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 6" test_ref="oval:ssg-test_runlevel6_bluetooth:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_certmonger_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service certmonger Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The certmonger service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_certmonger_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service certmonger is not configured to start" operator="AND">
<ns3:criterion comment="certmonger runlevel 0" test_ref="oval:ssg-test_runlevel0_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 1" test_ref="oval:ssg-test_runlevel1_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 2" test_ref="oval:ssg-test_runlevel2_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 3" test_ref="oval:ssg-test_runlevel3_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 4" test_ref="oval:ssg-test_runlevel4_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 5" test_ref="oval:ssg-test_runlevel5_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 6" test_ref="oval:ssg-test_runlevel6_certmonger:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cgconfig_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cgconfig Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cgconfig service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cgconfig_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package libcgroup removed or service cgconfig is not configured to start" operator="OR">
<ns3:extend_definition comment="libcgroup removed" definition_ref="oval:ssg-package_libcgroup_removed:def:1" />
<ns3:criteria comment="service cgconfig is not configured to start" operator="AND">
<ns3:criterion comment="cgconfig runlevel 0" test_ref="oval:ssg-test_runlevel0_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 1" test_ref="oval:ssg-test_runlevel1_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 2" test_ref="oval:ssg-test_runlevel2_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 3" test_ref="oval:ssg-test_runlevel3_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 4" test_ref="oval:ssg-test_runlevel4_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 5" test_ref="oval:ssg-test_runlevel5_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 6" test_ref="oval:ssg-test_runlevel6_cgconfig:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cgred_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cgred Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cgred service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cgred_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service cgred is not configured to start" operator="AND">
<ns3:criterion comment="cgred runlevel 0" test_ref="oval:ssg-test_runlevel0_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 1" test_ref="oval:ssg-test_runlevel1_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 2" test_ref="oval:ssg-test_runlevel2_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 3" test_ref="oval:ssg-test_runlevel3_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 4" test_ref="oval:ssg-test_runlevel4_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 5" test_ref="oval:ssg-test_runlevel5_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 6" test_ref="oval:ssg-test_runlevel6_cgred:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cpuspeed_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cpuspeed Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cpuspeed service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cpuspeed_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cpuspeed removed or service cpuspeed is not configured to start" operator="OR">
<ns3:extend_definition comment="cpuspeed removed" definition_ref="oval:ssg-package_cpuspeed_removed:def:1" />
<ns3:criteria comment="service cpuspeed is not configured to start" operator="AND">
<ns3:criterion comment="cpuspeed runlevel 0" test_ref="oval:ssg-test_runlevel0_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 1" test_ref="oval:ssg-test_runlevel1_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 2" test_ref="oval:ssg-test_runlevel2_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 3" test_ref="oval:ssg-test_runlevel3_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 4" test_ref="oval:ssg-test_runlevel4_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 5" test_ref="oval:ssg-test_runlevel5_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 6" test_ref="oval:ssg-test_runlevel6_cpuspeed:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_crond_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service crond Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The crond service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_crond_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cronie installed and service crond is configured to start" operator="AND">
<ns3:extend_definition comment="cronie installed" definition_ref="oval:ssg-package_cronie_installed:def:1" />
<ns3:criteria comment="service crond is configured to start" operator="OR">
<ns3:criterion comment="crond runlevel 0" test_ref="oval:ssg-test_runlevel0_crond:tst:1" />
<ns3:criterion comment="crond runlevel 1" test_ref="oval:ssg-test_runlevel1_crond:tst:1" />
<ns3:criterion comment="crond runlevel 2" test_ref="oval:ssg-test_runlevel2_crond:tst:1" />
<ns3:criterion comment="crond runlevel 3" test_ref="oval:ssg-test_runlevel3_crond:tst:1" />
<ns3:criterion comment="crond runlevel 4" test_ref="oval:ssg-test_runlevel4_crond:tst:1" />
<ns3:criterion comment="crond runlevel 5" test_ref="oval:ssg-test_runlevel5_crond:tst:1" />
<ns3:criterion comment="crond runlevel 6" test_ref="oval:ssg-test_runlevel6_crond:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cups_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cups Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cups service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cups_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cups removed or service cups is not configured to start" operator="OR">
<ns3:extend_definition comment="cups removed" definition_ref="oval:ssg-package_cups_removed:def:1" />
<ns3:criteria comment="service cups is not configured to start" operator="AND">
<ns3:criterion comment="cups runlevel 0" test_ref="oval:ssg-test_runlevel0_cups:tst:1" />
<ns3:criterion comment="cups runlevel 1" test_ref="oval:ssg-test_runlevel1_cups:tst:1" />
<ns3:criterion comment="cups runlevel 2" test_ref="oval:ssg-test_runlevel2_cups:tst:1" />
<ns3:criterion comment="cups runlevel 3" test_ref="oval:ssg-test_runlevel3_cups:tst:1" />
<ns3:criterion comment="cups runlevel 4" test_ref="oval:ssg-test_runlevel4_cups:tst:1" />
<ns3:criterion comment="cups runlevel 5" test_ref="oval:ssg-test_runlevel5_cups:tst:1" />
<ns3:criterion comment="cups runlevel 6" test_ref="oval:ssg-test_runlevel6_cups:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_dhcpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service dhcpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The dhcpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_dhcpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dhcp removed or service dhcpd is not configured to start" operator="OR">
<ns3:extend_definition comment="dhcp removed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="service dhcpd is not configured to start" operator="AND">
<ns3:criterion comment="dhcpd runlevel 0" test_ref="oval:ssg-test_runlevel0_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 1" test_ref="oval:ssg-test_runlevel1_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 2" test_ref="oval:ssg-test_runlevel2_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 3" test_ref="oval:ssg-test_runlevel3_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 4" test_ref="oval:ssg-test_runlevel4_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 5" test_ref="oval:ssg-test_runlevel5_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 6" test_ref="oval:ssg-test_runlevel6_dhcpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_dovecot_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service dovecot Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The dovecot service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_dovecot_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dovecot removed or service dovecot is not configured to start" operator="OR">
<ns3:extend_definition comment="dovecot removed" definition_ref="oval:ssg-package_dovecot_removed:def:1" />
<ns3:criteria comment="service dovecot is not configured to start" operator="AND">
<ns3:criterion comment="dovecot runlevel 0" test_ref="oval:ssg-test_runlevel0_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 1" test_ref="oval:ssg-test_runlevel1_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 2" test_ref="oval:ssg-test_runlevel2_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 3" test_ref="oval:ssg-test_runlevel3_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 4" test_ref="oval:ssg-test_runlevel4_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 5" test_ref="oval:ssg-test_runlevel5_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 6" test_ref="oval:ssg-test_runlevel6_dovecot:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_haldaemon_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service haldaemon Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The haldaemon service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_haldaemon_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package hal removed or service haldaemon is not configured to start" operator="OR">
<ns3:extend_definition comment="hal removed" definition_ref="oval:ssg-package_hal_removed:def:1" />
<ns3:criteria comment="service haldaemon is not configured to start" operator="AND">
<ns3:criterion comment="haldaemon runlevel 0" test_ref="oval:ssg-test_runlevel0_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 1" test_ref="oval:ssg-test_runlevel1_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 2" test_ref="oval:ssg-test_runlevel2_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 3" test_ref="oval:ssg-test_runlevel3_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 4" test_ref="oval:ssg-test_runlevel4_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 5" test_ref="oval:ssg-test_runlevel5_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 6" test_ref="oval:ssg-test_runlevel6_haldaemon:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_httpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service httpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The httpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_httpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package httpd removed or service httpd is not configured to start" operator="OR">
<ns3:extend_definition comment="httpd removed" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criteria comment="service httpd is not configured to start" operator="AND">
<ns3:criterion comment="httpd runlevel 0" test_ref="oval:ssg-test_runlevel0_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 1" test_ref="oval:ssg-test_runlevel1_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 2" test_ref="oval:ssg-test_runlevel2_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 3" test_ref="oval:ssg-test_runlevel3_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 4" test_ref="oval:ssg-test_runlevel4_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 5" test_ref="oval:ssg-test_runlevel5_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 6" test_ref="oval:ssg-test_runlevel6_httpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ip6tables_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ip6tables Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ip6tables service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_ip6tables_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iptables-ipv6 installed and service ip6tables is configured to start" operator="AND">
<ns3:extend_definition comment="iptables-ipv6 installed" definition_ref="oval:ssg-package_iptables-ipv6_installed:def:1" />
<ns3:criteria comment="service ip6tables is configured to start" operator="OR">
<ns3:criterion comment="ip6tables runlevel 0" test_ref="oval:ssg-test_runlevel0_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 1" test_ref="oval:ssg-test_runlevel1_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 2" test_ref="oval:ssg-test_runlevel2_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 3" test_ref="oval:ssg-test_runlevel3_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 4" test_ref="oval:ssg-test_runlevel4_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 5" test_ref="oval:ssg-test_runlevel5_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 6" test_ref="oval:ssg-test_runlevel6_ip6tables:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_iptables_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service iptables Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The iptables service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_iptables_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iptables installed and service iptables is configured to start" operator="AND">
<ns3:extend_definition comment="iptables installed" definition_ref="oval:ssg-package_iptables_installed:def:1" />
<ns3:criteria comment="service iptables is configured to start" operator="OR">
<ns3:criterion comment="iptables runlevel 0" test_ref="oval:ssg-test_runlevel0_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 1" test_ref="oval:ssg-test_runlevel1_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 2" test_ref="oval:ssg-test_runlevel2_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 3" test_ref="oval:ssg-test_runlevel3_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 4" test_ref="oval:ssg-test_runlevel4_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 5" test_ref="oval:ssg-test_runlevel5_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 6" test_ref="oval:ssg-test_runlevel6_iptables:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_irqbalance_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service irqbalance Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The irqbalance service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_irqbalance_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package irqbalance installed and service irqbalance is configured to start" operator="AND">
<ns3:extend_definition comment="irqbalance installed" definition_ref="oval:ssg-package_irqbalance_installed:def:1" />
<ns3:criteria comment="service irqbalance is configured to start" operator="OR">
<ns3:criterion comment="irqbalance runlevel 0" test_ref="oval:ssg-test_runlevel0_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 1" test_ref="oval:ssg-test_runlevel1_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 2" test_ref="oval:ssg-test_runlevel2_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 3" test_ref="oval:ssg-test_runlevel3_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 4" test_ref="oval:ssg-test_runlevel4_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 5" test_ref="oval:ssg-test_runlevel5_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 6" test_ref="oval:ssg-test_runlevel6_irqbalance:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_kdump_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service kdump Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kdump service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_kdump_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package kexec-tools removed or service kdump is not configured to start" operator="OR">
<ns3:extend_definition comment="kexec-tools removed" definition_ref="oval:ssg-package_kexec-tools_removed:def:1" />
<ns3:criteria comment="service kdump is not configured to start" operator="AND">
<ns3:criterion comment="kdump runlevel 0" test_ref="oval:ssg-test_runlevel0_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 1" test_ref="oval:ssg-test_runlevel1_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 2" test_ref="oval:ssg-test_runlevel2_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 3" test_ref="oval:ssg-test_runlevel3_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 4" test_ref="oval:ssg-test_runlevel4_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 5" test_ref="oval:ssg-test_runlevel5_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 6" test_ref="oval:ssg-test_runlevel6_kdump:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_mdmonitor_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service mdmonitor Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The mdmonitor service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_mdmonitor_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package mdadm removed or service mdmonitor is not configured to start" operator="OR">
<ns3:extend_definition comment="mdadm removed" definition_ref="oval:ssg-package_mdadm_removed:def:1" />
<ns3:criteria comment="service mdmonitor is not configured to start" operator="AND">
<ns3:criterion comment="mdmonitor runlevel 0" test_ref="oval:ssg-test_runlevel0_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 1" test_ref="oval:ssg-test_runlevel1_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 2" test_ref="oval:ssg-test_runlevel2_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 3" test_ref="oval:ssg-test_runlevel3_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 4" test_ref="oval:ssg-test_runlevel4_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 5" test_ref="oval:ssg-test_runlevel5_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 6" test_ref="oval:ssg-test_runlevel6_mdmonitor:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_messagebus_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service messagebus Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The messagebus service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_messagebus_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dbus removed or service messagebus is not configured to start" operator="OR">
<ns3:extend_definition comment="dbus removed" definition_ref="oval:ssg-package_dbus_removed:def:1" />
<ns3:criteria comment="service messagebus is not configured to start" operator="AND">
<ns3:criterion comment="messagebus runlevel 0" test_ref="oval:ssg-test_runlevel0_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 1" test_ref="oval:ssg-test_runlevel1_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 2" test_ref="oval:ssg-test_runlevel2_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 3" test_ref="oval:ssg-test_runlevel3_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 4" test_ref="oval:ssg-test_runlevel4_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 5" test_ref="oval:ssg-test_runlevel5_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 6" test_ref="oval:ssg-test_runlevel6_messagebus:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_named_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service named Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The named service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_named_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package bind removed or service named is not configured to start" operator="OR">
<ns3:extend_definition comment="bind removed" definition_ref="oval:ssg-package_bind_removed:def:1" />
<ns3:criteria comment="service named is not configured to start" operator="AND">
<ns3:criterion comment="named runlevel 0" test_ref="oval:ssg-test_runlevel0_named:tst:1" />
<ns3:criterion comment="named runlevel 1" test_ref="oval:ssg-test_runlevel1_named:tst:1" />
<ns3:criterion comment="named runlevel 2" test_ref="oval:ssg-test_runlevel2_named:tst:1" />
<ns3:criterion comment="named runlevel 3" test_ref="oval:ssg-test_runlevel3_named:tst:1" />
<ns3:criterion comment="named runlevel 4" test_ref="oval:ssg-test_runlevel4_named:tst:1" />
<ns3:criterion comment="named runlevel 5" test_ref="oval:ssg-test_runlevel5_named:tst:1" />
<ns3:criterion comment="named runlevel 6" test_ref="oval:ssg-test_runlevel6_named:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_netconsole_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service netconsole Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The netconsole service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_netconsole_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service netconsole is not configured to start" operator="AND">
<ns3:criterion comment="netconsole runlevel 0" test_ref="oval:ssg-test_runlevel0_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 1" test_ref="oval:ssg-test_runlevel1_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 2" test_ref="oval:ssg-test_runlevel2_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 3" test_ref="oval:ssg-test_runlevel3_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 4" test_ref="oval:ssg-test_runlevel4_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 5" test_ref="oval:ssg-test_runlevel5_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 6" test_ref="oval:ssg-test_runlevel6_netconsole:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_netfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service netfs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The netfs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_netfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service netfs is not configured to start" operator="AND">
<ns3:criterion comment="netfs runlevel 0" test_ref="oval:ssg-test_runlevel0_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 1" test_ref="oval:ssg-test_runlevel1_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 2" test_ref="oval:ssg-test_runlevel2_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 3" test_ref="oval:ssg-test_runlevel3_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 4" test_ref="oval:ssg-test_runlevel4_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 5" test_ref="oval:ssg-test_runlevel5_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 6" test_ref="oval:ssg-test_runlevel6_netfs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_nfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service nfs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nfs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_nfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service nfs is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service nfs is not configured to start" operator="AND">
<ns3:criterion comment="nfs runlevel 0" test_ref="oval:ssg-test_runlevel0_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 1" test_ref="oval:ssg-test_runlevel1_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 2" test_ref="oval:ssg-test_runlevel2_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 3" test_ref="oval:ssg-test_runlevel3_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 4" test_ref="oval:ssg-test_runlevel4_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 5" test_ref="oval:ssg-test_runlevel5_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 6" test_ref="oval:ssg-test_runlevel6_nfs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_nfslock_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service nfslock Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nfslock service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_nfslock_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service nfslock is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service nfslock is not configured to start" operator="AND">
<ns3:criterion comment="nfslock runlevel 0" test_ref="oval:ssg-test_runlevel0_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 1" test_ref="oval:ssg-test_runlevel1_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 2" test_ref="oval:ssg-test_runlevel2_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 3" test_ref="oval:ssg-test_runlevel3_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 4" test_ref="oval:ssg-test_runlevel4_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 5" test_ref="oval:ssg-test_runlevel5_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 6" test_ref="oval:ssg-test_runlevel6_nfslock:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ntpd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ntpd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ntpd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_ntpd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ntp installed and service ntpd is configured to start" operator="AND">
<ns3:extend_definition comment="ntp installed" definition_ref="oval:ssg-package_ntp_installed:def:1" />
<ns3:criteria comment="service ntpd is configured to start" operator="OR">
<ns3:criterion comment="ntpd runlevel 0" test_ref="oval:ssg-test_runlevel0_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 1" test_ref="oval:ssg-test_runlevel1_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 2" test_ref="oval:ssg-test_runlevel2_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 3" test_ref="oval:ssg-test_runlevel3_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 4" test_ref="oval:ssg-test_runlevel4_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 5" test_ref="oval:ssg-test_runlevel5_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 6" test_ref="oval:ssg-test_runlevel6_ntpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ntpdate_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ntpdate Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ntpdate service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_ntpdate_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ntpdate removed or service ntpdate is not configured to start" operator="OR">
<ns3:extend_definition comment="ntpdate removed" definition_ref="oval:ssg-package_ntpdate_removed:def:1" />
<ns3:criteria comment="service ntpdate is not configured to start" operator="AND">
<ns3:criterion comment="ntpdate runlevel 0" test_ref="oval:ssg-test_runlevel0_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 1" test_ref="oval:ssg-test_runlevel1_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 2" test_ref="oval:ssg-test_runlevel2_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 3" test_ref="oval:ssg-test_runlevel3_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 4" test_ref="oval:ssg-test_runlevel4_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 5" test_ref="oval:ssg-test_runlevel5_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 6" test_ref="oval:ssg-test_runlevel6_ntpdate:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_oddjobd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service oddjobd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The oddjobd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_oddjobd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package oddjob removed or service oddjobd is not configured to start" operator="OR">
<ns3:extend_definition comment="oddjob removed" definition_ref="oval:ssg-package_oddjob_removed:def:1" />
<ns3:criteria comment="service oddjobd is not configured to start" operator="AND">
<ns3:criterion comment="oddjobd runlevel 0" test_ref="oval:ssg-test_runlevel0_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 1" test_ref="oval:ssg-test_runlevel1_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 2" test_ref="oval:ssg-test_runlevel2_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 3" test_ref="oval:ssg-test_runlevel3_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 4" test_ref="oval:ssg-test_runlevel4_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 5" test_ref="oval:ssg-test_runlevel5_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 6" test_ref="oval:ssg-test_runlevel6_oddjobd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_pcscd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service pcscd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The pcscd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_pcscd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pcsc-lite installed and service pcscd is configured to start" operator="AND">
<ns3:extend_definition comment="pcsc-lite installed" definition_ref="oval:ssg-package_pcsc-lite_installed:def:1" />
<ns3:criteria comment="service pcscd is configured to start" operator="OR">
<ns3:criterion comment="pcscd runlevel 0" test_ref="oval:ssg-test_runlevel0_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 1" test_ref="oval:ssg-test_runlevel1_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 2" test_ref="oval:ssg-test_runlevel2_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 3" test_ref="oval:ssg-test_runlevel3_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 4" test_ref="oval:ssg-test_runlevel4_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 5" test_ref="oval:ssg-test_runlevel5_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 6" test_ref="oval:ssg-test_runlevel6_pcscd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_portreserve_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service portreserve Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The portreserve service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_portreserve_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package portreserve removed or service portreserve is not configured to start" operator="OR">
<ns3:extend_definition comment="portreserve removed" definition_ref="oval:ssg-package_portreserve_removed:def:1" />
<ns3:criteria comment="service portreserve is not configured to start" operator="AND">
<ns3:criterion comment="portreserve runlevel 0" test_ref="oval:ssg-test_runlevel0_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 1" test_ref="oval:ssg-test_runlevel1_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 2" test_ref="oval:ssg-test_runlevel2_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 3" test_ref="oval:ssg-test_runlevel3_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 4" test_ref="oval:ssg-test_runlevel4_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 5" test_ref="oval:ssg-test_runlevel5_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 6" test_ref="oval:ssg-test_runlevel6_portreserve:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_postfix_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service postfix Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The postfix service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_postfix_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package postfix installed and service postfix is configured to start" operator="AND">
<ns3:extend_definition comment="postfix installed" definition_ref="oval:ssg-package_postfix_installed:def:1" />
<ns3:criteria comment="service postfix is configured to start" operator="OR">
<ns3:criterion comment="postfix runlevel 0" test_ref="oval:ssg-test_runlevel0_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 1" test_ref="oval:ssg-test_runlevel1_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 2" test_ref="oval:ssg-test_runlevel2_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 3" test_ref="oval:ssg-test_runlevel3_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 4" test_ref="oval:ssg-test_runlevel4_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 5" test_ref="oval:ssg-test_runlevel5_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 6" test_ref="oval:ssg-test_runlevel6_postfix:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_psacct_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service psacct Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The psacct service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_psacct_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package psacct installed and service psacct is configured to start" operator="AND">
<ns3:extend_definition comment="psacct installed" definition_ref="oval:ssg-package_psacct_installed:def:1" />
<ns3:criteria comment="service psacct is configured to start" operator="OR">
<ns3:criterion comment="psacct runlevel 0" test_ref="oval:ssg-test_runlevel0_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 1" test_ref="oval:ssg-test_runlevel1_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 2" test_ref="oval:ssg-test_runlevel2_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 3" test_ref="oval:ssg-test_runlevel3_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 4" test_ref="oval:ssg-test_runlevel4_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 5" test_ref="oval:ssg-test_runlevel5_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 6" test_ref="oval:ssg-test_runlevel6_psacct:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_qpidd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service qpidd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The qpidd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_qpidd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package qpid-cpp-server removed or service qpidd is not configured to start" operator="OR">
<ns3:extend_definition comment="qpid-cpp-server removed" definition_ref="oval:ssg-package_qpid-cpp-server_removed:def:1" />
<ns3:criteria comment="service qpidd is not configured to start" operator="AND">
<ns3:criterion comment="qpidd runlevel 0" test_ref="oval:ssg-test_runlevel0_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 1" test_ref="oval:ssg-test_runlevel1_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 2" test_ref="oval:ssg-test_runlevel2_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 3" test_ref="oval:ssg-test_runlevel3_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 4" test_ref="oval:ssg-test_runlevel4_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 5" test_ref="oval:ssg-test_runlevel5_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 6" test_ref="oval:ssg-test_runlevel6_qpidd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_quota_nld_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service quota_nld Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The quota_nld service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_quota_nld_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package quota removed or service quota_nld is not configured to start" operator="OR">
<ns3:extend_definition comment="quota removed" definition_ref="oval:ssg-package_quota_removed:def:1" />
<ns3:criteria comment="service quota_nld is not configured to start" operator="AND">
<ns3:criterion comment="quota_nld runlevel 0" test_ref="oval:ssg-test_runlevel0_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 1" test_ref="oval:ssg-test_runlevel1_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 2" test_ref="oval:ssg-test_runlevel2_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 3" test_ref="oval:ssg-test_runlevel3_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 4" test_ref="oval:ssg-test_runlevel4_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 5" test_ref="oval:ssg-test_runlevel5_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 6" test_ref="oval:ssg-test_runlevel6_quota_nld:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rdisc_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rdisc Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rdisc service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rdisc_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iputils removed or service rdisc is not configured to start" operator="OR">
<ns3:extend_definition comment="iputils removed" definition_ref="oval:ssg-package_iputils_removed:def:1" />
<ns3:criteria comment="service rdisc is not configured to start" operator="AND">
<ns3:criterion comment="rdisc runlevel 0" test_ref="oval:ssg-test_runlevel0_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 1" test_ref="oval:ssg-test_runlevel1_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 2" test_ref="oval:ssg-test_runlevel2_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 3" test_ref="oval:ssg-test_runlevel3_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 4" test_ref="oval:ssg-test_runlevel4_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 5" test_ref="oval:ssg-test_runlevel5_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 6" test_ref="oval:ssg-test_runlevel6_rdisc:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_restorecond_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service restorecond Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The restorecond service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_restorecond_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package policycoreutils installed and service restorecond is configured to start" operator="AND">
<ns3:extend_definition comment="policycoreutils installed" definition_ref="oval:ssg-package_policycoreutils_installed:def:1" />
<ns3:criteria comment="service restorecond is configured to start" operator="OR">
<ns3:criterion comment="restorecond runlevel 0" test_ref="oval:ssg-test_runlevel0_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 1" test_ref="oval:ssg-test_runlevel1_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 2" test_ref="oval:ssg-test_runlevel2_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 3" test_ref="oval:ssg-test_runlevel3_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 4" test_ref="oval:ssg-test_runlevel4_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 5" test_ref="oval:ssg-test_runlevel5_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 6" test_ref="oval:ssg-test_runlevel6_restorecond:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rexec_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rexec Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rexec service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rexec_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rexec is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rexec disabled" test_ref="oval:ssg-test_etc_xinetd_rexec_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rhnsd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rhnsd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rhnsd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rhnsd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rhnsd removed or service rhnsd is not configured to start" operator="OR">
<ns3:extend_definition comment="rhnsd removed" definition_ref="oval:ssg-package_rhnsd_removed:def:1" />
<ns3:criteria comment="service rhnsd is not configured to start" operator="AND">
<ns3:criterion comment="rhnsd runlevel 0" test_ref="oval:ssg-test_runlevel0_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 1" test_ref="oval:ssg-test_runlevel1_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 2" test_ref="oval:ssg-test_runlevel2_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 3" test_ref="oval:ssg-test_runlevel3_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 4" test_ref="oval:ssg-test_runlevel4_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 5" test_ref="oval:ssg-test_runlevel5_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 6" test_ref="oval:ssg-test_runlevel6_rhnsd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rhsmcertd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rhsmcertd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rhsmcertd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rhsmcertd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package subscription-manager removed or service rhsmcertd is not configured to start" operator="OR">
<ns3:extend_definition comment="subscription-manager removed" definition_ref="oval:ssg-package_subscription-manager_removed:def:1" />
<ns3:criteria comment="service rhsmcertd is not configured to start" operator="AND">
<ns3:criterion comment="rhsmcertd runlevel 0" test_ref="oval:ssg-test_runlevel0_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 1" test_ref="oval:ssg-test_runlevel1_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 2" test_ref="oval:ssg-test_runlevel2_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 3" test_ref="oval:ssg-test_runlevel3_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 4" test_ref="oval:ssg-test_runlevel4_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 5" test_ref="oval:ssg-test_runlevel5_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 6" test_ref="oval:ssg-test_runlevel6_rhsmcertd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rlogin_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rlogin Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rlogin service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rlogin_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rlogin is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rlogin disabled" test_ref="oval:ssg-test_etc_xinetd_rlogin_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcbind_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcbind Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcbind service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcbind_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rpcbind removed or service rpcbind is not configured to start" operator="OR">
<ns3:extend_definition comment="rpcbind removed" definition_ref="oval:ssg-package_rpcbind_removed:def:1" />
<ns3:criteria comment="service rpcbind is not configured to start" operator="AND">
<ns3:criterion comment="rpcbind runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcbind:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcgssd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcgssd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcgssd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcgssd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcgssd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcgssd is not configured to start" operator="AND">
<ns3:criterion comment="rpcgssd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcgssd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcidmapd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcidmapd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcidmapd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcidmapd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcidmapd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcidmapd is not configured to start" operator="AND">
<ns3:criterion comment="rpcidmapd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcidmapd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcsvcgssd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcsvcgssd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcsvcgssd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcsvcgssd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcsvcgssd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcsvcgssd is not configured to start" operator="AND">
<ns3:criterion comment="rpcsvcgssd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcsvcgssd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rsh_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rsh Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rsh service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rsh_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rsh is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rsh disabled" test_ref="oval:ssg-test_etc_xinetd_rsh_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rsyslog_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rsyslog Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rsyslog service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_rsyslog_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsyslog installed and service rsyslog is configured to start" operator="AND">
<ns3:extend_definition comment="rsyslog installed" definition_ref="oval:ssg-package_rsyslog_installed:def:1" />
<ns3:criteria comment="service rsyslog is configured to start" operator="OR">
<ns3:criterion comment="rsyslog runlevel 0" test_ref="oval:ssg-test_runlevel0_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 1" test_ref="oval:ssg-test_runlevel1_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 2" test_ref="oval:ssg-test_runlevel2_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 3" test_ref="oval:ssg-test_runlevel3_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 4" test_ref="oval:ssg-test_runlevel4_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 5" test_ref="oval:ssg-test_runlevel5_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 6" test_ref="oval:ssg-test_runlevel6_rsyslog:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_saslauthd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service saslauthd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The saslauthd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_saslauthd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cyrus-sasl removed or service saslauthd is not configured to start" operator="OR">
<ns3:extend_definition comment="cyrus-sasl removed" definition_ref="oval:ssg-package_cyrus-sasl_removed:def:1" />
<ns3:criteria comment="service saslauthd is not configured to start" operator="AND">
<ns3:criterion comment="saslauthd runlevel 0" test_ref="oval:ssg-test_runlevel0_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 1" test_ref="oval:ssg-test_runlevel1_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 2" test_ref="oval:ssg-test_runlevel2_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 3" test_ref="oval:ssg-test_runlevel3_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 4" test_ref="oval:ssg-test_runlevel4_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 5" test_ref="oval:ssg-test_runlevel5_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 6" test_ref="oval:ssg-test_runlevel6_saslauthd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_smartd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service smartd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The smartd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_smartd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package smartmontools removed or service smartd is not configured to start" operator="OR">
<ns3:extend_definition comment="smartmontools removed" definition_ref="oval:ssg-package_smartmontools_removed:def:1" />
<ns3:criteria comment="service smartd is not configured to start" operator="AND">
<ns3:criterion comment="smartd runlevel 0" test_ref="oval:ssg-test_runlevel0_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 1" test_ref="oval:ssg-test_runlevel1_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 2" test_ref="oval:ssg-test_runlevel2_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 3" test_ref="oval:ssg-test_runlevel3_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 4" test_ref="oval:ssg-test_runlevel4_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 5" test_ref="oval:ssg-test_runlevel5_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 6" test_ref="oval:ssg-test_runlevel6_smartd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_smb_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service smb Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The smb service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_smb_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service smb is not configured to start" operator="AND">
<ns3:criterion comment="smb runlevel 0" test_ref="oval:ssg-test_runlevel0_smb:tst:1" />
<ns3:criterion comment="smb runlevel 1" test_ref="oval:ssg-test_runlevel1_smb:tst:1" />
<ns3:criterion comment="smb runlevel 2" test_ref="oval:ssg-test_runlevel2_smb:tst:1" />
<ns3:criterion comment="smb runlevel 3" test_ref="oval:ssg-test_runlevel3_smb:tst:1" />
<ns3:criterion comment="smb runlevel 4" test_ref="oval:ssg-test_runlevel4_smb:tst:1" />
<ns3:criterion comment="smb runlevel 5" test_ref="oval:ssg-test_runlevel5_smb:tst:1" />
<ns3:criterion comment="smb runlevel 6" test_ref="oval:ssg-test_runlevel6_smb:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_snmpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service snmpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The snmpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_snmpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package net-snmp removed or service snmpd is not configured to start" operator="OR">
<ns3:extend_definition comment="net-snmp removed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criteria comment="service snmpd is not configured to start" operator="AND">
<ns3:criterion comment="snmpd runlevel 0" test_ref="oval:ssg-test_runlevel0_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 1" test_ref="oval:ssg-test_runlevel1_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 2" test_ref="oval:ssg-test_runlevel2_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 3" test_ref="oval:ssg-test_runlevel3_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 4" test_ref="oval:ssg-test_runlevel4_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 5" test_ref="oval:ssg-test_runlevel5_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 6" test_ref="oval:ssg-test_runlevel6_snmpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_squid_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service squid Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The squid service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_squid_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package squid removed or service squid is not configured to start" operator="OR">
<ns3:extend_definition comment="squid removed" definition_ref="oval:ssg-package_squid_removed:def:1" />
<ns3:criteria comment="service squid is not configured to start" operator="AND">
<ns3:criterion comment="squid runlevel 0" test_ref="oval:ssg-test_runlevel0_squid:tst:1" />
<ns3:criterion comment="squid runlevel 1" test_ref="oval:ssg-test_runlevel1_squid:tst:1" />
<ns3:criterion comment="squid runlevel 2" test_ref="oval:ssg-test_runlevel2_squid:tst:1" />
<ns3:criterion comment="squid runlevel 3" test_ref="oval:ssg-test_runlevel3_squid:tst:1" />
<ns3:criterion comment="squid runlevel 4" test_ref="oval:ssg-test_runlevel4_squid:tst:1" />
<ns3:criterion comment="squid runlevel 5" test_ref="oval:ssg-test_runlevel5_squid:tst:1" />
<ns3:criterion comment="squid runlevel 6" test_ref="oval:ssg-test_runlevel6_squid:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_sshd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service sshd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sshd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_sshd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package openssh-server removed or service sshd is not configured to start" operator="OR">
<ns3:extend_definition comment="openssh-server removed" definition_ref="oval:ssg-package_openssh-server_removed:def:1" />
<ns3:criteria comment="service sshd is not configured to start" operator="AND">
<ns3:criterion comment="sshd runlevel 0" test_ref="oval:ssg-test_runlevel0_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 1" test_ref="oval:ssg-test_runlevel1_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 2" test_ref="oval:ssg-test_runlevel2_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 3" test_ref="oval:ssg-test_runlevel3_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 4" test_ref="oval:ssg-test_runlevel4_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 5" test_ref="oval:ssg-test_runlevel5_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 6" test_ref="oval:ssg-test_runlevel6_sshd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_sysstat_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service sysstat Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sysstat service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_sysstat_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package sysstat removed or service sysstat is not configured to start" operator="OR">
<ns3:extend_definition comment="sysstat removed" definition_ref="oval:ssg-package_sysstat_removed:def:1" />
<ns3:criteria comment="service sysstat is not configured to start" operator="AND">
<ns3:criterion comment="sysstat runlevel 0" test_ref="oval:ssg-test_runlevel0_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 1" test_ref="oval:ssg-test_runlevel1_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 2" test_ref="oval:ssg-test_runlevel2_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 3" test_ref="oval:ssg-test_runlevel3_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 4" test_ref="oval:ssg-test_runlevel4_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 5" test_ref="oval:ssg-test_runlevel5_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 6" test_ref="oval:ssg-test_runlevel6_sysstat:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_telnetd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable telnet Service</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable telnet Service</ns3:description>
<ns3:reference ref_id="service_telnetd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package telnet-server removed or service telnetd is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package telnet-server removed" definition_ref="oval:ssg-package_telnet-server_removed:def:1" />
<ns3:criterion comment="Disable telnet Service" test_ref="oval:ssg-test_service_telnetd_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_tftp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service tftp Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The tftp service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_tftp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package tftp-server removed or service tftp is not configured to start" operator="OR">
<ns3:extend_definition comment="tftp-server removed" definition_ref="oval:ssg-package_tftp-server_removed:def:1" />
<ns3:criteria comment="service tftp is not configured to start" operator="AND">
<ns3:criterion comment="tftp runlevel 0" test_ref="oval:ssg-test_runlevel0_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 1" test_ref="oval:ssg-test_runlevel1_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 2" test_ref="oval:ssg-test_runlevel2_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 3" test_ref="oval:ssg-test_runlevel3_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 4" test_ref="oval:ssg-test_runlevel4_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 5" test_ref="oval:ssg-test_runlevel5_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 6" test_ref="oval:ssg-test_runlevel6_tftp:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_vsftpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service vsftpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The vsftpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_vsftpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package vsftpd removed or service vsftpd is not configured to start" operator="OR">
<ns3:extend_definition comment="vsftpd removed" definition_ref="oval:ssg-package_vsftpd_removed:def:1" />
<ns3:criteria comment="service vsftpd is not configured to start" operator="AND">
<ns3:criterion comment="vsftpd runlevel 0" test_ref="oval:ssg-test_runlevel0_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 1" test_ref="oval:ssg-test_runlevel1_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 2" test_ref="oval:ssg-test_runlevel2_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 3" test_ref="oval:ssg-test_runlevel3_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 4" test_ref="oval:ssg-test_runlevel4_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 5" test_ref="oval:ssg-test_runlevel5_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 6" test_ref="oval:ssg-test_runlevel6_vsftpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_xinetd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service xinetd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The xinetd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_xinetd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package xinetd removed or service xinetd is not configured to start" operator="OR">
<ns3:extend_definition comment="xinetd removed" definition_ref="oval:ssg-package_xinetd_removed:def:1" />
<ns3:criteria comment="service xinetd is not configured to start" operator="AND">
<ns3:criterion comment="xinetd runlevel 0" test_ref="oval:ssg-test_runlevel0_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 1" test_ref="oval:ssg-test_runlevel1_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 2" test_ref="oval:ssg-test_runlevel2_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 3" test_ref="oval:ssg-test_runlevel3_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 4" test_ref="oval:ssg-test_runlevel4_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 5" test_ref="oval:ssg-test_runlevel5_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 6" test_ref="oval:ssg-test_runlevel6_xinetd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ypbind_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ypbind Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ypbind service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_ypbind_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ypbind removed or service ypbind is not configured to start" operator="OR">
<ns3:extend_definition comment="ypbind removed" definition_ref="oval:ssg-package_ypbind_removed:def:1" />
<ns3:criteria comment="service ypbind is not configured to start" operator="AND">
<ns3:criterion comment="ypbind runlevel 0" test_ref="oval:ssg-test_runlevel0_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 1" test_ref="oval:ssg-test_runlevel1_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 2" test_ref="oval:ssg-test_runlevel2_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 3" test_ref="oval:ssg-test_runlevel3_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 4" test_ref="oval:ssg-test_runlevel4_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 5" test_ref="oval:ssg-test_runlevel5_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 6" test_ref="oval:ssg-test_runlevel6_ypbind:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_ip6tables_default_rule:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the INPUT built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the INPUT built-in chain.</ns3:description>
<ns3:reference ref_id="set_ip6tables_default_rule" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":INPUT DROP [0:0]" test_ref="oval:ssg-test_ip6tables_input_drop:tst:1" />
<ns3:criterion comment=":INPUT ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_ip6tables_input_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_iptables_default_rule:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the INPUT built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the INPUT built-in chain.</ns3:description>
<ns3:reference ref_id="set_iptables_default_rule" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":INPUT DROP [0:0]" test_ref="oval:ssg-test_iptables_input_drop:tst:1" />
<ns3:criterion comment=":INPUT ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_iptables_input_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_iptables_default_rule_forward:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the FORWARD built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the FORWARD built-in chain.</ns3:description>
<ns3:reference ref_id="set_iptables_default_rule_forward" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":FORWARD DROP [0:0]" test_ref="oval:ssg-test_iptables_forward_drop:tst:1" />
<ns3:criterion comment=":FORWARD ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_iptables_forward_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-smartcard_auth:def:1" version="2">
<ns3:metadata>
<ns3:title>Enable Smart Card Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable Smart Card logins</ns3:description>
<ns3:reference ref_id="smartcard_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="smart card authentication is configured" operator="AND">
<ns3:extend_definition comment="pam_pkcs11 package is installed" definition_ref="oval:ssg-package_pam_pkcs11_installed:def:1" />
<ns3:extend_definition comment="esc package is installed" definition_ref="oval:ssg-package_esc_installed:def:1" />
<ns3:extend_definition comment="pcscd service is enabled" definition_ref="oval:ssg-service_pcscd_enabled:def:1" />
<ns3:criterion comment="cert_policy directive contains oscp_on" test_ref="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1" />
<ns3:criteria comment="smart card authentication is enabled or required in system-auth" operator="OR">
<ns3:criterion comment="smart card authentication is enabled in /etc/pam.d/system-auth" test_ref="oval:ssg-test_smart_card_enabled_system_auth:tst:1" />
<ns3:criterion comment="smart card is required in /etc/pam.d/system-auth" test_ref="oval:ssg-test_smart_card_required_system_auth:tst:1" />
</ns3:criteria>
<ns3:criterion comment="smart card is required in /etc/pam.d/smartcard-auth" test_ref="oval:ssg-test_smart_card_required_smartcard_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "fs.suid_dumpable" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="fs.suid_dumpable configuration setting check" definition_ref="oval:ssg-sysctl_static_fs_suid_dumpable:def:1" />
<ns3:extend_definition comment="fs.suid_dumpable runtime setting check" definition_ref="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.dmesg_restrict" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.dmesg_restrict configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_dmesg_restrict:def:1" />
<ns3:extend_definition comment="kernel.dmesg_restrict runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_dmesg_restrict:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.exec-shield" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.exec-shield configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_exec_shield:def:1" />
<ns3:extend_definition comment="kernel.exec-shield runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_exec_shield:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.randomize_va_space" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.randomize_va_space configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1" />
<ns3:extend_definition comment="kernel.randomize_va_space runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.log_martians" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.log_martians configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.log_martians runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.icmp_echo_ignore_broadcasts" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
<ns3:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.icmp_ignore_bogus_error_responses" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
<ns3:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.ip_forward" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.ip_forward configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1" />
<ns3:extend_definition comment="net.ipv4.ip_forward runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.tcp_syncookies" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.tcp_syncookies configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1" />
<ns3:extend_definition comment="net.ipv4.tcp_syncookies runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_ra set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_redirects set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_source_route set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.forwarding" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.forwarding set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.forwarding configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.forwarding runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_ra set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_redirects set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_source_route set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter fs.suid_dumpable set to 0" test_ref="oval:ssg-test_runtime_fs_suid_dumpable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.dmesg_restrict" parameter should be set to "1" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.dmesg_restrict set to 1" test_ref="oval:ssg-test_runtime_kernel_dmesg_restrict:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.exec-shield" parameter should be set to "1" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.exec-shield set to 1" test_ref="oval:ssg-test_runtime_kernel_exec_shield:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.randomize_va_space set to 2" test_ref="oval:ssg-test_runtime_kernel_randomize_va_space:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_log_martians:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_rp_filter:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_secure_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_send_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_rp_filter:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_secure_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_send_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.ip_forward set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_ip_forward:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.tcp_syncookies set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_tcp_syncookies:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_ra set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_ra:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.forwarding set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_forwarding:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_ra set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_ra:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter fs.suid_dumpable set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_fs_suid_dumpable:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater fs.suid_dumpable set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_fs_suid_dumpable:tst:1" />
<ns3:criterion comment="Kernel static parameter fs.suid_dumpable not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_fs_suid_dumpable_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.dmesg_restrict" parameter should be set to "1" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.dmesg_restrict set to 1 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_dmesg_restrict:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.dmesg_restrict set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_dmesg_restrict:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.dmesg_restrict not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_dmesg_restrict_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.exec-shield" parameter should be set to "1" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.exec-shield set to 1 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_exec_shield:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.exec-shield set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_exec_shield:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.exec-shield not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_exec_shield_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.randomize_va_space set to 2 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_randomize_va_space:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.randomize_va_space set to 2 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_randomize_va_space:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.randomize_va_space not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_randomize_va_space_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_log_martians:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.log_martians not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_rp_filter:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.rp_filter not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.secure_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_send_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.send_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_rp_filter:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.rp_filter not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.secure_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_send_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.send_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.ip_forward set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_ip_forward:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.ip_forward set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_ip_forward:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.ip_forward not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_ip_forward_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_tcp_syncookies:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.tcp_syncookies not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_ra:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_ra not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_forwarding:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.forwarding not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_ra:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_ra not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-xwindows_runlevel_setting:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable X Windows Startup By Setting Runlevel</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks /etc/inittab to ensure that default runlevel is set to 3.</ns3:description>
<ns3:reference ref_id="xwindows_runlevel_setting" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="default runlevel is 3" test_ref="oval:ssg-test_etc_inittab_default_runlevel:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-account_disable_post_pw_expiration:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Accounts to Expire Following Password Expiration</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The accounts should be configured to expire automatically following password expiration.</ns3:description>
<ns3:reference ref_id="account_disable_post_pw_expiration" source="ssg" /></ns3:metadata>
<ns3:criteria comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd">
<ns3:criterion test_ref="oval:ssg-test_etc_default_useradd_inactive:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-account_unique_name:def:1" version="1">
<ns3:metadata>
<ns3:title>Set All Accounts To Have Unique Names</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>All accounts on the system should have unique names for proper accountability.</ns3:description>
<ns3:reference ref_id="account_unique_name" source="ssg" /></ns3:metadata>
<ns3:criteria comment="There should not exist duplicate user name entries in /etc/passwd">
<ns3:criterion test_ref="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_max_concurrent_login_sessions:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Maximum Number of Concurrent Login Sessions Per User</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The maximum number of concurrent login sessions per user should meet
minimum requirements.</ns3:description>
<ns3:reference ref_id="accounts_max_concurrent_login_sessions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" test_ref="oval:ssg-test_limitsd_maxlogins:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="the value maxlogins should not be set at all in /etc/security/limits.d/*.conf" negate="true" test_ref="oval:ssg-test_limitsd_maxlogins_exists:tst:1" />
<ns3:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" test_ref="oval:ssg-test_maxlogins:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_maximum_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The maximum password age policy should meet minimum requirements.</ns3:description>
<ns3:reference ref_id="accounts_maximum_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria comment="The value PASS_MAX_DAYS should be set appropriately in /etc/login.defs">
<ns3:criterion test_ref="oval:ssg-test_pass_max_days:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_minimum_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The minimum password age policy should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_minimum_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs">
<ns3:criterion test_ref="oval:ssg-test_pass_min_days:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_no_uid_except_zero:def:1" version="1">
<ns3:metadata>
<ns3:title>UID 0 Belongs Only To Root</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Only the root account should be assigned a user id of 0.</ns3:description>
<ns3:reference ref_id="accounts_no_uid_except_zero" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="tests that there are no accounts with UID 0 except root in the /etc/passwd file" test_ref="oval:ssg-test_accounts_no_uid_except_root:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_all_shadowed:def:1" version="1">
<ns3:metadata>
<ns3:title>All Password Hashes Shadowed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>All password hashes should be shadowed.</ns3:description>
<ns3:reference ref_id="accounts_password_all_shadowed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="password hashes are shadowed" test_ref="oval:ssg-test_accounts_password_all_shadowed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_minlen_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The password minimum length should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_password_minlen_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_pass_min_len:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_unix_remember:def:1" version="2">
<ns3:metadata>
<ns3:title>Limit Password Reuse</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The passwords to remember should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_password_pam_unix_remember" source="ssg" /></ns3:metadata>
<ns3:criteria comment="remember parameter of pam_unix.so or pam_pwhistory.so is set correctly" operator="OR">
<ns3:criterion comment="remember parameter of pam_unix.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_unix_remember:tst:1" />
<ns3:criterion comment="remember parameter of pam_pwhistory.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_warn_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The password expiration warning age should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_password_warn_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_pass_warn_age:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_deny:def:1" version="4">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_deny" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="pam_faillock.so preauth silent set in system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so authfail deny value set in system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so set in account phase of system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so preauth silent set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so authfail deny value set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so set in account phase of password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_interval:def:1" version="2">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_interval" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="preauth default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_password-auth:tst:1" />
<ns3:criterion comment="preauth default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_unlock_time:def:1" version="2">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_unlock_time" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="preauth default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_password-auth:tst:1" />
<ns3:criterion comment="preauth default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_root_path_dirs_no_write:def:1" version="2">
<ns3:metadata>
<ns3:title>Write permissions are disabled for group and other in all
directories in Root's Path</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Check each directory in root's path and make use it does
not grant write permission to group and other</ns3:description>
<ns3:reference ref_id="accounts_root_path_dirs_no_write" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check that write permission to group and other in root's path is denied">
<ns3:criterion comment="Check for write permission to group and other in root's path" test_ref="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_tmout:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Interactive Session Timeout</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks interactive shell timeout</ns3:description>
<ns3:reference ref_id="accounts_tmout" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="TMOUT value in /etc/profile >= var_accounts_tmout" test_ref="oval:ssg-test_etc_profile_tmout:tst:1" />
<ns3:criterion comment="TMOUT value in /etc/profile.d/*.sh >= var_accounts_tmout" test_ref="oval:ssg-test_etc_profiled_tmout:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_bashrc:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values set for bash</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for users of the bash shell</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_bashrc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_bashrc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_csh_cshrc:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values set for csh</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for users of the csh shell</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_csh_cshrc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_csh_cshrc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_login_defs:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values in /etc/login.defs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for all users specified in /etc/login.defs</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_profile:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values in /etc/profile</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for all users should be set correctly</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_profile" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_profile:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_build_database:def:1" version="2">
<ns3:metadata>
<ns3:title>Aide Database Must Exist</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>The aide database must be initialized.</ns3:description>
<ns3:reference ref_id="aide_build_database" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_aide_build_new_database_absolute_path:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_aide_operational_database_absolute_path:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_periodic_cron_checking:def:1" version="3">
<ns3:metadata>
<ns3:title>Configure Periodic Execution of AIDE</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, AIDE does not install itself for periodic
execution. Periodically running AIDE is necessary to reveal
unexpected changes in installed files.
</ns3:description>
<ns3:reference ref_id="aide_periodic_cron_checking" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_periodic_cron_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_crond_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_var_cron_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron.(daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_checking:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_scan_notification:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure Notification of Post-AIDE Scan Details</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should notify appropriate personnel of the details
of a scan after the scan has been run.</ns3:description>
<ns3:reference ref_id="aide_scan_notification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_scan_notification:tst:1" />
<ns3:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_var_cron_notification:tst:1" />
<ns3:criterion comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_notification:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_use_fips_hashes:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Use FIPS 140-2 for Validating Hashes</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to use the FIPS 140-2
cryptographic hashes.</ns3:description>
<ns3:reference ref_id="aide_use_fips_hashes" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="non-FIPS hashes are not configured" test_ref="oval:ssg-test_aide_non_fips_hashes:tst:1" />
<ns3:criterion comment="FIPS hashes are configured" test_ref="oval:ssg-test_aide_use_fips_hashes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_verify_acls:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Verify Access Control Lists (ACLs)</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to verify Access Control Lists (ACLs).</ns3:description>
<ns3:reference ref_id="aide_verify_acls" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="acl is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_acls:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_verify_ext_attributes:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Verify Extended Attributes</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to verify extended file attributes.</ns3:description>
<ns3:reference ref_id="aide_verify_ext_attributes" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="xattrs is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_ext_attributes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>The syslog Plugin Of the Audit Event Multiplexor (audispd) Is Activated</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>active setting in /etc/audisp/plugins.d/syslog.conf is set to 'yes'</ns3:description>
<ns3:reference ref_id="auditd_audispd_syslog_plugin_activated" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="active setting in syslog.conf" test_ref="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_conf_log_group_not_root:def:1" version="1">
<ns3:metadata>
<ns3:title>'log_group' Not Set To 'root' In /etc/audit/auditd.conf</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Verify 'log_group' is not set to 'root' in
/etc/audit/auditd.conf.</ns3:description>
<ns3:reference ref_id="auditd_conf_log_group_not_root" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Verify 'log_group' not set to 'root' in /etc/audit/auditd.conf" test_ref="oval:ssg-test_auditd_conf_log_group_not_root:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_action_mail_acct:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Email Account to Notify Upon Action</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>action_mail_acct setting in /etc/audit/auditd.conf is set to a certain account</ns3:description>
<ns3:reference ref_id="auditd_data_retention_action_mail_acct" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="action_mail_acct setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Disk is Low on Space</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_admin_space_left_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="admin_space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_flush:def:1" version="1">
<ns3:metadata>
<ns3:title>Auditd priority for flushing data to disk</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The setting for flush in /etc/audit/auditd.conf</ns3:description>
<ns3:reference ref_id="auditd_data_retention_flush" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="flush setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_flush:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Maximum Log File Size</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>max_log_file setting in /etc/audit/auditd.conf is set to at least a certain value</ns3:description>
<ns3:reference ref_id="auditd_data_retention_max_log_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="max_log_file setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file_action:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Maximum Log Size Reached</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>max_log_file_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_max_log_file_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="max_log_file_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_num_logs:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Maximum Number of Logs to Retain</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>num_logs setting in /etc/audit/auditd.conf is set to at least a certain value</ns3:description>
<ns3:reference ref_id="auditd_data_retention_num_logs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="num_logs setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_num_logs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_space_left_action:def:1" version="3">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Disk Starting to Run Low on Space</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>space_left_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_space_left_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_space_left_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-banner_etc_issue:def:1" version="2">
<ns3:metadata>
<ns3:title>System Login Banner Compliance</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system login banner text should be set correctly.</ns3:description>
<ns3:reference ref_id="banner_etc_issue" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/etc/issue is set appropriately" test_ref="oval:ssg-test_banner_etc_issue:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-cups_disable_browsing:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Printer Browsing Entirely if Possible</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The CUPS print service can be configured to broadcast a list
of available printers to the network. Other machines on the network, also
running the CUPS print service, can be configured to listen to these
broadcasts and add and configure these printers for immediate use. By
disabling this browsing capability, the machine will no longer generate
or receive such broadcasts.</ns3:description>
<ns3:reference ref_id="cups_disable_browsing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Ensure remote printer browsing is off" test_ref="oval:ssg-test_cups_disable_browsing_browsing_off:tst:1" />
<ns3:criterion comment="Ensure no incoming printer information packets are allowed" test_ref="oval:ssg-test_cups_disable_browsing_browseallow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-cups_disable_printserver:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Printer Server if Possible</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, locally configured printers will not be shared
over the network, but if this functionality has somehow been enabled,
these recommendations will disable it again. Be sure to disable outgoing
printer list broadcasts, or remote users will still be able to see the
locally configured printers, even if they cannot actually print to them.
To limit print serving to a particular set of users, use the Policy
directive.</ns3:description>
<ns3:reference ref_id="cups_disable_printserver" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Don't use port directive" test_ref="oval:ssg-test_cups_disable_printserver_disable_port:tst:1" />
<ns3:criterion comment="Do use the listen directive" test_ref="oval:ssg-test_cups_disable_printserver_use_listen:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_etc_httpd_conf:def:1" version="2">
<ns3:metadata>
<ns3:title>Directory /etc/httpd/conf/ Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Directory permissions for /etc/httpd/conf/ should be set to 0750 (or stronger).</ns3:description>
<ns3:reference ref_id="dir_perms_etc_httpd_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dir_perms_etc_httpd_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_var_log_httpd:def:1" version="2">
<ns3:metadata>
<ns3:title>Directory /var/log/httpd/ Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Directory permissions for /var/log/httpd should be set to 0700 (or stronger).</ns3:description>
<ns3:reference ref_id="dir_perms_var_log_httpd" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dir_perms_var_log_httpd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that All World-Writable Directories Have Sticky Bits Set</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sticky bit should be set for all world-writable directories.</ns3:description>
<ns3:reference ref_id="dir_perms_world_writable_sticky_bits" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="all local world writable directories have sticky bit set" negate="true" test_ref="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_host_auth:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Host-Based Authentication</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSH host-based authentication should be disabled.</ns3:description>
<ns3:reference ref_id="disable_host_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check HostbasedAuthentication in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_hostbasedauthentication:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_prelink:def:1" version="3">
<ns3:metadata>
<ns3:title>Disable Prelinking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>The prelinking feature can interfere with the operation of
checksum integrity tools (e.g. AIDE), mitigates the protection provided
by ASLR, and requires additional CPU cycles by software upgrades.
</ns3:description>
<ns3:reference ref_id="disable_prelink" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Conditions for prelinking disabled are satisfied" operator="OR">
<ns3:criteria comment="System is RHEL6 with prelinking disabled" operator="AND">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:criterion comment="Prelinking is disabled" test_ref="oval:ssg-test_prelinking_disabled:tst:1" />
</ns3:criteria>
<ns3:criteria comment="System is RHEL7 or Fedora and prelink RPM is not installed or prelinking is disabled" operator="AND">
<ns3:criteria comment="System is RHEL7 or Fedora" operator="OR">
<ns3:extend_definition comment="Installed OS is RHEL7" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
<ns3:extend_definition comment="Installed OS is Fedora" definition_ref="oval:ssg-installed_OS_is_fedora:def:1" />
</ns3:criteria>
<ns3:criteria comment="prelink RPM package not installed or prelinking disabled" operator="OR">
<ns3:extend_definition comment="prelink RPM package not installed" definition_ref="oval:ssg-package_prelink_removed:def:1" />
<ns3:criterion comment="Prelinking is disabled" test_ref="oval:ssg-test_prelinking_disabled:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_users_coredumps:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Core Dumps</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Core dumps for all users should be disabled</ns3:description>
<ns3:reference ref_id="disable_users_coredumps" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Are core dumps disabled" test_ref="oval:ssg-test_core_dumps_limitsconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_gpgcheck_globally_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Yum gpgcheck Globally Activated</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The gpgcheck option should be used to ensure that checking
of an RPM package's signature always occurs prior to its
installation.</ns3:description>
<ns3:reference ref_id="ensure_gpgcheck_globally_activated" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Fedora installed" definition_ref="oval:ssg-installed_OS_is_fedora:def:1" />
<ns3:criterion comment="check value of gpgcheck in /etc/dnf/dnf.conf" test_ref="oval:ssg-test_dnf_ensure_gpgcheck_globally_activated:tst:1" />
</ns3:criteria>
<ns3:criterion comment="check value of gpgcheck in /etc/yum.conf" test_ref="oval:ssg-test_yum_ensure_gpgcheck_globally_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_gpgcheck_never_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure gpgcheck Enabled For All Yum or Dnf Package Repositories</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>Ensure all yum or dnf repositories utilize signature checking.</ns3:description>
<ns3:reference ref_id="ensure_gpgcheck_never_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ensure all yum or dnf repositories utilize signiature checking" operator="AND">
<ns3:criterion comment="verify no gpgpcheck=0 present in /etc/yum.repos.d files" test_ref="oval:ssg-test_ensure_gpgcheck_never_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_logrotate_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure the logrotate utility performs the automatic rotation of log files on daily basis</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
The frequency of automatic log files rotation performed by the logrotate utility should be configured to run daily
</ns3:description>
<ns3:reference ref_id="ensure_logrotate_activated" source="ssg" /></ns3:metadata>
<ns3:criteria comment="/etc/logrotate.conf contains daily setting or /etc/cron.daily/logrotate file exists" operator="OR">
<ns3:criterion comment="Check if daily is set in /etc/logrotate.conf" test_ref="oval:ssg-test_logrotate_conf_daily_setting:tst:1" />
<ns3:criterion comment="Check if /etc/cron.daily/logrotate file exists (and calls logrotate)" test_ref="oval:ssg-test_cron_daily_logrotate_existence:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_redhat_gpgkey_installed:def:1" version="2">
<ns3:metadata>
<ns3:title>Red Hat Release and Auxiliary gpg-pubkey Packages Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The Red Hat release and auxiliary key packages are required to be installed.</ns3:description>
<ns3:reference ref_id="ensure_redhat_gpgkey_installed" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Vendor GPG keys" operator="OR">
<ns3:criteria comment="Red Hat Vendor Keys" operator="AND">
<ns3:criteria comment="Red Hat Installed" operator="OR">
<ns3:extend_definition comment="RHEL6 installed" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="RHEL7 installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
</ns3:criteria>
<ns3:criterion comment="package gpg-pubkey-fd431d51-4ae0493b is installed" test_ref="oval:ssg-test_package_gpgkey-fd431d51-4ae0493b_installed:tst:1" />
<ns3:criterion comment="package gpg-pubkey-2fa658e0-45700c69 is installed" test_ref="oval:ssg-test_package_gpgkey-2fa658e0-45700c69_installed:tst:1" />
</ns3:criteria>
<ns3:criteria comment="CentOS Vendor Keys" operator="OR">
<ns3:criteria comment="CentOS Installed" operator="OR">
<ns3:extend_definition comment="CentOS6 installed" definition_ref="oval:ssg-installed_OS_is_centos6:def:1" />
<ns3:extend_definition comment="CentOS7 installed" definition_ref="oval:ssg-installed_OS_is_centos7:def:1" />
</ns3:criteria>
<ns3:criterion comment="package gpg-pubkey-f4a80eb5-53a7ff4b is installed" test_ref="oval:ssg-test_package_gpgkey-f4a80eb5-53a7ff4b_installed:tst:1" />
<ns3:criterion comment="package gpg-pubkey-c105b9de-4e0fd3a3 is installed" test_ref="oval:ssg-test_package_gpgkey-c105b9de-4e0fd3a3_installed:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_group:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/group file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'gshadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/gshadow file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_passwd:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'passwd' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/passwd file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_group:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/group file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'gshadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/gshadow file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_passwd:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'passwd' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/passwd file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_binary_dirs:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify that System Executables Have Root Ownership</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /bin, /sbin, /usr/bin, /usr/sbin, /usr/local/bin,
/usr/local/sbin, /usr/libexec, and objects therein, are owned by root.
</ns3:description>
<ns3:reference ref_id="file_ownership_binary_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_binary_directories:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_binary_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_library_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that Shared Library Files Have Root Ownership</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
objects therein, are owned by root.
</ns3:description>
<ns3:reference ref_id="file_ownership_library_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_lib_dir:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_lib_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_var_log_audit:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify /var/log/audit Ownership</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Checks that all /var/log/audit files and directories are owned by the root user and group.</ns3:description>
<ns3:reference ref_id="file_ownership_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria comment="directories are root owned" operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories:tst:1" />
</ns3:criteria>
<ns3:criteria comment="log_group in auditd.conf is not root" operator="AND">
<ns3:extend_definition comment="log_group in auditd.conf is not root" definition_ref="oval:ssg-auditd_conf_log_group_not_root:def:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_binary_dirs:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify that System Executables Have Restrictive Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that binary files under /bin, /sbin, /usr/bin, /usr/sbin,
/usr/local/bin, /usr/local/sbin, and /usr/libexec are not group-writable or world-writable.
</ns3:description>
<ns3:reference ref_id="file_permissions_binary_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_perms_binary_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_group:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify permissions on 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for /etc/group should be set
correctly.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify /etc/gshadow Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/gshadow is owned by 0, group owned by 0, and has mode 0000. If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_passwd:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify /etc/passwd Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/passwd is owned by 0, group owned by 0, and has mode 0644 (or stronger). If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_shadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify /etc/shadow Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/shadow is owned by 0, group owned by 0, and has mode 0000. If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_shadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_shadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_home_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Proper Permissions User Home Directories</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>File permissions should be set correctly for the home directories for all user accounts.</ns3:description>
<ns3:reference ref_id="file_permissions_home_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="home directories" negate="true" test_ref="oval:ssg-test_file_permissions_home_dirs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_httpd_server_conf_files:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify Permissions On Apache Web Server Configuration Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/httpd/conf/* files should have the appropriate permissions (0640 or stronger).</ns3:description>
<ns3:reference ref_id="file_permissions_httpd_server_conf_files" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_library_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that Shared Library Files Have Restrictive Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
objects therein, are not group-writable or world-writable.
</ns3:description>
<ns3:reference ref_id="file_permissions_library_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_perms_lib_dir:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_perms_lib_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_world_writable:def:1" version="1">
<ns3:metadata>
<ns3:title>Find Unauthorized World-Writable Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The world-write permission should be disabled for all files.</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_world_writable" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_unauthorized_world_write:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_ungroupowned:def:1" version="2">
<ns3:metadata>
<ns3:title>Find files unowned by a group</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
</ns3:affected>
<ns3:description>All files should be owned by a group</ns3:description>
<ns3:reference ref_id="file_permissions_ungroupowned" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all files and make sure they are owned by a group" test_ref="oval:ssg-test_file_permissions_ungroupowned:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_var_log_audit:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify /var/log/audit Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks for correct permissions for all log files in /var/log/audit.</ns3:description>
<ns3:reference ref_id="file_permissions_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion negate="true" test_ref="oval:ssg-test_file_permissions_var_log_audit:tst:1" />
<ns3:criteria comment="log_group in auditd.conf is not root" operator="AND">
<ns3:extend_definition comment="log_group in auditd.conf is not root" definition_ref="oval:ssg-auditd_conf_log_group_not_root:def:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_file_permissions_var_log_audit-non_root:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_log_transactions:def:1" version="1">
<ns3:metadata>
<ns3:title>Banner for FTP Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>To trace malicious activity facilitated by the FTP
service, it must be configured to ensure that all commands sent to
the FTP server are logged using the verbose vsftpd log format.
</ns3:description>
<ns3:reference ref_id="ftp_log_transactions" source="ssg" /></ns3:metadata>
<ns3:criteria comment="FTP is not being used or the conditions are met" operator="OR">
<ns3:extend_definition comment="vsftp package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criteria comment="FTP configuration conditions are not set or are met" operator="AND">
<ns3:criterion comment="log ftp transactions enable" test_ref="oval:ssg-test_ftp_log_transactions_enable:tst:1" />
<ns3:criterion comment="log ftp transactions format" test_ref="oval:ssg-test_ftp_log_transactions_format:tst:1" />
<ns3:criterion comment="log ftp transactions protocol" test_ref="oval:ssg-test_ftp_log_transactions_protocol:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_present_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Banner for FTP Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>This setting will cause the system greeting banner to be
used for FTP connections as well.</ns3:description>
<ns3:reference ref_id="ftp_present_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Banner for FTP Users" test_ref="oval:ssg-test_ftp_present_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gid_passwd_group_same:def:1" version="2">
<ns3:metadata>
<ns3:title>All GIDs Are Present In /etc/group</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>All GIDs referenced in /etc/passwd must be defined in /etc/group.</ns3:description>
<ns3:reference ref_id="gid_passwd_group_same" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_gid_passwd_group_same:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gnome_gdm_disable_automatic_login:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable GDM Automatic Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GNOME Display Manager (GDM) ability to allow users to
automatically login.</ns3:description>
<ns3:reference ref_id="gnome_gdm_disable_automatic_login" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="Disable GDM Automatic Login" test_ref="oval:ssg-test_disable_automatic_login:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gnome_gdm_disable_guest_login:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable GDM Guest Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GNOME Display Manager (GDM) ability to allow guest users
to login.</ns3:description>
<ns3:reference ref_id="gnome_gdm_disable_guest_login" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="Disable GDM Guest Login" test_ref="oval:ssg-test_disable_guest_login:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-groupowner_shadow_file:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify group who owns 'shadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/shadow file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="groupowner_shadow_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_groupowner_etc_shadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_antivirus:def:1" version="1">
<ns3:metadata>
<ns3:title>Package Antivirus Installed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Antivirus software should be installed.</ns3:description>
<ns3:reference ref_id="install_antivirus" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Antivirus is not being used or conditions are met">
<ns3:extend_definition comment="McAfee A/V Installed" definition_ref="oval:ssg-install_mcafee_antivirus:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_antivirus:def:1" version="1">
<ns3:metadata>
<ns3:title>Package McAfeeVSEForLinux Installed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>McAfee Antivirus software should be installed.</ns3:description>
<ns3:reference ref_id="install_mcafee_antivirus" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Antivirus is not being used or conditions are met" operator="AND">
<ns3:extend_definition comment="McAfee Runtime Libraries and Agent" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1" />
<ns3:criterion comment="Linuxshield AntiVirus package is installed" test_ref="oval:ssg-test_linuxshield_install_antivirus:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_cma_rt:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the McAfee Runtime Libraries and Linux Agent</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the McAfee Runtime Libraries (MFErt) and Linux Agent (MFEcma).</ns3:description>
<ns3:reference ref_id="install_mcafee_cma_rt" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="McAfee runtime library package installed" test_ref="oval:ssg-test_mcafee_runtime_installed:tst:1" />
<ns3:criterion comment="McAfee management agent package installed" test_ref="oval:ssg-test_mcafee_management_agent:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss:def:1" version="1">
<ns3:metadata>
<ns3:title>Install McAfee Host-Based Intrusion Detection Software (HBSS)</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>McAfee Host-Based Intrusion Detection Software (HBSS) software
should be installed.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_accm:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_hips:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_pa:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_accm:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Asset Configuration Compliance Module (ACCM)</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the Asset Configuration Compliance Module (ACCM).</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_accm" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee ACCM is installed" test_ref="oval:ssg-test_mcafee_accm_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_hips:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Host Intrusion Prevention System (HIPS) Module</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the McAfee Host Intrusion Prevention System (HIPS) Module if it is
absolutely necessary. If SELinux is enabled, do not install or enable this module.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_hips" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee IPS is installed" test_ref="oval:ssg-test_mcafee_hbss_hips_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_pa:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Policy Auditor (PA) Module</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the Policy Auditor (PA) Module.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_pa" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee Policy Auditor is installed" test_ref="oval:ssg-test_mcafee_auditengine_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos6:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:6" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_centos6" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS6 is installed" test_ref="oval:ssg-test_centos6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos7:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:7" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_centos7" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS7 is installed" test_ref="oval:ssg-test_centos7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-installed_OS_is_certified:def:1" version="1">
<ns3:metadata>
<ns3:title>Vendor Certified Operating System</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The operating system installed on the system is
a certified vendor operating system and meets government
requirements/certifications such as FIPS, NIAP, etc.</ns3:description>
<ns3:reference ref_id="installed_OS_is_certified" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Installed operating system is a certified operating system" operator="OR">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="Installed OS is RHEL7" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_fedora:def:1" version="3">
<ns3:metadata>
<ns3:title>Installed operating system is Fedora</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:22" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:23" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:24" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:25" source="CPE" />
<ns3:description>The operating system installed on the system is Fedora</ns3:description>
<ns3:reference ref_id="installed_OS_is_fedora" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="fedora-release RPM package is installed" test_ref="oval:ssg-test_fedora_release_rpm:tst:1" />
<ns3:criterion comment="CPE vendor is 'fedoraproject' and product is 'fedora'" test_ref="oval:ssg-test_fedora_vendor_product:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
<ns3:metadata>
<ns3:title>Installed operating system is part of the Unix family</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The operating system installed on the system is part of the Unix OS family</ns3:description>
<ns3:reference ref_id="installed_OS_is_part_of_Unix_family" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_family:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel6:def:1" version="2">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_rhel6" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 6 Workstation is installed" test_ref="oval:ssg-test_rhel_workstation:tst:1" />
<ns3:criterion comment="RHEL 6 Server is installed" test_ref="oval:ssg-test_rhel_server:tst:1" />
<ns3:criterion comment="RHEL 6 Compute Node is installed" test_ref="oval:ssg-test_rhel_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel7:def:1" version="1">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:7" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_rhel7" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel7_unix_family:tst:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 7 Workstation is installed" test_ref="oval:ssg-test_rhel7_workstation:tst:1" />
<ns3:criterion comment="RHEL 7 Server is installed" test_ref="oval:ssg-test_rhel7_server:tst:1" />
<ns3:criterion comment="RHEL 7 Compute Node is installed" test_ref="oval:ssg-test_rhel7_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl6:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_sl6" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 6 is installed" test_ref="oval:ssg-test_sl6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl7:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_sl7" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 7 is installed" test_ref="oval:ssg-test_sl7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_wrlinux:def:1" version="1">
<ns3:metadata>
<ns3:title>WRLinux</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:windriver:wrlinux" source="CPE" />
<ns3:description>The operating system installed on the system is
Wind River Linux</ns3:description>
<ns3:reference ref_id="installed_OS_is_wrlinux" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_wrlinux:tst:1" />
<ns3:criterion comment="WRLinux is installed" test_ref="oval:ssg-test_wrlinux:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_hostlimit:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Logwatch HostLimit Configured</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Test if HostLimit line in logwatch.conf is set appropriately.</ns3:description>
<ns3:reference ref_id="logwatch_configured_hostlimit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test value of HostLimit" test_ref="oval:ssg-test_logwatch_configured_hostlimit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_splithosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Logwatch SplitHosts Configured</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Check if SplitHosts line in logwatch.conf is set appropriately.</ns3:description>
<ns3:reference ref_id="logwatch_configured_splithosts" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Test value of SplitHosts" test_ref="oval:ssg-test_logwatch_configured_splithosts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nodev:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Legitimate character and block devices should not exist
within temporary directories like /dev/shm. The nodev mount option should
be specified for /dev/shm.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_nodev" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on /dev/shm" test_ref="oval:ssg-test_nodev_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_noexec:def:1" version="1">
<ns3:metadata>
<ns3:title>Add noexec Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>It can be dangerous to allow the execution of binaries from
world-writable temporary storage directories such as /dev/shm. The noexec
mount option prevents binaries from being executed out of
/dev/shm.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_noexec" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="noexec on /dev/shm" test_ref="oval:ssg-test_noexec_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nosuid:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nosuid Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option should be set for temporary storage
partitions such as /dev/shm. The suid/sgid permissions should not be
required in these world-writable directories.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_nosuid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nosuid on /dev/shm" test_ref="oval:ssg-test_nosuid_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_nonroot_local_partitions:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to Non-Root Local Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev mount option prevents files from being interpreted
as character or block devices. Legitimate character and block devices
should exist in the /dev directory on the root partition or within chroot
jails built for system services. All other locations should not allow
character and block devices.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_nonroot_local_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on local filesystems" negate="true" test_ref="oval:ssg-test_nodev_nonroot_local_partitions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_remote_filesystems:def:1" version="1">
<ns3:metadata>
<ns3:title>Mount Remote Filesystems with nodev</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev option should be enabled for all NFS mounts in /etc/fstab.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_remote_filesystems" source="ssg" /></ns3:metadata>
<ns3:criteria operator="XOR">
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1" />
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nodev_etc_fstab:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add nodev Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev mount option prevents files from being interpreted
as character or block devices. Legitimate character and block devices
should exist in the /dev directory on the root partition or within chroot
jails built for system services. All other locations should not allow
character and block devices.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nodev' mount option in /etc/fstab" test_ref="oval:ssg-test_nodev_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nodev' mount option in runtime configuration" test_ref="oval:ssg-test_nodev_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'nodev' mount option in /etc/fstab" test_ref="oval:ssg-test_nodev_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'nodev' mount option in runtime configuration" test_ref="oval:ssg-test_nodev_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_noexec_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add noexec Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The noexec mount option prevents the direct execution of
binaries on the mounted filesystem. Users should not be allowed to
execute binaries that exist on partitions mounted from removable media
(such as a USB key). The noexec option prevents code from being executed
directly from the media itself, and may therefore provide a line of
defense against certain types of worms or malicious code.</ns3:description>
<ns3:reference ref_id="mount_option_noexec_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'noexec' mount option in /etc/fstab" test_ref="oval:ssg-test_noexec_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'noexec' mount option in runtime configuration" test_ref="oval:ssg-test_noexec_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'noexec' mount option in /etc/fstab" test_ref="oval:ssg-test_noexec_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'noexec' mount option in runtime configuration" test_ref="oval:ssg-test_noexec_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nosuid_remote_filesystems:def:1" version="1">
<ns3:metadata>
<ns3:title>Mount Remote Filesystems with nosuid</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid option should be enabled for all NFS mounts in /etc/fstab.</ns3:description>
<ns3:reference ref_id="mount_option_nosuid_remote_filesystems" source="ssg" /></ns3:metadata>
<ns3:criteria operator="XOR">
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1" />
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nosuid_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add nosuid Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option prevents set-user-identifier (suid)
and set-group-identifier (sgid) permissions from taking effect. These
permissions allow users to execute binaries with the same permissions as
the owner and group of the file respectively. Users should not be allowed
to introduce suid and guid files into the system via partitions mounted
from removeable media.</ns3:description>
<ns3:reference ref_id="mount_option_nosuid_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nosuid' mount option in /etc/fstab" test_ref="oval:ssg-test_nosuid_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nosuid' mount option in runtime configuration" test_ref="oval:ssg-test_nosuid_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'nosuid' mount option in /etc/fstab" test_ref="oval:ssg-test_nosuid_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'nosuid' mount option in runtime configuration" test_ref="oval:ssg-test_nosuid_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_smb_client_signing:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Client SMB Packet Signing, if using
mount.cifs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require packet signing of clients who mount
Samba shares using the mount.cifs program (e.g., those who
specify shares in /etc/fstab). To do so, ensure that signing
options (either sec=krb5i or sec=ntlmv2i) are
used.</ns3:description>
<ns3:reference ref_id="mount_option_smb_client_signing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:extend_definition comment="samba-common installed" definition_ref="oval:ssg-package_samba-common_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="check for no cifs in /etc/fstab" test_ref="oval:ssg-test_20340111:tst:1" />
<ns3:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" test_ref="oval:ssg-test_20340112:tst:1" />
</ns3:criteria>
<ns3:criteria operator="OR">
<ns3:criterion comment="check for no cifs in /etc/mtab" test_ref="oval:ssg-test_20340113:tst:1" />
<ns3:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" test_ref="oval:ssg-test_20340114:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_nodev:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Legitimate character and block devices should not exist
within temporary directories like /tmp. The nodev mount option should be
specified for /tmp.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_nodev" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on /tmp" test_ref="oval:ssg-test_nodev_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_noexec:def:1" version="1">
<ns3:metadata>
<ns3:title>Add noexec Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>It can be dangerous to allow the execution of binaries from
world-writable temporary storage directories such as /tmp. The noexec
mount option prevents binaries from being executed out of
/tmp.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_noexec" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="noexec on /tmp" test_ref="oval:ssg-test_noexec_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_nosuid:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nosuid Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option should be set for temporary storage
partitions such as /tmp. The suid/sgid permissions should not be required
in these world-writable directories.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_nosuid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nosuid on /tmp" test_ref="oval:ssg-test_nosuid_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_var_tmp_bind:def:1" version="1">
<ns3:metadata>
<ns3:title>Bind Mount /var/tmp To /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /var/tmp directory should be bind mounted to /tmp in
order to consolidate temporary storage into one location protected by the
same techniques as /tmp.</ns3:description>
<ns3:reference ref_id="mount_option_var_tmp_bind" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Ensure /var/tmp is mounted" test_ref="oval:ssg-test_mount_option_var_tmp:tst:1" />
<ns3:criterion comment="Ensure /tmp is bind mounted" test_ref="oval:ssg-test_mount_option_var_tmp_bind:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_disable_zeroconf:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Zeroconf Networking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable Zeroconf automatic route assignment in the
169.254.0.0 subnet.</ns3:description>
<ns3:reference ref_id="network_disable_zeroconf" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Look for NOZEROCONF=yes in /etc/sysconfig/network" test_ref="oval:ssg-test_sysconfig_nozeroconf_yes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_disable_rpc:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Support for RPC IPv6</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable ipv6 based rpc services</ns3:description>
<ns3:reference ref_id="network_ipv6_disable_rpc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Disable udp6" test_ref="oval:ssg-test_network_ipv6_disable_rpc_udp6:tst:1" />
<ns3:criterion comment="Disable tcp6" test_ref="oval:ssg-test_network_ipv6_disable_rpc_tcp6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_sniffer_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the network sniffer</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable the network sniffer</ns3:description>
<ns3:reference ref_id="network_sniffer_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="promisc interfaces" negate="true" test_ref="oval:ssg-test_promisc_interfaces:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_direct_root_logins:def:1" version="1">
<ns3:metadata>
<ns3:title>Direct root Logins Not Allowed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root logins help ensure accountability for actions
taken on the system using the root account.</ns3:description>
<ns3:reference ref_id="no_direct_root_logins" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_no_direct_root_logins:tst:1" />
<ns3:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_etc_securetty_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_empty_passwords:def:1" version="1">
<ns3:metadata>
<ns3:title>No nullok Option in /etc/pam.d/system-auth</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The file /etc/pam.d/system-auth should not contain the nullok option</ns3:description>
<ns3:reference ref_id="no_empty_passwords" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="make sure the nullok option is not used in /etc/pam.d/system-auth" test_ref="oval:ssg-test_no_empty_passwords:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_files_unowned_by_user:def:1" version="1">
<ns3:metadata>
<ns3:title>Find files unowned by a user</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files should be owned by a user</ns3:description>
<ns3:reference ref_id="no_files_unowned_by_user" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all files and make sure they are owned by a user" test_ref="oval:ssg-no_files_unowned_by_user_test:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_insecure_locks_exports:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure insecure_locks is disabled</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Allowing insecure file locking could allow for sensitive
data to be viewed or edited by an unauthorized user.</ns3:description>
<ns3:reference ref_id="no_insecure_locks_exports" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check for insecure NFS locks in /etc/exports" test_ref="oval:ssg-test_no_insecure_locks_exports:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_netrc_files:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify No netrc Files Exist</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The .netrc files contain login information used to auto-login into FTP servers and reside in the user's home directory. Any .netrc files should be removed.</ns3:description>
<ns3:reference ref_id="no_netrc_files" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_netrc_files_home:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_rsh_trust_files:def:1" version="1">
<ns3:metadata>
<ns3:title>No Legacy .rhosts Or hosts.equiv Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>There should not be any .rhosts or hosts.equiv files on the system.</ns3:description>
<ns3:reference ref_id="no_rsh_trust_files" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_root:tst:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_home:tst:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_etc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_shelllogin_for_systemaccounts:def:1" version="2">
<ns3:metadata>
<ns3:title>System Accounts Do Not Run a Shell</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The root account is the only system account that should have
a login shell.</ns3:description>
<ns3:reference ref_id="no_shelllogin_for_systemaccounts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:criterion comment="Test SYS_UID_MIN not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1" />
<ns3:criterion comment="Test SYS_UID_MAX not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1" />
<ns3:criterion comment="Test shell defined for UID from <0, UID_MIN -1>" test_ref="oval:ssg-test_shell_defined_default_uid_range:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test SYS_UID_MIN defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1" />
<ns3:criterion comment="Test SYS_UID_MAX defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1" />
<ns3:criterion comment="Test shell defined for reserved system UIDs" test_ref="oval:ssg-test_shell_defined_reserved_uid_range:tst:1" />
<ns3:criterion comment="Test shell defined for dynamically allocated system UIDs" test_ref="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_aide_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package aide Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package aide should be installed.</ns3:description>
<ns3:reference ref_id="package_aide_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package aide is installed" test_ref="oval:ssg-test_package_aide_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_audit_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package audit Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package audit should be installed.</ns3:description>
<ns3:reference ref_id="package_audit_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package audit is installed" test_ref="oval:ssg-test_package_audit_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_bind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package bind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package bind should be removed.</ns3:description>
<ns3:reference ref_id="package_bind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package bind is removed" test_ref="oval:ssg-test_package_bind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dhcp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dhcp Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dhcp should be removed.</ns3:description>
<ns3:reference ref_id="package_dhcp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dhcp is removed" test_ref="oval:ssg-test_package_dhcp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dovecot_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dovecot Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dovecot should be removed.</ns3:description>
<ns3:reference ref_id="package_dovecot_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dovecot is removed" test_ref="oval:ssg-test_package_dovecot_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dracut-fips_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dracut-fips Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dracut-fips should be installed.</ns3:description>
<ns3:reference ref_id="package_dracut-fips_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criterion comment="package dracut-fips is installed" test_ref="oval:ssg-test_package_dracut-fips_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_httpd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package httpd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package httpd should be removed.</ns3:description>
<ns3:reference ref_id="package_httpd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package httpd is removed" test_ref="oval:ssg-test_package_httpd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_mcstrans_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package mcstrans Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package mcstrans should be removed.</ns3:description>
<ns3:reference ref_id="package_mcstrans_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package mcstrans is removed" test_ref="oval:ssg-test_package_mcstrans_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_net-snmp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package net-snmp Removed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The RPM package net-snmp should be removed.</ns3:description>
<ns3:reference ref_id="package_net-snmp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package net-snmp is removed" test_ref="oval:ssg-test_package_net-snmp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ntp_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ntp Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ntp should be installed.</ns3:description>
<ns3:reference ref_id="package_ntp_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ntp is installed" test_ref="oval:ssg-test_package_ntp_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openldap-servers_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package openldap-servers Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openldap-servers should be removed.</ns3:description>
<ns3:reference ref_id="package_openldap-servers_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openldap-servers is removed" test_ref="oval:ssg-test_package_openldap-servers_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openssh-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package openssh-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openssh-server should be removed.</ns3:description>
<ns3:reference ref_id="package_openssh-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openssh-server is removed" test_ref="oval:ssg-test_package_openssh-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_prelink_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package prelink Removed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The RPM package prelink should be removed.</ns3:description>
<ns3:reference ref_id="package_prelink_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package prelink is removed" test_ref="oval:ssg-test_package_prelink_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsh-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsh-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsh-server should be removed.</ns3:description>
<ns3:reference ref_id="package_rsh-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsh-server is removed" test_ref="oval:ssg-test_package_rsh-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsh_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsh Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsh should be removed.</ns3:description>
<ns3:reference ref_id="package_rsh_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsh is removed" test_ref="oval:ssg-test_package_rsh_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsyslog_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsyslog Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsyslog should be installed.</ns3:description>
<ns3:reference ref_id="package_rsyslog_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsyslog is installed" test_ref="oval:ssg-test_package_rsyslog_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba-common_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba-common Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba-common should be installed.</ns3:description>
<ns3:reference ref_id="package_samba-common_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba-common is installed" test_ref="oval:ssg-test_package_samba-common_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba-common_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba-common Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba-common should be removed.</ns3:description>
<ns3:reference ref_id="package_samba-common_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba-common is removed" test_ref="oval:ssg-test_package_samba-common_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_screen_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package screen Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package screen should be installed.</ns3:description>
<ns3:reference ref_id="package_screen_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package screen is installed" test_ref="oval:ssg-test_package_screen_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_sendmail_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package sendmail Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package sendmail should be removed.</ns3:description>
<ns3:reference ref_id="package_sendmail_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package sendmail is removed" test_ref="oval:ssg-test_package_sendmail_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_setroubleshoot_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package setroubleshoot Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package setroubleshoot should be removed.</ns3:description>
<ns3:reference ref_id="package_setroubleshoot_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package setroubleshoot is removed" test_ref="oval:ssg-test_package_setroubleshoot_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_squid_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package squid Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package squid should be removed.</ns3:description>
<ns3:reference ref_id="package_squid_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package squid is removed" test_ref="oval:ssg-test_package_squid_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_talk-server_removed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package talk-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package talk-server should be removed.</ns3:description>
<ns3:reference ref_id="package_talk-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package talk-server is removed" test_ref="oval:ssg-test_package_talk-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_talk_removed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package talk Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package talk should be removed.</ns3:description>
<ns3:reference ref_id="package_talk_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package talk is removed" test_ref="oval:ssg-test_package_talk_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_telnet-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package telnet-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package telnet-server should be removed.</ns3:description>
<ns3:reference ref_id="package_telnet-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package telnet-server is removed" test_ref="oval:ssg-test_package_telnet-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_telnet_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package telnet Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package telnet should be removed.</ns3:description>
<ns3:reference ref_id="package_telnet_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package telnet is removed" test_ref="oval:ssg-test_package_telnet_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_tftp-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package tftp-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package tftp-server should be removed.</ns3:description>
<ns3:reference ref_id="package_tftp-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package tftp-server is removed" test_ref="oval:ssg-test_package_tftp-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_tftp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package tftp Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package tftp should be removed.</ns3:description>
<ns3:reference ref_id="package_tftp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package tftp is removed" test_ref="oval:ssg-test_package_tftp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_vsftpd_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package vsftpd Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package vsftpd should be installed.</ns3:description>
<ns3:reference ref_id="package_vsftpd_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package vsftpd is installed" test_ref="oval:ssg-test_package_vsftpd_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_vsftpd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package vsftpd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package vsftpd should be removed.</ns3:description>
<ns3:reference ref_id="package_vsftpd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package vsftpd is removed" test_ref="oval:ssg-test_package_vsftpd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_xinetd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package xinetd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package xinetd should be removed.</ns3:description>
<ns3:reference ref_id="package_xinetd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package xinetd is removed" test_ref="oval:ssg-test_package_xinetd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ypbind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ypbind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ypbind should be removed.</ns3:description>
<ns3:reference ref_id="package_ypbind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ypbind is removed" test_ref="oval:ssg-test_package_ypbind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ypserv_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ypserv Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ypserv should be removed.</ns3:description>
<ns3:reference ref_id="package_ypserv_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ypserv is removed" test_ref="oval:ssg-test_package_ypserv_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_home:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /home Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>If user home directories will be stored locally, create a
separate partition for /home. If /home will be mounted from another
system such as an NFS server, then creating a separate partition is not
necessary at this time, and the mountpoint can instead be configured
later.</ns3:description>
<ns3:reference ref_id="partition_for_home" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/home on own partition" test_ref="oval:ssg-test_home_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_tmp:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /tmp Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /tmp directory is a world-writable directory used for
temporary file storage. Verify that it has its own partition or logical
volume.</ns3:description>
<ns3:reference ref_id="partition_for_tmp" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/tmp on own partition" test_ref="oval:ssg-test_tmp_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Ensuring that /var is mounted on its own partition enables
the setting of more restrictive mount options, which is used as temporary
storage by many program, particularly system services such as daemons. It
is not uncommon for the /var directory to contain world-writable
directories, installed by other software packages.</ns3:description>
<ns3:reference ref_id="partition_for_var" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var on own partition" test_ref="oval:ssg-test_var_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var_log:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var/log Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>System logs are stored in the /var/log directory. Ensure
that it has its own partition or logical volume.</ns3:description>
<ns3:reference ref_id="partition_for_var_log" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var/log on own partition" test_ref="oval:ssg-test_var_log_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var_log_audit:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var/log/audit Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit logs are stored in the /var/log/audit directory.
Ensure that it has its own partition or logical volume. Make absolutely
certain that it is large enough to store all audit logs that will be
created by the auditing daemon.</ns3:description>
<ns3:reference ref_id="partition_for_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var/log/audit on own partition" test_ref="oval:ssg-test_var_log_audit_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-postfix_server_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure Postfix Against Unnecessary Release of Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Protect against unnecessary release of information.</ns3:description>
<ns3:reference ref_id="postfix_server_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Limit release of information" test_ref="oval:ssg-test_postfix_server_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-removable_partition_doesnt_exist:def:1" version="1">
<ns3:metadata>
<ns3:title>Device Files for Removable Media Partitions Does Not Exist on the System</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify if device file representing removable partitions
exist on the system</ns3:description>
<ns3:reference ref_id="removable_partition_doesnt_exist" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if removable partition really exists on the system" test_ref="oval:ssg-test_removable_partition_doesnt_exist:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-require_smb_client_signing:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Client SMB Packet Signing in smb.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require samba clients which use smb.conf, such as smbclient,
to use packet signing. A Samba client should only communicate with
servers who can support SMB packet signing.</ns3:description>
<ns3:reference ref_id="require_smb_client_signing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="package samba-common is not installed" definition_ref="oval:ssg-package_samba-common_removed:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="samba-common installed" definition_ref="oval:ssg-package_samba-common_installed:def:1" />
<ns3:criterion comment="check for client signing = mandatory in /etc/samba/smb.conf" test_ref="oval:ssg-test_require_smb_client_signing:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-restrict_serial_port_logins:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Serial Port Root Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root login to serial port interfaces helps
ensure accountability for actions taken on the system using the root
account.</ns3:description>
<ns3:reference ref_id="restrict_serial_port_logins" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="serial ports /etc/securetty" negate="true" test_ref="oval:ssg-test_serial_ports_etc_securetty:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-root_path_no_dot:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that No Dangerous Directories Exist in Root's Path</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The environment variable PATH should be set correctly for
the root user.</ns3:description>
<ns3:reference ref_id="root_path_no_dot" source="ssg" /></ns3:metadata>
<ns3:criteria comment="environment variable PATH contains dangerous path" operator="AND">
<ns3:criterion comment="environment variable PATH starts with : or ." test_ref="oval:ssg-test_env_var_begins:tst:1" />
<ns3:criterion comment="environment variable PATH contains : twice in a row" test_ref="oval:ssg-test_env_var_contains_doublecolon:tst:1" />
<ns3:criterion comment="environment variable PATH contains . twice in a row" test_ref="oval:ssg-test_env_var_contains_doubleperiod:tst:1" />
<ns3:criterion comment="environment variable PATH ends with : or ." test_ref="oval:ssg-test_env_var_ends:tst:1" />
<ns3:criterion comment="environment variable PATH doesn't begin with a /" test_ref="oval:ssg-test_env_var_begins_slash:tst:1" />
<ns3:criterion comment="environment variable PATH doesn't contain relative paths" test_ref="oval:ssg-test_env_var_contains_relative_path:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rpm_verify_hashes:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify File Hashes with RPM</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>Verify the RPM digests of system binaries using the RPM database.</ns3:description>
<ns3:reference ref_id="rpm_verify_hashes" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="verify file md5 hashes" test_ref="oval:ssg-test_files_fail_md5_hash:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rpm_verify_permissions:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify File Ownership And Permissions Using RPM</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify the integrity of installed packages
by comparing the installed files with information about the
files taken from the package metadata stored in the RPM
database.</ns3:description>
<ns3:reference ref_id="rpm_verify_permissions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="user ownership of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_user_ownership:tst:1" />
<ns3:criterion comment="group ownership of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_group_ownership:tst:1" />
<ns3:criterion comment="mode of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_nolisten:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Rsyslogd from Accepting Remote Messages on Loghosts
Only</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>rsyslogd should reject remote messages</ns3:description>
<ns3:reference ref_id="rsyslog_nolisten" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions are satisfied" test_ref="oval:ssg-test_rsyslog_nolisten:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_remote_loghost:def:1" version="1">
<ns3:metadata>
<ns3:title>Send Logs to a Remote Loghost</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Syslog logs should be sent to a remote loghost</ns3:description>
<ns3:reference ref_id="rsyslog_remote_loghost" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Remote logging set within /etc/rsyslog.conf" test_ref="oval:ssg-test_remote_rsyslog_conf:tst:1" />
<ns3:criterion comment="Remote logging set within /etc/rsyslog.d" test_ref="oval:ssg-test_remote_rsyslog_d:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-securetty_root_login_console_only:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Virtual Console Root Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root login to virtual console devices
helps ensure accountability for actions taken on the system using the
root account.</ns3:description>
<ns3:reference ref_id="securetty_root_login_console_only" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="virtual consoles /etc/securetty" test_ref="oval:ssg-test_virtual_consoles_etc_securetty:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_all_devicefiles_labeled:def:1" version="1">
<ns3:metadata>
<ns3:title>Device Files Have Proper SELinux Context</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>All device files in /dev should be assigned an SELinux security context other than 'device_t'.</ns3:description>
<ns3:reference ref_id="selinux_all_devicefiles_labeled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="device_t in /dev" test_ref="oval:ssg-test_selinux_all_devicefiles_labeled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_confinement_of_daemons:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure No Daemons are Unconfined by SELinux</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Wind River Linux 8</ns3:platform>
</ns3:affected>
<ns3:description>All pids in /proc should be assigned an SELinux security context other than 'initrc_t'.</ns3:description>
<ns3:reference ref_id="selinux_confinement_of_daemons" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="device_t in /dev" test_ref="oval:ssg-test_selinux_confinement_of_daemons:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_policytype:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SELinux</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The SELinux policy should be set appropriately.</ns3:description>
<ns3:reference ref_id="selinux_policytype" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_selinux_policy:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_state:def:1" version="1">
<ns3:metadata>
<ns3:title>SELinux Enforcing</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The SELinux state should be enforcing the local policy.</ns3:description>
<ns3:reference ref_id="selinux_state" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="enforce is disabled" test_ref="oval:ssg-test_etc_selinux_config:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_libuserconf:def:1" version="1">
<ns3:metadata>
<ns3:title>Set SHA512 Password Hashing Algorithm in /etc/libuser.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/libuser.conf.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_libuserconf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_etc_libuser_conf_cryptstyle:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" version="2">
<ns3:metadata>
<ns3:title>Set SHA512 Password Hashing Algorithm in /etc/login.defs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/login.defs.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_logindefs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_etc_login_defs_encrypt_method:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_systemauth" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_pam_unix_sha512:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-snmpd_not_default_password:def:1" version="2">
<ns3:metadata>
<ns3:title>SNMP default communities disabled</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SNMP default communities must be removed.</ns3:description>
<ns3:reference ref_id="snmpd_not_default_password" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criterion comment="SNMP communities" test_ref="oval:ssg-test_snmp_default_communities:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-snmpd_use_newer_protocol:def:1" version="2">
<ns3:metadata>
<ns3:title>SNMP use newer protocols</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SNMP version 1 and 2c must not be enabled.</ns3:description>
<ns3:reference ref_id="snmpd_use_newer_protocol" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criterion comment="SNMP protocols" test_ref="oval:ssg-test_snmp_versions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_allow_only_protocol2:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Only Protocol 2 Connections Allowed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The OpenSSH daemon should be running protocol 2.</ns3:description>
<ns3:reference ref_id="sshd_allow_only_protocol2" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:extend_definition comment="rpm package openssh-server removed" definition_ref="oval:ssg-package_openssh-server_removed:def:1" />
<ns3:criterion comment="Check Protocol in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_allow_only_protocol2:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_empty_passwords:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Empty Passwords</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Remote connections from accounts with empty passwords should
be disabled (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_disable_empty_passwords" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitEmptyPasswords in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitemptypasswords_no:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_rhosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable .rhosts Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Emulation of the rsh command through the ssh server should
be disabled (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_disable_rhosts" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check IgnoreRhosts in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_rsh_emulation_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_rhosts_rsa:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable SSH Support for Rhosts RSA Authentication</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SSH can allow authentication through the obsolete rsh command
through the use of the authenticating user's SSH keys. This should be disabled.</ns3:description>
<ns3:reference ref_id="sshd_disable_rhosts_rsa" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check RhostsRSAAuthentication in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_root_login:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable root Login via SSH</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Root login via SSH should be disabled (and dependencies are
met)</ns3:description>
<ns3:reference ref_id="sshd_disable_root_login" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitRootLogin in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitrootlogin_no:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_user_known_hosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable SSH Support for User Known Hosts</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SSH can allow system users host-based authentication
to connect to systems if a cache of the remote systems public keys are available.
This should be disabled.</ns3:description>
<ns3:reference ref_id="sshd_disable_user_known_hosts" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check IgnoreUserKnownHosts in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_disable_user_known_hosts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_do_not_permit_user_env:def:1" version="1">
<ns3:metadata>
<ns3:title>Do Not Allow Users to Set Environment Options</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>PermitUserEnvironment should be disabled</ns3:description>
<ns3:reference ref_id="sshd_do_not_permit_user_env" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitUserEnvironment in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_no_user_envset:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_enable_warning_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable a Warning Banner</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSH warning banner should be enabled (and dependencies are
met)</ns3:description>
<ns3:reference ref_id="sshd_enable_warning_banner" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check Banner in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_banner_set:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_set_idle_timeout:def:1" version="1">
<ns3:metadata>
<ns3:title>Set OpenSSH Idle Timeout Interval</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The SSH idle timeout interval should be set to an
appropriate value.</ns3:description>
<ns3:reference ref_id="sshd_set_idle_timeout" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check ClientAliveInterval in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_idle_timeout:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_set_keepalive:def:1" version="1">
<ns3:metadata>
<ns3:title>Set ClientAliveCountMax for User Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The SSH ClientAliveCountMax should be set to an appropriate
value (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_set_keepalive" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check ClientAliveCountMax in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_clientalivecountmax:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_use_approved_ciphers:def:1" version="1">
<ns3:metadata>
<ns3:title>Use Only Approved Ciphers</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the ciphers to those which are FIPS-approved and only
use ciphers in counter (CTR) mode.</ns3:description>
<ns3:reference ref_id="sshd_use_approved_ciphers" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check the Cipers list in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_ciphers:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_use_approved_macs:def:1" version="1">
<ns3:metadata>
<ns3:title>Use Only FIPS MACs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the Message Authentication Codes (MACs) to those which are FIPS-approved.</ns3:description>
<ns3:reference ref_id="sshd_use_approved_macs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check MACs in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_macs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysconfig_networking_bootproto_ifcfg:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable DHCP Client</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>DHCP configuration should be static for all
interfaces.</ns3:description>
<ns3:reference ref_id="sysconfig_networking_bootproto_ifcfg" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for BOOTPROTO=(static|none) across all interfaces">
<ns3:criterion test_ref="oval:ssg-test_sysconfig_networking_bootproto_ifcfg:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_64bit:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for 64-bit Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for 64-bit architectures to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_64bit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Generic test for x86_64 architecture" definition_ref="oval:ssg-system_info_architecture_x86_64:def:1" />
<ns3:extend_definition comment="Generic test for ppc64 architecture" definition_ref="oval:ssg-system_info_architecture_ppc_64:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_ppc_64:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for PPC and PPCLE Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for PPC PPC64LE architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_ppc_64" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Generic test for ppc64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppc_64:tst:1" />
<ns3:criterion comment="Generic test for ppcle64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppcle_64:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_x86:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for x86 Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for x86 architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_x86" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Generic test for x86 architecture" test_ref="oval:ssg-test_system_info_architecture_x86:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_x86_64:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for x86_64 Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for x86_64 architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_x86_64" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Generic test for x86_64 architecture" test_ref="oval:ssg-test_system_info_architecture_x86_64:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-tftpd_uses_secure_mode:def:1" version="1">
<ns3:metadata>
<ns3:title>TFTP Daemon Uses Secure Mode</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The TFTP daemon should use secure mode.</ns3:description>
<ns3:reference ref_id="tftpd_uses_secure_mode" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package tftp-server removed or /etc/xinetd.d/tftp configured correctly" operator="OR">
<ns3:extend_definition comment="rpm package tftp-server removed" definition_ref="oval:ssg-package_tftp-server_removed:def:1" />
<ns3:criterion comment="tftpd secure mode" test_ref="oval:ssg-test_tftpd_uses_secure_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-umask_for_daemons:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Daemon umask</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The daemon umask should be set as appropriate</ns3:description>
<ns3:reference ref_id="umask_for_daemons" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_umask_for_daemons_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_umask_for_daemons:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-userowner_shadow_file:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'shadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/shadow file should be owned by the
appropriate user.</ns3:description>
<ns3:reference ref_id="userowner_shadow_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check file ownership of /etc/shadow" test_ref="oval:ssg-test_userowner_shadow_file:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_accounts_user_umask_as_number:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_accounts_user_umask' variable represented as octal number</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Value of 'var_accounts_user_umask' variable represented as octal number</ns3:description>
<ns3:reference ref_id="var_accounts_user_umask_as_number" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_removable_partition' variable is set to '/dev/cdrom'</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify if value of 'var_removable_partition' variable is set
to '/dev/cdrom'</ns3:description>
<ns3:reference ref_id="var_removable_partition_is_cd_dvd_drive" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if removable partition value represents CD/DVD drive" test_ref="oval:ssg-test_var_removable_partition_is_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_umask_for_daemons_as_number:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_umask_for_daemons' variable represented as octal number</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Value of 'var_umask_for_daemons' variable represented as octal number</ns3:description>
<ns3:reference ref_id="var_umask_for_daemons_as_number" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_existence_of_var_umask_for_daemons_as_number_variable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-wireless_disable_interfaces:def:1" version="1">
<ns3:metadata>
<ns3:title>Deactivate Wireless Interfaces</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All wireless interfaces should be disabled.</ns3:description>
<ns3:reference ref_id="wireless_disable_interfaces" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="query /proc/net/wireless" test_ref="oval:ssg-test_wireless_disable_interfaces:tst:1" />
</ns3:criteria>
</ns3:definition>
</ns3:definitions>
<ns3:tests>
<ns6:file_test check="all" check_existence="all_exist" comment="System log files are owned by root group" id="oval:ssg-test_rsyslog_files_groupownership:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_groupownership:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_groupownership:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="System log files are owned by root" id="oval:ssg-test_rsyslog_files_ownership:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_ownership:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_ownership:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Permissions of system log files are 0600" id="oval:ssg-test_rsyslog_files_permissions:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_permissions:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_permissions:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_dcredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_dcredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_dcredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_difok:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_difok:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_difok:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_lcredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_lcredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_lcredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_maxrepeat:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_maxrepeat:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_maxrepeat:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_minclass:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_password_pam_cracklib_minclass:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_minclass:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth cracklib" id="oval:ssg-test_password_pam_minlen:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_minlen:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_minlen:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_ocredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_ocredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_ocredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_retry:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_retry:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_retry:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_ucredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_ucredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_ucredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chmod x32" id="oval:ssg-test_audit_rules_dac_modification_chmod_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chmod_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chmod x64" id="oval:ssg-test_audit_rules_dac_modification_chmod_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chmod_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chown x32" id="oval:ssg-test_audit_rules_dac_modification_chown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chown x64" id="oval:ssg-test_audit_rules_dac_modification_chown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmod x32" id="oval:ssg-test_audit_rules_dac_modification_fchmod_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmod_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmod x64" id="oval:ssg-test_audit_rules_dac_modification_fchmod_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmod_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmodat x32" id="oval:ssg-test_audit_rules_dac_modification_fchmodat_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmodat_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmodat x64" id="oval:ssg-test_audit_rules_dac_modification_fchmodat_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmodat_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchown x32" id="oval:ssg-test_audit_rules_dac_modification_fchown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchown x64" id="oval:ssg-test_audit_rules_dac_modification_fchown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchownat x32" id="oval:ssg-test_audit_rules_dac_modification_fchownat_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchownat_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchownat x64" id="oval:ssg-test_audit_rules_dac_modification_fchownat_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchownat_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fremovexattr x32" id="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fremovexattr x64" id="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fsetxattr x32" id="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fsetxattr x64" id="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lchown x32" id="oval:ssg-test_audit_rules_dac_modification_lchown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lchown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lchown x64" id="oval:ssg-test_audit_rules_dac_modification_lchown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lchown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lremovexattr x32" id="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lremovexattr x64" id="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lsetxattr x32" id="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lsetxattr x64" id="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification removexattr x32" id="oval:ssg-test_audit_rules_dac_modification_removexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_removexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification removexattr x64" id="oval:ssg-test_audit_rules_dac_modification_removexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_removexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification setxattr x32" id="oval:ssg-test_audit_rules_dac_modification_setxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_setxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification setxattr x64" id="oval:ssg-test_audit_rules_dac_modification_setxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_setxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit file delete" id="oval:ssg-test_audit_rules_file_deletion_events:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_file_deletion_events:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="immutable" id="oval:ssg-test_audit_rules_immutable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_immutable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit insmod" id="oval:ssg-test_audit_rule_kernel_module_loading_insmod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_insmod:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit rmmod" id="oval:ssg-test_audit_rule_kernel_module_loading_rmmod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_rmmod:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit modprobe" id="oval:ssg-test_audit_rule_kernel_module_loading_modprobe:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_modprobe:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit module syscalls" id="oval:ssg-test_audit_rule_kernel_module_loading_syscall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_syscall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="tallylog" id="oval:ssg-test_audit_rules_login_events_tallylog:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_tallylog:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="faillock" id="oval:ssg-test_audit_rules_login_events_faillock:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_faillock:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="lastlog" id="oval:ssg-test_audit_rules_login_events_lastlog:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_lastlog:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit changes selinux" id="oval:ssg-test_audit_rules_mac_modification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_mac_modification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit mount" id="oval:ssg-test_audit_rules_media_export:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_media_export:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="network modification syscall" id="oval:ssg-test_audit_rules_networkconfig_modification_syscall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_syscall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/issue modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/issue.net modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue_net:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue_net:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/hosts modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_hosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_hosts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/sysconfig/network modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_sysconfig_network:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_sysconfig_network:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/etc/audit/audit.rules contains -a always,exit -F path=path_to_binary -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged for each setuid or setgid binary on the system" id="oval:ssg-test_audit_rules_privileged_commands:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_privileged_commands:obj:1" />
<ns7:state state_ref="oval:ssg-state_audit_rules_privileged_commands:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="check if count of found privileged commands on the system is equal to count of audit.rules privileged commands definitions" id="oval:ssg-test_sets_dimension_match:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_dimension_of_object_system_privileged_commands:obj:1" />
<ns7:state state_ref="oval:ssg-state_set_dimension_match:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" comment="utmp" id="oval:ssg-test_audit_rules_session_events_utmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_utmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="btmp" id="oval:ssg-test_audit_rules_session_events_btmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_btmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="wtmp" id="oval:ssg-test_audit_rules_session_events_wtmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_wtmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit sudoers" id="oval:ssg-test_audit_rules_sysadmin_actions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_sysadmin_actions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S adjtime and key" id="oval:ssg-test_audit_rules_time_adjtimex_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_adjtimex_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S adjtime and key" id="oval:ssg-test_audit_rules_time_adjtimex_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_adjtimex_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S clock_settime and key" id="oval:ssg-test_audit_rules_time_clock_settime_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_clock_settime_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S clock_settime and key" id="oval:ssg-test_audit_rules_time_clock_settime_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_clock_settime_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S settimeofday and key" id="oval:ssg-test_audit_rules_time_settimeofday_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_settimeofday_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S settimeofday and key" id="oval:ssg-test_audit_rules_time_settimeofday_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_settimeofday_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S stime and key" id="oval:ssg-test_audit_rules_time_stime_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_stime_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence etc localtime file in the rules file" id="oval:ssg-test_audit_rules_time_watch_localtime:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_watch_localtime:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="32-bit audit file eacces" id="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="32-bit audit file eperm" id="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="64-bit audit file eacces" id="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="64-bit audit file eperm" id="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi TTL setting" id="oval:ssg-test_avahi_ttl_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ttl_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi disable publishing" id="oval:ssg-test_avahi_disable_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_disable_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi IPv4 setting" id="oval:ssg-test_avahi_ipv4_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ipv4_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi IPv6 setting" id="oval:ssg-test_avahi_ipv6_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ipv6_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Prevent Avahi Port Sharing" id="oval:ssg-test_avahi_port_sharing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_port_sharing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict User Publishing" id="oval:ssg-test_avahi_restrict_user_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_user_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Address Publishing" id="oval:ssg-test_avahi_restrict_address_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_address_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict HW Publishing" id="oval:ssg-test_avahi_restrict_CPU_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_CPU_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Workstation Publishing" id="oval:ssg-test_avahi_restrict_workstation_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_workstation_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Domain Publishing" id="oval:ssg-test_avahi_restrict_domain_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_domain_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check for audit=1 in /etc/grub.conf" id="oval:ssg-test_bootloader_audit_argument:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_audit_argument:obj:1" />
<ns7:state state_ref="oval:ssg-state_bootloader_audit_argument:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="look for argument 'nousb' in the kernel line in /etc/grub.conf" id="oval:ssg-test_bootloader_nousb_argument:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_nousb_argument:obj:1" />
<ns7:state state_ref="oval:ssg-state_bootloader_nousb_argument:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /etc/grub.conf" id="oval:ssg-test_bootloader_password:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_password:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the domain-name settings" id="oval:ssg-test_dhcp_client_domain-named:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_domain-named:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the domain-name-servers settings" id="oval:ssg-test_dhcp_client_domain-name-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_domain-name-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the clients nis-domain settings" id="oval:ssg-test_dhcp_client_nis-domain:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_nis-domain:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client nis-servers settings" id="oval:ssg-test_dhcp_client_nis-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_nis-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client ntp-servers settings" id="oval:ssg-test_dhcp_client_ntp-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_ntp-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client routers settings" id="oval:ssg-test_dhcp_client_routers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_routers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client time-offset settings" id="oval:ssg-test_dhcp_client_time-offset:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_time-offset:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client subnet-mask settings" id="oval:ssg-test_dhcp_client_subnet-mask:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_subnet-mask:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client broadcast-address settings" id="oval:ssg-test_dhcp_client_broadcast-address:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_broadcast-address:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that rsyslog is logging dhcp" id="oval:ssg-test_dhcp_server_configure_logging:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_configure_logging:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that bootp is disabled" id="oval:ssg-test_dhcp_server_disable_bootp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_disable_bootp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that deny is set to declines" id="oval:ssg-test_dhcp_server_deny_declines:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_deny_declines:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that ddns-update-style is set to none" id="oval:ssg-test_dhcp_server_disable_ddns:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_disable_ddns:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that domain-name is not set" id="oval:ssg-test_dhcp_domain-named_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_domain-named_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that domain-name-servers is not set" id="oval:ssg-test_dhcp_domain-name-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_domain-name-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that nis-domain is not set" id="oval:ssg-test_dhcp_nis-domain_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_nis-domain_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that nis-servers is not set" id="oval:ssg-test_dhcp_nis-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_nis-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that ntp-servers is not set" id="oval:ssg-test_dhcp_ntp-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_ntp-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that routers is not set" id="oval:ssg-test_dhcp_routers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_routers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that time-offset is not set" id="oval:ssg-test_dhcp_time-offset_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_time-offset_info:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" comment="check for local directories that are world writable and have uid greater than or equal to 500" id="oval:ssg-test_dir_world_writable_uid_gt_500:tst:1" version="1">
<ns6:object object_ref="oval:ssg-all_local_directories:obj:1" />
<ns6:state state_ref="oval:ssg-state_gid_is_user_and_world_writable:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable Ctrl-Alt-Del key sequence" id="oval:ssg-test_disable_ctrlaltdel:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_disable_ctrlaltdel:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_test_disable_ctrlaltdel_exists:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that PROMPT=no in /etc/sysconfig/init" id="oval:ssg-test_interactive_boot_disabled_in_sysconfig_init:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_interactive_boot_disabled_in_sysconfig_init:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check the presence of 'confirm' kernel boot argument in /etc/grub.conf. Fail if found." id="oval:ssg-test_confirm_kernel_boot_argument_not_present:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_confirm_kernel_boot_argument_not_present:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_display_login_attempts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_display_login_attempts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the disable_plaintext_auth[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file" id="oval:ssg-test_dovecot_disable_plaintext_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dovecot_disable_plaintext_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ssl[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file" id="oval:ssg-test_dovecot_enable_ssl:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dovecot_enable_ssl:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" id="oval:ssg-test_selinux_grub:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_selinux_grub:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg-test_file_group_owner_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_group_owner_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_group_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/efi/EFI/redhat/grub.conf owned by root" id="oval:ssg-test_file_group_owner_efi_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_group_owner_efi_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_group_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing file permissions" id="oval:ssg-test_file_permissions_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_permissions_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="setgid files outside system RPMs" id="oval:ssg-check_setgid_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_sgid:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="setuid files outside system RPMs" id="oval:ssg-check_setuid_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_suid:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg-test_file_user_owner_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_user_owner_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_user_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/efi/EFI/redhat/grub.conf owned by root" id="oval:ssg-test_file_user_owner_efi_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_user_owner_efi_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_user_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Configure FTP firewall" id="oval:ssg-test_ftp_configure_firewall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_configure_firewall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable uploads" id="oval:ssg-test_ftp_disable_uploads:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_disable_uploads:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Enable ftp user list" id="oval:ssg-test_ftp_user_list_enable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_enable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set ftp user list file" id="oval:ssg-test_ftp_user_list_file:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_file:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Use ftp user list" id="oval:ssg-test_ftp_user_list_deny:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_deny:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable anonymous access" id="oval:ssg-test_ftp_restrict_to_anon:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_restrict_to_anon:obj:1" />
</ns7:textfilecontent54_test>
<ns7:xmlfilecontent_test check="all" comment="checks for gconf-tree file" id="oval:ssg-test_tree_gconf_gdm_disable_user_list:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_disable_user_list_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for absent gconf-tree file" id="oval:ssg-test_no_tree_gconf_gdm_disable_user_list:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_disable_user_list_no_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="stuff" id="oval:ssg-test_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for gconf-tree file" id="oval:ssg-test_tree_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for absent gconf-tree file" id="oval:ssg-test_no_tree_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable_no_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_no_tree_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_tree_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_tree_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_tree_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable automount in GNOME" id="oval:ssg-test_gconf_gnome_disable_automount:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_automount:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable automount in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_automount:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_automount:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable autorun in GNOME" id="oval:ssg-test_gconf_gnome_disable_automount_autorun:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_automount_autorun:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable autorun in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_automount_autorun:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_automount_autorun:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="temperature is disabled" id="oval:ssg-test_disable_clock_temperature:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_clock_temperature:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_temperature:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="temperature is disabled" id="oval:ssg-test_gconf_tree_disable_clock_temperature:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_clock_temperature:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_temperature:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="weather is disabled" id="oval:ssg-test_disable_clock_weather:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_clock_weather:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_weather:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="weather is disabled" id="oval:ssg-test_gconf_tree_disable_clock_weather:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_clock_weather:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_weather:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="set Ctrl-Alt-Del key sequence to nothing" id="oval:ssg-test_gnome_disable_ctrlaltdel_reboot:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_disable_ctrlaltdel_reboot:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="set Ctrl-Alt-Del key sequence to nothing" id="oval:ssg-test_gconf_tree_gnome_disable_ctrlaltdel_reboot:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_disable_ctrlaltdel_reboot:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable restart/shutdown buttons" id="oval:ssg-test_disable_restart_shutdown:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_restart_shutdown:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_restart_shutdown:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable restart/shutdown buttons" id="oval:ssg-test_gconf_tree_disable_restart_shutdown:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_restart_shutdown:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_restart_shutdown:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable thumbnailers in GNOME" id="oval:ssg-test_gconf_gnome_disable_thumbnailers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_thumbnailers:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable thumbnailers in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_thumbnailers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_thumbnailers:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi creation is disabled" id="oval:ssg-test_disable_wifi_create:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_create:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_create:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi creation is disabled" id="oval:ssg-test_gconf_tree_disable_wifi_create:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_create:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_create:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable wifi disconnect" id="oval:ssg-test_disable_wifi_disconnect:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_disconnect:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_disconnect:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable wifi disconnect" id="oval:ssg-test_gconf_tree_disable_wifi_disconnect:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_disconnect:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_disconnect:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi connection notification is disabled" id="oval:ssg-test_disable_wifi_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_notification:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_notification:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi connection notification is disabled" id="oval:ssg-test_gconf_tree_disable_wifi_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_notification:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_notification:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver is activated on idle" id="oval:ssg-test_gnome_screensaver_idle_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_idle_activated:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver is activated on idle" id="oval:ssg-test_gconf_tree_gnome_screensaver_idle_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_idle_activated:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="test screensaver timeout period" id="oval:ssg-test_gnome_screensaver_idle_delay:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_idle_delay:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="test screensaver timeout period" id="oval:ssg-test_gconf_tree_gnome_screensaver_idle_delay:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_idle_delay:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="screensaver lock is enabled" id="oval:ssg-test_screensaver_lock_enabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_screensaver_lock_enabled:obj:1" />
<ns7:state state_ref="oval:ssg-state_screensaver_lock_enabled:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="screensaver lock is enabled" id="oval:ssg-test_gconf_tree_screensaver_lock_enabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_screensaver_lock_enabled:obj:1" />
<ns7:state state_ref="oval:ssg-state_screensaver_lock_enabled:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="Force log off users" id="oval:ssg-test_gnome_screensaver_max_idle_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_max_idle_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="Force log off users" id="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="check value of max_idle_time in GCONF" id="oval:ssg-test_gnome_screensaver_max_idle_time:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_max_idle_time:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="check value of max_idle_time in GCONF" id="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_time:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_time:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver set to blank screen" id="oval:ssg-test_gnome_screensaver_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_mode:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver set to blank screen" id="oval:ssg-test_gconf_tree_gnome_screensaver_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_mode:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check for fips=1 in /etc/grub.conf" id="oval:ssg-test_grub_enable_fips_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_grub_enable_fips_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_grub_enable_fips_mode:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv4" id="oval:ssg-test_iptables_sshd_disabled_ipv4:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_sshd_disabled_ipv4:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv6" id="oval:ssg-test_iptables_sshd_disabled_ipv6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_sshd_disabled_ipv6:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Verify there doesn't exist SSD drive on system with 'add_random' set to '1'" id="oval:ssg-test_kernel_disable_entropy_contribution_for_solid_state_drives:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_kernel_disable_entropy_contribution_for_solid_state_drives:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module bluetooth disabled" id="oval:ssg-test_kernmod_bluetooth_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module cramfs disabled" id="oval:ssg-test_kernmod_cramfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_cramfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module dccp disabled" id="oval:ssg-test_kernmod_dccp_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_dccp_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module dccp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module freevxfs disabled" id="oval:ssg-test_kernmod_freevxfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfs disabled" id="oval:ssg-test_kernmod_hfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfsplus disabled" id="oval:ssg-test_kernmod_hfsplus_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="ipv6 disabled any modprobe conf file" id="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module jffs2 disabled" id="oval:ssg-test_kernmod_jffs2_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_jffs2_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module rds disabled" id="oval:ssg-test_kernmod_rds_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_rds_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module rds disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_rds_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_rds_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module sctp disabled" id="oval:ssg-test_kernmod_sctp_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_sctp_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module sctp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module squashfs disabled" id="oval:ssg-test_kernmod_squashfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_squashfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module tipc disabled" id="oval:ssg-test_kernmod_tipc_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_tipc_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module tipc disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_tipc_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_tipc_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module udf disabled" id="oval:ssg-test_kernmod_udf_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_udf_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module udf disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_udf_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module usb-storage disabled" id="oval:ssg-test_kernmod_usb-storage_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the ssl start_tls setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_start_tls_ssl:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_start_tls_ssl:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertdir setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_tls_cacertdir:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_tls_cacertdir:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertfile setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_tls_cacertfile:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_tls_cacertfile:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Define default gateways" id="oval:ssg-test_network_ipv6_default_gateway:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_default_gateway:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Enable privacy extensions on each interface" id="oval:ssg-test_network_ipv6_privacy_extensions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_privacy_extensions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set static IPv6 address on each interface" id="oval:ssg-test_network_ipv6_static_address:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_static_address:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensure more than one ntpd NTP server is set" id="oval:ssg-test_ntpd_multiple_servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ntpd_multiple_servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure at least one ntpd NTP server is set" id="oval:ssg-test_ntp_remote_server:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ntp_remote_server:obj:1" />
</ns7:textfilecontent54_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package GConf2 is installed" id="oval:ssg-test_package_GConf2_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_GConf2_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package abrt is removed" id="oval:ssg-test_package_abrt_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_abrt_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package at is removed" id="oval:ssg-test_package_at_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_at_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package autofs is removed" id="oval:ssg-test_package_autofs_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_autofs_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package avahi is installed" id="oval:ssg-test_package_avahi_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_avahi_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package bluez is removed" id="oval:ssg-test_package_bluez_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_bluez_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cpuspeed is removed" id="oval:ssg-test_package_cpuspeed_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cpuspeed_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package cronie is installed" id="oval:ssg-test_package_cronie_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cronie_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cups is removed" id="oval:ssg-test_package_cups_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cups_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cyrus-sasl is removed" id="oval:ssg-test_package_cyrus-sasl_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cyrus-sasl_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dbus is removed" id="oval:ssg-test_package_dbus_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dbus_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package esc is installed" id="oval:ssg-test_package_esc_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_esc_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package gdm is installed" id="oval:ssg-test_package_gdm_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_gdm_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package hal is removed" id="oval:ssg-test_package_hal_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_hal_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package iptables-ipv6 is installed" id="oval:ssg-test_package_iptables-ipv6_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iptables-ipv6_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package iptables is installed" id="oval:ssg-test_package_iptables_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iptables_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package iputils is removed" id="oval:ssg-test_package_iputils_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iputils_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package irqbalance is installed" id="oval:ssg-test_package_irqbalance_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_irqbalance_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package kexec-tools is removed" id="oval:ssg-test_package_kexec-tools_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_kexec-tools_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package libcgroup is removed" id="oval:ssg-test_package_libcgroup_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_libcgroup_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package mdadm is removed" id="oval:ssg-test_package_mdadm_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_mdadm_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package nfs-utils is removed" id="oval:ssg-test_package_nfs-utils_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_nfs-utils_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ntpdate is removed" id="oval:ssg-test_package_ntpdate_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ntpdate_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package oddjob is removed" id="oval:ssg-test_package_oddjob_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_oddjob_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package openswan is installed" id="oval:ssg-test_package_openswan_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openswan_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package pam_ldap is removed" id="oval:ssg-test_package_pam_ldap_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pam_ldap_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package pam_pkcs11 is installed" id="oval:ssg-test_package_pam_pkcs11_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pam_pkcs11_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package pcsc-lite is installed" id="oval:ssg-test_package_pcsc-lite_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pcsc-lite_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package policycoreutils is installed" id="oval:ssg-test_package_policycoreutils_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_policycoreutils_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package portreserve is removed" id="oval:ssg-test_package_portreserve_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_portreserve_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package postfix is installed" id="oval:ssg-test_package_postfix_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_postfix_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package psacct is installed" id="oval:ssg-test_package_psacct_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_psacct_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package qpid-cpp-server is removed" id="oval:ssg-test_package_qpid-cpp-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package quota is removed" id="oval:ssg-test_package_quota_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_quota_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rhnsd is removed" id="oval:ssg-test_package_rhnsd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rhnsd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rpcbind is removed" id="oval:ssg-test_package_rpcbind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rpcbind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package samba is removed" id="oval:ssg-test_package_samba_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package smartmontools is removed" id="oval:ssg-test_package_smartmontools_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_smartmontools_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package subscription-manager is removed" id="oval:ssg-test_package_subscription-manager_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_subscription-manager_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package sysstat is removed" id="oval:ssg-test_package_sysstat_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_sysstat_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package xorg-x11-server-common is removed" id="oval:ssg-test_package_xorg-x11-server-common_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_xorg-x11-server-common_removed:obj:1" />
</ns8:rpminfo_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="inet_interfaces in /etc/postfix/main.cf should be set correctly" id="oval:ssg-test_postfix_network_listening_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_postfix_network_listening_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that the SINGLE variable in the /etc/sysconfig/init file is set to /sbin/sulogin, to ensure that a password must be entered to access single user mode" id="oval:ssg-test_require_singleuser_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_require_singleuser_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rexec disabled" id="oval:ssg-test_etc_xinetd_rexec_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rexec_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rlogin disabled" id="oval:ssg-test_etc_xinetd_rlogin_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rlogin_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rsh disabled" id="oval:ssg-test_etc_xinetd_rsh_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rsh_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable Telnet Service" id="oval:ssg-test_service_telnetd_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_service_telnetd_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/ip6tables for line :INPUT DROP [0:0]" id="oval:ssg-test_ip6tables_input_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ip6tables_input_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/ip6tables for line :INPUT ACCEPT [0:0]" id="oval:ssg-test_ip6tables_input_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ip6tables_input_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT DROP [0:0]" id="oval:ssg-test_iptables_input_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_input_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT ACCEPT [0:0]" id="oval:ssg-test_iptables_input_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_input_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :FORWARD DROP [0:0]" id="oval:ssg-test_iptables_forward_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_forward_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :FORWARD ACCEPT [0:0]" id="oval:ssg-test_iptables_forward_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_forward_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="at least one" check_existence="at_least_one_exists" comment="Test ocsp_on in /etc/pam_pkcs11/pkcs11.conf" id="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1" />
<ns7:state state_ref="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is enabled in /etc/pam.d/system-auth file" id="oval:ssg-test_smart_card_enabled_system_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_enabled_system_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is required in /etc/pam.d/system-auth file" id="oval:ssg-test_smart_card_required_system_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_required_system_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is required in /etc/pam.d/smartcard-auth file" id="oval:ssg-test_smart_card_required_smartcard_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_required_smartcard_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check fs.suid_dumpable kernel runtime parameter" id="oval:ssg-test_runtime_fs_suid_dumpable:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_fs_suid_dumpable:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_fs_suid_dumpable:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.dmesg_restrict kernel runtime parameter" id="oval:ssg-test_runtime_kernel_dmesg_restrict:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_dmesg_restrict:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_dmesg_restrict:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.exec-shield kernel runtime parameter" id="oval:ssg-test_runtime_kernel_exec_shield:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_exec_shield:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_exec_shield:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.randomize_va_space kernel runtime parameter" id="oval:ssg-test_runtime_kernel_randomize_va_space:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_randomize_va_space:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_randomize_va_space:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.log_martians kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_log_martians:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_log_martians:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.rp_filter kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_rp_filter:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_rp_filter:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.secure_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.send_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_send_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_send_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.rp_filter kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_rp_filter:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_rp_filter:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.secure_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.send_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_send_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_send_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.icmp_echo_ignore_broadcasts kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.icmp_ignore_bogus_error_responses kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.ip_forward kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_ip_forward:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_ip_forward:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_ip_forward:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.tcp_syncookies kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_tcp_syncookies:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_tcp_syncookies:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_ra kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_ra:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_ra:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.forwarding kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_forwarding:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_forwarding:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_ra kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_ra:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_ra:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check fs.suid_dumpable static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_fs_suid_dumpable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check fs.suid_dumpable static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_fs_suid_dumpable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_fs_suid_dumpable:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check fs.suid_dumpable is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_fs_suid_dumpable_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.dmesg_restrict static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_dmesg_restrict:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.dmesg_restrict static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_dmesg_restrict:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_dmesg_restrict:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.dmesg_restrict is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_dmesg_restrict_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.exec-shield static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_exec_shield:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.exec-shield static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_exec_shield:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_exec_shield:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.exec-shield is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_exec_shield_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.randomize_va_space static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_randomize_va_space:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.randomize_va_space static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_randomize_va_space:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_randomize_va_space:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.randomize_va_space is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_randomize_va_space_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_log_martians:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.log_martians is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.rp_filter is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.secure_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.send_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.rp_filter is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.secure_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.send_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.icmp_echo_ignore_broadcasts is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.icmp_ignore_bogus_error_responses is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.ip_forward static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_ip_forward:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.ip_forward static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_ip_forward:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_ip_forward:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.ip_forward is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_ip_forward_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.tcp_syncookies static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.tcp_syncookies static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_tcp_syncookies:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.tcp_syncookies is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_ra is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_forwarding:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.forwarding is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_ra is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="default runlevel is 3" id="oval:ssg-test_etc_inittab_default_runlevel:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_inittab_default_runlevel:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd" id="oval:ssg-test_etc_default_useradd_inactive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_default_useradd_inactive:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_default_useradd_inactive:ste:1" />
<ns7:state state_ref="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="There should not exist duplicate user name entries in /etc/passwd" id="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" id="oval:ssg-test_maxlogins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1" />
<ns7:state state_ref="oval:ssg-state_maxlogins:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1" />
<ns7:state state_ref="oval:ssg-state_maxlogins:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins_exists:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of PASS_MAX_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_max_days:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_max_days_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_max_days_instance_value:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_days:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_min_days_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_min_days_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="test that there are no accounts with UID 0 except root in the /etc/passwd file" id="oval:ssg-test_accounts_no_uid_except_root:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_no_uid_except_root:obj:1" />
</ns7:textfilecontent54_test>
<ns6:password_test check="all" comment="password hashes are shadowed" id="oval:ssg-test_accounts_password_all_shadowed:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_accounts_password_all_shadowed:obj:1" />
<ns6:state state_ref="oval:ssg-state_accounts_password_all_shadowed:ste:1" />
</ns6:password_test>
<ns7:variable_test check="all" comment="The value of PASS_MIN_LEN should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_len:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_min_len_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_min_len_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if remember attribute of pam_unix.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_unix_remember:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_password_pam_unix_remember:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if remember attribute of pam_pwhistory.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of PASS_WARN_AGE should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_warn_age:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_warn_age_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_warn_age_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check maximum failed login attempts allowed in /etc/pam.d/system-auth (authfail)" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock_so is called in account phase of /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check maximum failed login attempts allowed in /etc/pam.d/password-auth (authfail)" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock_so is called in account phase of /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum preauth fail_interval allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum authfail fail_interval allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum authfail fail_interval allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum preauth fail_interval allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check preauth maximum failed login attempts allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check authfail maximum failed login attempts allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check authfail maximum failed login attempts allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check preauth maximum failed login attempts allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check if there aren't directories in root's path having write permission set for group or other" id="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile" id="oval:ssg-test_etc_profile_tmout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_profile_tmout:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile.d/*.sh" id="oval:ssg-test_etc_profiled_tmout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_profiled_tmout:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/bashrc umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_bashrc:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_bashrc:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_bashrc:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/csh.cshrc umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_csh_cshrc:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_csh_cshrc:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_csh_cshrc:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/login.defs umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/profile umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_profile:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_profile:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_profile:ste:1" />
</ns7:variable_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing existence of new aide database file" id="oval:ssg-test_aide_build_new_database_absolute_path:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_aide_build_new_database_absolute_path:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing existence of operational aide database file" id="oval:ssg-test_aide_operational_database_absolute_path:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_aide_operational_database_absolute_path:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_periodic_cron_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_periodic_cron_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_crond_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_crond_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_var_cron_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_var_cron_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_checking:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_aide_crontabs_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_scan_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_scan_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_var_cron_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_var_cron_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes in cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_crontabs_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Verify non-FIPS hashes are not configured in /etc/aide.conf" id="oval:ssg-test_aide_non_fips_hashes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_non_fips_hashes:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify FIPS hashes are configured in /etc/aide.conf" id="oval:ssg-test_aide_use_fips_hashes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_use_fips_hashes:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_use_fips_hashes:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="acl is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_acls:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_verify_acls:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_verify_acls:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="xattrs is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_ext_attributes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_verify_ext_attributes:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_verify_ext_attributes:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audispd syslog plugin activated" id="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="log_group = root" id="oval:ssg-test_auditd_conf_log_group_not_root:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_conf_log_group_root:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="email account for actions" id="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="test the value of flush parameter in /etc/audit/auditd.conf" id="oval:ssg-test_auditd_data_retention_flush:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_flush:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_flush:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="max log file size" id="oval:ssg-test_auditd_data_retention_max_log_file:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_num_logs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_num_logs:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_num_logs:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_space_left_action:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_space_left_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_space_left_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/issue" id="oval:ssg-test_banner_etc_issue:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_etc_issue:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable Browsing" id="oval:ssg-test_cups_disable_browsing_browsing_off:tst:1" version="2">
<ns7:object object_ref="oval:ssg-obj_cups_disable_browsing_browsing_off:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Do not allow incoming printer information packets" id="oval:ssg-test_cups_disable_browsing_browseallow:tst:1" version="2">
<ns7:object object_ref="oval:ssg-obj_cups_disable_browsing_browseallow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable the more general port directive" id="oval:ssg-test_cups_disable_printserver_disable_port:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_cups_disable_printserver_disable_port:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Listen only at the localhost level" id="oval:ssg-test_cups_disable_printserver_use_listen:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_cups_disable_printserver_use_listen:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg-test_dir_perms_etc_httpd_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_dir_perms_etc_httpd_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_dir_perms_etc_httpd_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg-test_dir_perms_var_log_httpd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_dir_perms_var_log_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_dir_perms_var_log_httpd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="all local world-writable directories have sticky bit set" id="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_only_local_directories:obj:1" />
<ns6:state state_ref="oval:ssg-state_world_writable_and_not_sticky:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="sshd HostbasedAuthentication" id="oval:ssg-test_sshd_hostbasedauthentication:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_hostbasedauthentication:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests whether prelinking is disabled" id="oval:ssg-test_prelinking_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_prelinking_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Tests the value of the ^[\s]*\*[\s]+(hard|-)[\s]+core[\s]+([\d]+) setting in the /etc/security/limits.conf file" id="oval:ssg-test_core_dumps_limitsconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_core_dumps_limitsconf:obj:1" />
<ns7:state state_ref="oval:ssg-state_core_dumps_limitsconf:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/yum.conf" id="oval:ssg-test_yum_ensure_gpgcheck_globally_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_yum_ensure_gpgcheck_globally_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/dnf/dnf.conf" id="oval:ssg-test_dnf_ensure_gpgcheck_globally_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_dnf_ensure_gpgcheck_globally_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for existence of gpgcheck=0 in /etc/yum.repos.d/ files" id="oval:ssg-test_ensure_gpgcheck_never_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ensure_gpgcheck_never_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the presence of daily setting in /etc/logrotate.conf file" id="oval:ssg-test_logrotate_conf_daily_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logrotate_conf_daily_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the existence of /etc/cron.daily/logrotate file (and verify it actually calls logrotate utility)" id="oval:ssg-test_cron_daily_logrotate_existence:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_cron_daily_logrotate_existence:obj:1" />
</ns7:textfilecontent54_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="Red Hat release key package is installed" id="oval:ssg-test_package_gpgkey-fd431d51-4ae0493b_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-fd431d51-4ae0493b:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="Red Hat auxiliary key package is installed" id="oval:ssg-test_package_gpgkey-2fa658e0-45700c69_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-2fa658e0-45700c69:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="CentOS7 key package is installed" id="oval:ssg-test_package_gpgkey-f4a80eb5-53a7ff4b_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-f4a80eb5-53a7ff4b:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="CentOS6 key package is installed" id="oval:ssg-test_package_gpgkey-c105b9de-4e0fd3a3_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-c105b9de-4e0fd3a3:ste:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership" id="oval:ssg-test_file_groupowner_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg-test_file_groupowner_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_gshadow:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/passwd" id="oval:ssg-test_file_groupowner_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_passwd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg-test_file_owner_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg-test_file_owner_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_gshadow:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg-test_file_owner_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_passwd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary directories uid root" id="oval:ssg-test_ownership_binary_directories:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_binary_directories:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary files uid root" id="oval:ssg-test_ownership_binary_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_binary_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library directories uid root" id="oval:ssg-test_ownership_lib_dir:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_lib_dir:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library files uid root" id="oval:ssg-test_ownership_lib_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_lib_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_directories:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary files go-w" id="oval:ssg-test_perms_binary_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_binary_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing /etc/group permissions" id="oval:ssg-test_file_permissions_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_permissions_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/gshadow mode and ownership" id="oval:ssg-test_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_mode_0000:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/passwd mode and ownership" id="oval:ssg-test_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_mode_0644_or_stronger:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/shadow mode and ownership" id="oval:ssg-test_etc_shadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_shadow:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_mode_0000:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="home directories" id="oval:ssg-test_file_permissions_home_dirs:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_home_dirs:obj:1" />
<ns6:state state_ref="oval:ssg-state_home_dirs_wrong_perm:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/httpd/conf/* permissions" id="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1" />
<ns6:state state_ref="oval:ssg-state_wrong_file_permissions_httpd_server_conf_files:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library directories go-w" id="oval:ssg-test_perms_lib_dir:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_lib_dir:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library files go-w" id="oval:ssg-test_perms_lib_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_lib_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="world writable files" id="oval:ssg-test_file_permissions_unauthorized_world_write:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_world_write:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="files with no group owner" id="oval:ssg-test_file_permissions_ungroupowned:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_ungroupowned:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="/var/log/audit files mode 0640" id="oval:ssg-test_file_permissions_var_log_audit-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_var_log_audit_files-non_root:obj:1" />
<ns6:state state_ref="oval:ssg-state_not_mode_0640:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="/var/log/audit files mode 0600" id="oval:ssg-test_file_permissions_var_log_audit:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_var_log_audit_files:obj:1" />
<ns6:state state_ref="oval:ssg-state_not_mode_0600:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_enable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_enable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_format:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_format:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_protocol:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_protocol:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Banner for FTP Users" id="oval:ssg-test_ftp_present_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_present_banner:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify all GIDs referenced in /etc/passwd are defined in /etc/group" id="oval:ssg-test_gid_passwd_group_same:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gid_passwd_group_same:obj:1" />
<ns7:state state_ref="oval:ssg-state_gid_passwd_group_same:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable GDM Automatic Login" id="oval:ssg-test_disable_automatic_login:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_disable_automatic_login:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable GDM Guest Login" id="oval:ssg-test_disable_guest_login:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_disable_guest_login:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership /etc/shadow" id="oval:ssg-test_groupowner_etc_shadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_groupowner_shadow_file:obj:1" />
<ns6:state state_ref="oval:ssg-state_groupowner_shadow_file:ste:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="AntiVirus package is installed" id="oval:ssg-test_linuxshield_install_antivirus:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_linuxshield_install_antivirus:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="Runtime Libraries package is installed" id="oval:ssg-test_mcafee_runtime_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_runtime_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="Agent package is installed" id="oval:ssg-test_mcafee_management_agent:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_management_agent:obj:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="McAfee ACCM installed" id="oval:ssg-test_mcafee_accm_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_mcafee_accm_exists:obj:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="McAfee IPS is installed" id="oval:ssg-test_mcafee_hbss_hips_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="McAfee Policy Auditor installed" id="oval:ssg-test_mcafee_auditengine_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_mcafee_auditengine_exists:obj:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 6" id="oval:ssg-test_centos6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos6:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 7" id="oval:ssg-test_centos7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos7:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos7:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="only_one_exists" comment="fedora-release RPM package is installed" id="oval:ssg-test_fedora_release_rpm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_fedora_release_rpm:obj:1" />
</ns8:rpminfo_test>
<ns7:textfilecontent54_test check="all" comment="CPE vendor is 'fedoraproject' and 'product' is fedora" id="oval:ssg-test_fedora_vendor_product:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_fedora_vendor_product:obj:1" />
</ns7:textfilecontent54_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="Test installed OS is part of the unix family" id="oval:ssg-test_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 6" id="oval:ssg-test_rhel_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 6" id="oval:ssg-test_rhel_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 6" id="oval:ssg-test_rhel_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_computenode:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel7_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_rhel7_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_rhel7_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 7" id="oval:ssg-test_rhel7_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 7" id="oval:ssg-test_rhel7_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 7" id="oval:ssg-test_rhel7_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_computenode:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 6" id="oval:ssg-test_sl6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl6:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 7" id="oval:ssg-test_sl7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl7:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl7:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_unix_wrlinux:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_unix_wrlinux:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_wrlinux:ste:1" />
</ns7:family_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="Test presence of /etc/wrlinux-release." id="oval:ssg-test_wrlinux:tst:1" version="1">
<ns6:object object_ref="oval:ssg-obj_test_wrlinux:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test HostLimit" id="oval:ssg-test_logwatch_configured_hostlimit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logwatch_configured_hostlimit:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test SplitHosts" id="oval:ssg-test_logwatch_configured_splithosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logwatch_configured_splithosts:obj:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on /dev/shm" id="oval:ssg-test_nodev_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_nodev:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_nodev:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="noexec on /dev/shm" id="oval:ssg-test_noexec_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_noexec:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_noexec:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nosuid on /dev/shm" id="oval:ssg-test_nosuid_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_nosuid:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_nosuid:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on local filesystems" id="oval:ssg-test_nodev_nonroot_local_partitions:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_non_root_partitions:obj:1" />
<ns8:state state_ref="oval:ssg-state_local_nodev:ste:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nodev" id="oval:ssg-test_nfs_nodev_etc_fstab:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nfs_nodev_etc_fstab:obj:1" />
<ns7:state state_ref="oval:ssg-state_remote_filesystem_nodev:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="'nodev' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_nodev_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nodev_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nodev_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'nodev' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_nodev_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nodev_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'nodev' mount option in /etc/fstab" id="oval:ssg-test_nodev_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nodev_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nodev_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'nodev' mount option used for removable partition in runtime configuration" id="oval:ssg-test_nodev_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nodev_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" comment="'noexec' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_noexec_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_noexec_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_noexec_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'noexec' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_noexec_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_noexec_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'noexec' mount option in /etc/fstab" id="oval:ssg-test_noexec_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_noexec_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_noexec_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'noexec' mount option used for removable partition in runtime configuration" id="oval:ssg-test_noexec_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_noexec_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nosuid" id="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1" />
<ns7:state state_ref="oval:ssg-state_remote_filesystem_nosuid:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="'nosuid' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_nosuid_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nosuid_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nosuid_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'nosuid' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_nosuid_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nosuid_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'nosuid' mount option in /etc/fstab" id="oval:ssg-test_nosuid_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nosuid_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nosuid_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'nosuid' mount option used for removable partition in runtime configuration" id="oval:ssg-test_nosuid_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nosuid_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/fstab" id="oval:ssg-test_20340111:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340111:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" id="oval:ssg-test_20340112:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340111:obj:1" />
<ns7:state state_ref="oval:ssg-state_20340112:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/mtab" id="oval:ssg-test_20340113:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340112:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" id="oval:ssg-test_20340114:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340112:obj:1" />
<ns7:state state_ref="oval:ssg-state_20340112:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on /tmp" id="oval:ssg-test_nodev_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_nodev_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_nodev:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="noexec on /tmp" id="oval:ssg-test_noexec_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_noexec_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_noexec:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nosuid on /tmp" id="oval:ssg-test_nosuid_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_nosuid_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_nosuid:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" comment="Ensure /var/tmp is mounted" id="oval:ssg-test_mount_option_var_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_option_var_tmp:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure bind mount option is on /var/tmp" id="oval:ssg-test_mount_option_var_tmp_bind:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_mount_option_var_tmp_bind:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check NOZEROCONF=yes in /etc/sysconfig/network" id="oval:ssg-test_sysconfig_nozeroconf_yes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sysconfig_nozeroconf_yes:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for udp6 based rpc services" id="oval:ssg-test_network_ipv6_disable_rpc_udp6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_disable_rpc_udp6:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for tcp6 based rpc services" id="oval:ssg-test_network_ipv6_disable_rpc_tcp6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_disable_rpc_tcp6:obj:1" />
</ns7:textfilecontent54_test>
<ns6:interface_test check="all" check_existence="at_least_one_exists" comment="random" id="oval:ssg-test_promisc_interfaces:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_promisc_interfaces:obj:1" />
<ns6:state state_ref="oval:ssg-state_promisc:ste:1" />
</ns6:interface_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/etc/securetty file exists" id="oval:ssg-test_etc_securetty_exists:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_securetty_exists:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="no entries in /etc/securetty" id="oval:ssg-test_no_direct_root_logins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_direct_root_logins:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="make sure nullok is not used in /etc/pam.d/system-auth" id="oval:ssg-test_no_empty_passwords:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_empty_passwords:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check user ids on all files on the system" id="oval:ssg-no_files_unowned_by_user_test:tst:1" version="1">
<ns6:object object_ref="oval:ssg-file_permissions_unowned_object:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the insecure locks in /etc/exports" id="oval:ssg-test_no_insecure_locks_exports:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_no_insecure_locks_exports:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .netrc in /home" id="oval:ssg-test_no_netrc_files_home:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_netrc_files_home:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /root" id="oval:ssg-test_no_rsh_trust_files_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /home" id="oval:ssg-test_no_rsh_trust_files_home:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_home:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg-test_no_rsh_trust_files_etc:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_etc:obj:1" />
</ns6:file_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<0, UID_MIN - 1> system UIDs having shell set" id="oval:ssg-test_shell_defined_default_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_default_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_default_uid_range:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MIN not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_min_not_defined:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MAX not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_max_not_defined:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<0, SYS_UID_MIN> system UIDs having shell set" id="oval:ssg-test_shell_defined_reserved_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_reserved_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_reserved_uid_range:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<SYS_UID_MIN, SYS_UID_MAX> system UIDS having shell set" id="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1" />
</ns7:variable_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package aide is installed" id="oval:ssg-test_package_aide_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_aide_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package audit is installed" id="oval:ssg-test_package_audit_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_audit_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package bind is removed" id="oval:ssg-test_package_bind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_bind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dhcp is removed" id="oval:ssg-test_package_dhcp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dhcp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dovecot is removed" id="oval:ssg-test_package_dovecot_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dovecot_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package dracut-fips is installed" id="oval:ssg-test_package_dracut-fips_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dracut-fips_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package httpd is removed" id="oval:ssg-test_package_httpd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_httpd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package mcstrans is removed" id="oval:ssg-test_package_mcstrans_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_mcstrans_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package net-snmp is removed" id="oval:ssg-test_package_net-snmp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_net-snmp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package ntp is installed" id="oval:ssg-test_package_ntp_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ntp_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package openldap-servers is removed" id="oval:ssg-test_package_openldap-servers_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openldap-servers_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package openssh-server is removed" id="oval:ssg-test_package_openssh-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openssh-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package prelink is removed" id="oval:ssg-test_package_prelink_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_prelink_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rsh-server is removed" id="oval:ssg-test_package_rsh-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsh-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rsh is removed" id="oval:ssg-test_package_rsh_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsh_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package rsyslog is installed" id="oval:ssg-test_package_rsyslog_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsyslog_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package samba-common is installed" id="oval:ssg-test_package_samba-common_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba-common_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package samba-common is removed" id="oval:ssg-test_package_samba-common_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba-common_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package screen is installed" id="oval:ssg-test_package_screen_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_screen_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package sendmail is removed" id="oval:ssg-test_package_sendmail_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_sendmail_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package setroubleshoot is removed" id="oval:ssg-test_package_setroubleshoot_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_setroubleshoot_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package squid is removed" id="oval:ssg-test_package_squid_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_squid_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package talk-server is removed" id="oval:ssg-test_package_talk-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_talk-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package talk is removed" id="oval:ssg-test_package_talk_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_talk_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package telnet-server is removed" id="oval:ssg-test_package_telnet-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_telnet-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package telnet is removed" id="oval:ssg-test_package_telnet_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_telnet_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package tftp-server is removed" id="oval:ssg-test_package_tftp-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_tftp-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package tftp is removed" id="oval:ssg-test_package_tftp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_tftp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package vsftpd is installed" id="oval:ssg-test_package_vsftpd_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_vsftpd_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package vsftpd is removed" id="oval:ssg-test_package_vsftpd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_vsftpd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package xinetd is removed" id="oval:ssg-test_package_xinetd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_xinetd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ypbind is removed" id="oval:ssg-test_package_ypbind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ypbind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ypserv is removed" id="oval:ssg-test_package_ypserv_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ypserv_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/home on own partition" id="oval:ssg-test_home_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_home_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/tmp on own partition" id="oval:ssg-test_tmp_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_own_tmp_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/var on own partition" id="oval:ssg-test_var_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/var/log on own partition" id="oval:ssg-test_var_log_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_log_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="check for /var/log/audit partition" id="oval:ssg-test_var_log_audit_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_log_audit_own_partition:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set banner" id="oval:ssg-test_postfix_server_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_postfix_server_banner:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check if expected removable partitions truly exist on the system" id="oval:ssg-test_removable_partition_doesnt_exist:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_removable_partition_doesnt_exist:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for client signing = mandatory in /etc/samba/smb.conf" id="oval:ssg-test_require_smb_client_signing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_require_smb_client_signing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="serial ports /etc/securetty" id="oval:ssg-test_serial_ports_etc_securetty:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_serial_ports_etc_securetty:obj:1" />
</ns7:textfilecontent54_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with : or ." id="oval:ssg-test_env_var_begins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_begins_colon_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH doesn't contain : twice in a row" id="oval:ssg-test_env_var_contains_doublecolon:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_double_colon:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH doesn't contain . twice in a row" id="oval:ssg-test_env_var_contains_doubleperiod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_double_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH ends with : or ." id="oval:ssg-test_env_var_ends:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_ends_colon_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with an absolute path /" id="oval:ssg-test_env_var_begins_slash:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_begins_slash:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH contains relative paths" id="oval:ssg-test_env_var_contains_relative_path:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_relative_path:ste:1" />
</ns7:environmentvariable58_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="verify file md5 hashes" id="oval:ssg-test_files_fail_md5_hash:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_md5_hash:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="user ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_user_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_user_ownership:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="group ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_group_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_group_ownership:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="mode of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_mode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_mode:obj:1" />
</ns8:rpmverifyfile_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Ensure that the /etc/rsyslog.conf does not contain $InputTCPServerRun | $UDPServerRun | $InputRELPServerRun" id="oval:ssg-test_rsyslog_nolisten:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_rsyslog_nolisten:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_conf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_d:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_remote_loghost_rsyslog_d:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="virtual consoles /etc/securetty" id="oval:ssg-test_virtual_consoles_etc_securetty:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_virtual_consoles_etc_securetty:obj:1" />
</ns7:textfilecontent54_test>
<ns8:selinuxsecuritycontext_test check="none satisfy" check_existence="any_exist" comment="device_t in /dev" id="oval:ssg-test_selinux_all_devicefiles_labeled:tst:1" version="2">
<ns8:object object_ref="oval:ssg-object_selinux_all_devicefiles_labeled:obj:1" />
<ns8:state state_ref="oval:ssg-state_selinux_all_devicefiles_labeled:ste:1" />
</ns8:selinuxsecuritycontext_test>
<ns8:selinuxsecuritycontext_test check="none satisfy" check_existence="any_exist" comment="device_t in /dev" id="oval:ssg-test_selinux_confinement_of_daemons:tst:1" version="2">
<ns8:object object_ref="oval:ssg-object_selinux_confinement_of_daemons:obj:1" />
<ns8:state state_ref="oval:ssg-state_selinux_confinement_of_daemons:ste:1" />
</ns8:selinuxsecuritycontext_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*SELINUXTYPE[\s]*=[\s]*([^#]*) expression in the /etc/selinux/config file" id="oval:ssg-test_selinux_policy:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_selinux_policy:obj:1" />
<ns7:state state_ref="oval:ssg-state_selinux_policy:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/selinux/enforce is 1" id="oval:ssg-test_etc_selinux_config:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_selinux_config:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_selinux_config:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg-test_etc_libuser_conf_cryptstyle:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_libuser_conf_cryptstyle:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of ENCRYPT_METHOD should be set appropriately in /etc/login.defs" id="oval:ssg-test_etc_login_defs_encrypt_method:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_encrypt_method_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_encrypt_method_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-test_pam_unix_sha512:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_pam_unix_sha512:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_default_communities:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_snmp_default_communities:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_versions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_snmp_versions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="sshd uses protocol 2" id="oval:ssg-test_sshd_allow_only_protocol2:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_allow_only_protocol2:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitEmptyPasswords[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitemptypasswords_no:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the IgnoreRhosts[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_rsh_emulation_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_rsh_emulation_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the RhostsRSAAuthentication[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitRootLogin[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitrootlogin_no:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_permitrootlogin_no:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the IgnoreUserKnownHosts[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_user_known_hosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check value of PermitUserEnvironment in /etc/ssh/sshd_config" id="oval:ssg-test_sshd_no_user_envset:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_no_user_envset:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the Banner[\s]+/etc/issue setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_banner_set:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_banner_set:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="timeout is configured" id="oval:ssg-test_sshd_idle_timeout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_idle_timeout:obj:1" />
<ns7:state state_ref="oval:ssg-state_timeout_value_upper_bound:ste:1" />
<ns7:state state_ref="oval:ssg-state_timeout_value_lower_bound:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ClientAliveCountMax setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_clientalivecountmax:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_clientalivecountmax:obj:1" />
<ns7:state state_ref="oval:ssg-state_sshd_clientalivecountmax:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of Ciphers setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_ciphers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_use_approved_ciphers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of MACs setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_macs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_use_approved_macs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*BOOTPROTO[\s]*=[\s]*([^#]*) expression in the /etc/sysconfig/network-scripts/ifcfg-.* file" id="oval:ssg-test_sysconfig_networking_bootproto_ifcfg:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sysconfig_networking_bootproto_ifcfg:obj:1" />
<ns7:state state_ref="oval:ssg-state_sysconfig_networking_bootproto_ifcfg:ste:1" />
</ns7:textfilecontent54_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppc_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_ppc_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_ppc_64:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppcle_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_ppcle_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_ppcle_64:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="32 bit architecture" id="oval:ssg-test_system_info_architecture_x86:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_x86:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_x86:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_x86_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_x86_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_x86_64:ste:1" />
</ns6:uname_test>
<ns7:textfilecontent54_test check="all" comment="tftpd secure mode" id="oval:ssg-test_tftpd_uses_secure_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_tftpd_uses_secure_mode:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/init.d/functions umask value(s) match the var_umask_for_daemons requirement" id="oval:ssg-tst_umask_for_daemons:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_umask_for_daemons:obj:1" />
<ns7:state state_ref="oval:ssg-ste_umask_for_daemons:ste:1" />
</ns7:variable_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/shadow" id="oval:ssg-test_userowner_shadow_file:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_etc_shadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_etc_shadow_uid_root:ste:1" />
</ns6:file_test>
<ns7:variable_test check="all" check_existence="at_least_one_exists" comment="Verify the existence of var_accounts_user_umask_as_number variable" id="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Check if removable partition variable value represents CD/DVD drive" id="oval:ssg-test_var_removable_partition_is_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_removable_partition_is_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_removable_partition_is_cd_dvd_drive:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" check_existence="at_least_one_exists" comment="Verify the existence of var_umask_for_daemons_as_number variable" id="oval:ssg-test_existence_of_var_umask_for_daemons_as_number_variable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_umask_for_daemons_umask_as_number:obj:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="query /proc/net/wireless" id="oval:ssg-test_wireless_disable_interfaces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_wireless_disable_interfaces:obj:1" />
</ns7:textfilecontent54_test>
</ns3:tests>
<ns3:objects>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfg_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfg_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfg_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_groupownership:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfg_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfo_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfo_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfo_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_ownership:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfo_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfp_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfp_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfp_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_permissions:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfp_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_dcredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*dcredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_difok:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*difok=(\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_lcredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*lcredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_maxrepeat:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*maxrepeat=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_password_pam_cracklib_minclass:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]minclass=(\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_minlen:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*minlen=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_ocredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*ocredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_retry:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*retry=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_ucredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*ucredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chmod_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chmod_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmod_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmod_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmodat_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmodat_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchownat_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchownat_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lchown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lchown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_removexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_removexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_setxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_setxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_file_deletion_events:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+rmdir\s+\-S\s+unlink\s+\-S\s+unlinkat\s+\-S\s+rename\s+\-S\s+renameat\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_immutable:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-e\s+2\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_insmod:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/sbin/insmod[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_rmmod:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/sbin/rmmod[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_modprobe:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/sbin/modprobe[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_syscall:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+init_module\s+\-S\s+delete_module\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_tallylog:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/tallylog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_faillock:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/run/faillock/\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_lastlog:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/lastlog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_mac_modification:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/selinux/[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_media_export:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+mount\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_syscall:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+sethostname\s+\-S\s+setdomainname\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/issue[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue_net:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/issue\.net[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_hosts:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/hosts[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_sysconfig_network:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/sysconfig/network[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="system files with setuid or setgid permission set" id="oval:ssg-object_system_privileged_commands:obj:1" version="1">
<ns6:behaviors recurse_file_system="local" />
<ns6:path operation="pattern match">\/(?:(?!dev|proc|sys).)+</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_setuid_or_setgid_set:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(-a always,exit -F path=[^\n]+ -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged)[\s]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
<ns3:filter action="exclude">oval:ssg-state_proper_always_exit_rule_but_for_unprivileged_command:ste:1</ns3:filter>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_dimension_of_object_system_privileged_commands:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_dimension_of_object_system_privileged_commands:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_utmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/run/utmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_btmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/btmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_wtmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/wtmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_sysadmin_actions:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/sudoers[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_adjtimex_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_adjtimex_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_clock_settime_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32[\s]+-S[\s]+clock_settime[\s]+-F[\s]+a0=(?:0x)?0[\s]+(?:-F[\s]+key=|-k[\s]+)time-change[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_clock_settime_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64[\s]+-S[\s]+clock_settime[\s]+-F[\s]+a0=(?:0x)?0[\s]+(?:-F[\s]+key=|-k[\s]+)time-change[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_settimeofday_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_settimeofday_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_stime_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+stime[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_watch_localtime:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-w[\s]+\/etc\/localtime[\s]+-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b32\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b32\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b64\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b64\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s+]\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi TTL setting" id="oval:ssg-object_avahi_ttl_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*check\-response\-ttl=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi disable publishing" id="oval:ssg-object_avahi_disable_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable\-publishing=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi IPv4 setting" id="oval:ssg-object_avahi_ipv4_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*use\-ipv4=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi IPv6 setting" id="oval:ssg-object_avahi_ipv6_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*use\-ipv6=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Prevent Avahi Port Sharing" id="oval:ssg-object_avahi_port_sharing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disallow\-other\-stacks=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict User Publishing" id="oval:ssg-object_avahi_restrict_user_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable\-user\-service\-publishing=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Address Publishing" id="oval:ssg-object_avahi_restrict_address_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-addresses=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict HW Publishing" id="oval:ssg-object_avahi_restrict_CPU_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-hinfo=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Workstation Publishing" id="oval:ssg-object_avahi_restrict_workstation_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-workstation=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Domain Publishing" id="oval:ssg-object_avahi_restrict_domain_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-domain=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_audit_argument:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_nousb_argument:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_password:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+--encrypted[\s]+.*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_domain-named:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+domain\-name[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_domain-name-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+domain\-name\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_nis-domain:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+nis\-domain[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_nis-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+nis\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_ntp-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+ntp\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_routers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+routers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_time-offset:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+time\-offset[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_subnet-mask:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+subnet\-mask[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_broadcast-address:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+broadcast\-address[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_configure_logging:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*daemon\.\*[\s]+\/var\/log\/daemon\.log$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_disable_bootp:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*deny[\s]+bootp\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_deny_declines:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*deny[\s]+declines\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_disable_ddns:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ddns\-update\-style[\s]+none\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_domain-named_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+domain\-name[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_domain-name-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+domain\-name\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_nis-domain_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+nis\-domain[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_nis-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+nis\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_ntp-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+ntp\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_routers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+routers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_time-offset_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+time\-offset[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="all local directories" id="oval:ssg-all_local_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_gid_is_user_and_world_writable:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object comment="Disable Ctrl-Alt-Del key sequence" id="oval:ssg-object_test_disable_ctrlaltdel:obj:1" version="1">
<ns7:filepath>/etc/init/control-alt-delete.override</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*exec[\s]*/sbin/shutdown[\s]*\-r[\s]*now.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-object_test_disable_ctrlaltdel_exists:obj:1" version="1">
<ns6:filepath>/etc/init/control-alt-delete.override</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_interactive_boot_disabled_in_sysconfig_init:obj:1" version="2">
<ns7:filepath>/etc/sysconfig/init</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*PROMPT=no[\s]+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_confirm_kernel_boot_argument_not_present:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*kernel[\s]+.*confirm.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_display_login_attempts:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+showfailed</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dovecot_disable_plaintext_auth:obj:1" version="1">
<ns7:filepath>/etc/dovecot/conf.d/10-auth.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable_plaintext_auth[\s]*=[\s]*yes[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dovecot_enable_ssl:obj:1" version="1">
<ns7:filepath>/etc/dovecot/conf.d/10-ssl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ssl[\s]*=[\s]*(yes|required)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" id="oval:ssg-object_selinux_grub:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*kernel[\s]+.*(selinux|enforcing)=0.*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_group_owner_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/efi/EFI/redhat/grub.conf" id="oval:ssg-object_file_group_owner_efi_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/efi/EFI/redhat/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_permissions_grub_conf:obj:1" version="2">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="files with sgid set" id="oval:ssg-object_file_permissions_unauthorized_sgid:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_sgid:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_sgid_whitelist:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="files with suid set" id="oval:ssg-object_file_permissions_unauthorized_suid:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_suid:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_suid_whitelist:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_user_owner_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/efi/EFI/redhat/grub.conf" id="oval:ssg-object_file_user_owner_efi_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/efi/EFI/redhat/grub.conf</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object comment="Configure FTP firewall" id="oval:ssg-object_configure_firewall:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables-config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*IPTABLES_MODULES=\".*ip_conntrack_ftp.*\"$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Disable uploads" id="oval:ssg-object_ftp_disable_uploads:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*write_enable=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Enable ftp user list" id="oval:ssg-object_ftp_user_list_enable:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_enable=YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Set ftp user list file" id="oval:ssg-object_ftp_user_list_file:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_file=\/etc\/vsftp\.ftpusers$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Use ftp user list" id="oval:ssg-object_ftp_user_list_deny:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_deny=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Disable anonymous access" id="oval:ssg-object_ftp_restrict_to_anon:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*local_enable=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_disable_user_list_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_user_list']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_disable_user_list_no_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_user_list']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable:obj:1" version="1">
<ns7:filepath>/var/lib/gdm/.gconf/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable_no_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/var/lib/gdm/.gconf/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_no_tree_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_tree_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_automount:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='media_automount']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_automount:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='media_automount']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_automount_autorun:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='media_autorun_never']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_automount_autorun:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='media_autorun_never']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_clock_temperature:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/panel/applets/clock/prefs/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='show_temperature']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_clock_temperature:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/dir/dir/entry[@name='show_temperature']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_clock_weather:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/panel/applets/clock/prefs/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='show_weather']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_clock_weather:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/dir/dir/entry[@name='show_weather']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_disable_ctrlaltdel_reboot:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome_settings_daemon/keybindings/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='power']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_disable_ctrlaltdel_reboot:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='power']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_restart_shutdown:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_restart_buttons']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_restart_shutdown:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_restart_buttons']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_thumbnailers:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/thumbnailers/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_all']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_thumbnailers:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_all']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_create:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-wifi-create']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_create:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-wifi-create']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_disconnect:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-disconnected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_disconnect:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-disconnected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_notification:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-connected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_notification:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-connected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_idle_activated:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='idle_activation_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_idle_activated:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='idle_activation_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_idle_delay:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='idle_delay']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_idle_delay:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='idle_delay']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_screensaver_lock_enabled:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='lock_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_screensaver_lock_enabled:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='lock_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_max_idle_action:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='max_idle_action']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_action:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='max_idle_action']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_max_idle_time:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='max_idle_time']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_time:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='max_idle_time']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_mode:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='mode']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_mode:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='mode']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:textfilecontent54_object id="oval:ssg-object_grub_enable_fips_mode:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for port 22 access over ipv4" id="oval:ssg-obj_iptables_sshd_disabled_ipv4:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for port 22 access over ipv6" id="oval:ssg-obj_iptables_sshd_disabled_ipv6:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Block device names on the system" id="oval:ssg-object_system_block_devices:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/sys/block/</ns6:path>
<ns6:filename operation="pattern match">[^\/]+</ns6:filename>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_system_ssd_drives:obj:1" version="1">
<ns7:filepath var_check="at least one" var_ref="oval:ssg-variable_system_block_devices_rotational_paths:var:1" />
<ns7:pattern operation="pattern match">^0$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_kernel_disable_entropy_contribution_for_solid_state_drives:obj:1" version="1">
<ns7:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-variable_system_solid_state_drives_paths:var:1" />
<ns7:pattern operation="pattern match">^1$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module bluetooth disabled" id="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of bluetooth" id="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module cramfs disabled" id="oval:ssg-obj_kernmod_cramfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of cramfs" id="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module dccp disabled" id="oval:ssg-obj_kernmod_dccp_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of dccp" id="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module freevxfs disabled" id="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of freevxfs" id="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module hfs disabled" id="oval:ssg-obj_kernmod_hfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of hfs" id="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module hfsplus disabled" id="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of hfsplus" id="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="ipv6 disabled any modprobe conf file" id="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*options\s+ipv6\s+.*disable=1.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module jffs2 disabled" id="oval:ssg-obj_kernmod_jffs2_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of jffs2" id="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module rds disabled" id="oval:ssg-obj_kernmod_rds_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+rds\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of rds" id="oval:ssg-obj_kernmod_rds_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+rds\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module sctp disabled" id="oval:ssg-obj_kernmod_sctp_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of sctp" id="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module squashfs disabled" id="oval:ssg-obj_kernmod_squashfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of squashfs" id="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module tipc disabled" id="oval:ssg-obj_kernmod_tipc_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+tipc\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of tipc" id="oval:ssg-obj_kernmod_tipc_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+tipc\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module udf disabled" id="oval:ssg-obj_kernmod_udf_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of udf" id="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module usb-storage disabled" id="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of usb-storage" id="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_start_tls_ssl:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ssl[\s]+start_tls[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_tls_cacertdir:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*tls_cacertdir[\s]+/etc/pki/tls/CA$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_tls_cacertfile:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*tls_cacertfile[\s]+/etc/pki/tls/CA/.*\.(pem|crt)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Define default gateways" id="oval:ssg-obj_network_ipv6_default_gateway:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6_DEFAULTGW=.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Enable privacy extensions on each interface" id="oval:ssg-obj_network_ipv6_privacy_extensions:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6_PRIVACY=rfc3041$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Set static IPv6 address on each interface" id="oval:ssg-obj_network_ipv6_static_address:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6ADDR=.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Ensure more than one ntpd NTP server is set" id="oval:ssg-obj_ntpd_multiple_servers:obj:1" version="1">
<ns7:filepath>/etc/ntp.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^([\s]*server[\s]+.+$){2,}$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Ensure at least one ntpd NTP server is set" id="oval:ssg-obj_ntp_remote_server:obj:1" version="1">
<ns7:filepath>/etc/ntp.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*server[\s]+.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_GConf2_installed:obj:1" version="1">
<ns8:name>GConf2</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_abrt_removed:obj:1" version="1">
<ns8:name>abrt</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_at_removed:obj:1" version="1">
<ns8:name>at</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_autofs_removed:obj:1" version="1">
<ns8:name>autofs</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_avahi_installed:obj:1" version="1">
<ns8:name>avahi</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_bluez_removed:obj:1" version="1">
<ns8:name>bluez</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cpuspeed_removed:obj:1" version="1">
<ns8:name>cpuspeed</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cronie_installed:obj:1" version="1">
<ns8:name>cronie</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cups_removed:obj:1" version="1">
<ns8:name>cups</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cyrus-sasl_removed:obj:1" version="1">
<ns8:name>cyrus-sasl</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dbus_removed:obj:1" version="1">
<ns8:name>dbus</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_esc_installed:obj:1" version="1">
<ns8:name>esc</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_gdm_installed:obj:1" version="1">
<ns8:name>gdm</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_hal_removed:obj:1" version="1">
<ns8:name>hal</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iptables-ipv6_installed:obj:1" version="1">
<ns8:name>iptables-ipv6</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iptables_installed:obj:1" version="1">
<ns8:name>iptables</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iputils_removed:obj:1" version="1">
<ns8:name>iputils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_irqbalance_installed:obj:1" version="1">
<ns8:name>irqbalance</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_kexec-tools_removed:obj:1" version="1">
<ns8:name>kexec-tools</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_libcgroup_removed:obj:1" version="1">
<ns8:name>libcgroup</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_mdadm_removed:obj:1" version="1">
<ns8:name>mdadm</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_nfs-utils_removed:obj:1" version="1">
<ns8:name>nfs-utils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ntpdate_removed:obj:1" version="1">
<ns8:name>ntpdate</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_oddjob_removed:obj:1" version="1">
<ns8:name>oddjob</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openswan_installed:obj:1" version="1">
<ns8:name operation="pattern match">^(open|libre)swan$</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pam_ldap_removed:obj:1" version="1">
<ns8:name>pam_ldap</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pam_pkcs11_installed:obj:1" version="1">
<ns8:name>pam_pkcs11</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pcsc-lite_installed:obj:1" version="1">
<ns8:name>pcsc-lite</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_policycoreutils_installed:obj:1" version="1">
<ns8:name>policycoreutils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_portreserve_removed:obj:1" version="1">
<ns8:name>portreserve</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_postfix_installed:obj:1" version="1">
<ns8:name>postfix</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_psacct_installed:obj:1" version="1">
<ns8:name>psacct</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1" version="1">
<ns8:name>qpid-cpp-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_quota_removed:obj:1" version="1">
<ns8:name>quota</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rhnsd_removed:obj:1" version="1">
<ns8:name>rhnsd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rpcbind_removed:obj:1" version="1">
<ns8:name>rpcbind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba_removed:obj:1" version="1">
<ns8:name>samba</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_smartmontools_removed:obj:1" version="1">
<ns8:name>smartmontools</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_subscription-manager_removed:obj:1" version="1">
<ns8:name>subscription-manager</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_sysstat_removed:obj:1" version="1">
<ns8:name>sysstat</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_xorg-x11-server-common_removed:obj:1" version="1">
<ns8:name>xorg-x11-server-common</ns8:name>
</ns8:rpminfo_object>
<ns7:textfilecontent54_object comment="inet_interfaces in /etc/postfix/main.cf should be set correctly" id="oval:ssg-obj_postfix_network_listening_disabled:obj:1" version="1">
<ns7:filepath>/etc/postfix/main.cf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*inet_interfaces[\s]*=[\s]*localhost[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_require_singleuser_auth:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/init</ns7:filepath>
<ns7:pattern operation="pattern match">^SINGLE=/sbin/sulogin[\s]*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rexec_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rexec</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rlogin_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rlogin</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rsh_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rsh</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object comment="Disable Telnet Service" id="oval:ssg-obj_service_telnetd_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/telnet</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+no\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ip6tables_input_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ip6tables_input_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_input_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_input_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_forward_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:FORWARD\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_forward_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:FORWARD\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1" version="1">
<ns7:filepath>/etc/pam_pkcs11/pam_pkcs11.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*cert_policy=(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_enabled_system_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_enabled_system_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_required_system_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_required_system_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_required_smartcard_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/smartcard-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_required_smartcard_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_fs_suid_dumpable:obj:1" version="1">
<ns6:name>fs.suid_dumpable</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_dmesg_restrict:obj:1" version="1">
<ns6:name>kernel.dmesg_restrict</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_exec_shield:obj:1" version="1">
<ns6:name>kernel.exec-shield</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_randomize_va_space:obj:1" version="1">
<ns6:name>kernel.randomize_va_space</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.log_martians</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.rp_filter</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.secure_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.send_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.rp_filter</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.secure_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.send_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns6:name>net.ipv4.icmp_echo_ignore_broadcasts</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns6:name>net.ipv4.icmp_ignore_bogus_error_responses</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_ip_forward:obj:1" version="1">
<ns6:name>net.ipv4.ip_forward</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns6:name>net.ipv4.tcp_syncookies</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_ra</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.forwarding</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_ra</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*fs.suid_dumpable[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_fs_suid_dumpable:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*fs.suid_dumpable[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.dmesg_restrict[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_dmesg_restrict:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.dmesg_restrict[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.exec-shield[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_exec_shield:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.exec-shield[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.randomize_va_space[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_randomize_va_space:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.randomize_va_space[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.ip_forward[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_ip_forward:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.ip_forward[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_inittab_default_runlevel:obj:1" version="1">
<ns7:filepath>/etc/inittab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*id:3:initdefault:[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_default_useradd_inactive:obj:1" version="1">
<ns7:filepath>/etc/default/useradd</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*INACTIVE\s*=\s*(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_passwd_content:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^([^:]+):.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1" version="1">
<ns7:filepath>/etc/security/limits.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1" version="1">
<ns7:path>/etc/security/limits.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1" version="1">
<ns7:path>/etc/security/limits.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MAX_DAYS\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_max_days_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_max_days_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_DAYS\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_min_days_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_min_days_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_no_uid_except_root:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!root:)[^:]*:[^:]*:0</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:password_object id="oval:ssg-object_accounts_password_all_shadowed:obj:1" version="1">
<ns6:username operation="pattern match">.*</ns6:username>
</ns6:password_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_LEN\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_min_len_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_min_len_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_unix_remember:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:sufficient)|(?:required))\s+pam_unix\.so.*remember=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:requisite)|(?:required))\s+pam_pwhistory\.so.*remember=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_WARN_AGE\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_warn_age_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_warn_age_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]+(?s).*[\n][\s]*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[\s]+[^\n]*deny=([0-9]+)[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]+(?s).*[\n][\s]*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[\s]+[^\n]*deny=([0-9]+)[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:environmentvariable58_object id="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1" version="1">
<ns7:pid datatype="int" xsi:nil="true" />
<ns7:name>PATH</ns7:name>
</ns7:environmentvariable58_object>
<ns6:file_object comment="root's path directories with wrong group / other write permissions" id="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1" version="1">
<ns6:path var_check="at least one" var_ref="oval:ssg-var_accounts_root_path_dirs_no_write:var:1" />
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_accounts_root_path_dirs_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_profile_tmout:obj:1" version="1">
<ns7:filepath>/etc/profile</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*TMOUT[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_profiled_tmout:obj:1" version="1">
<ns7:path>/etc/profile.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.sh$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*TMOUT[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/bashrc" id="oval:ssg-obj_umask_from_etc_bashrc:obj:1" version="1">
<ns7:filepath>/etc/bashrc</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_bashrc:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_bashrc_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/csh.cshrc" id="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" version="1">
<ns7:filepath>/etc/csh.cshrc</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_csh_cshrc:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_csh_cshrc_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/login.defs" id="oval:ssg-obj_umask_from_etc_login_defs:obj:1" version="1">
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_login_defs_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/profile" id="oval:ssg-obj_umask_from_etc_profile:obj:1" version="1">
<ns7:filepath>/etc/profile</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_profile:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_profile_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_build_database_dirpath:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^@@define[\s]DBDIR[\s]+(/.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_build_new_database_filename:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^database_out=file:@@{DBDIR}/([a-z.]+)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_operational_database_filename:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^database=file:@@{DBDIR}/([a-z.]+)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object id="oval:ssg-object_aide_build_new_database_absolute_path:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-variable_aide_build_new_database_absolute_path:var:1" />
</ns6:file_object>
<ns6:file_object id="oval:ssg-object_aide_operational_database_absolute_path:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-variable_aide_operational_database_absolute_path:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_test_aide_periodic_cron_checking:obj:1" version="1">
<ns7:filepath>/etc/crontab</ns7:filepath>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_test_aide_crond_checking:obj:1" version="1">
<ns7:path>/etc/cron.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_aide_var_cron_checking:obj:1" version="1">
<ns7:filepath>/var/spool/cron/root</ns7:filepath>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*(root|)/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron.(daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_checking:obj:1" version="1">
<ns7:path operation="pattern match">/etc/cron.(daily|weekly|monthly)</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_test_aide_scan_notification:obj:1" version="1">
<ns7:filepath>/etc/crontab</ns7:filepath>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_aide_var_cron_notification:obj:1" version="1">
<ns7:filepath>/var/spool/cron/root</ns7:filepath>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_notification:obj:1" version="1">
<ns7:path operation="pattern match">/etc/cron.(d|daily|weekly|monthly)</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_non_fips_hashes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[A-Z]*[\s]*=[\s]*.*(sha1|rmd160|sha256|whirlpool|tiger|haval|gost|crc32).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_use_fips_hashes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_verify_acls:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!ALLXTRAHASHES)[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_verify_ext_attributes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!ALLXTRAHASHES)[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1" version="1">
<ns7:filepath>/etc/audisp/plugins.d/syslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*active[ ]+=[ ]+yes[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log_group = root" id="oval:ssg-object_auditd_conf_log_group_root:obj:1" version="1">
<ns7:filepath operation="equals">/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*log_group[ ]+=[ ]+root[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*action_mail_acct[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*admin_space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_flush:obj:1" version="1">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*flush[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*max_log_file[ ]+=[ ]+(\d+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*max_log_file_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_num_logs:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*num_logs[ ]+=[ ]+(\d+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_space_left_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_banner_etc_issue:obj:1" version="1">
<ns7:filepath>/etc/issue</ns7:filepath>
<ns7:pattern operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_browsing_browsing_off:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Browsing[\s]+(?:Off|No)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_browsing_browseallow:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*BrowseAllow[\s]+(?:none)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_printserver_disable_port:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Port[\s]+(\d)+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_printserver_use_listen:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Listen[\s]+(?:localhost|127\.0\.0\.1|::1):(\d)+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/etc/httpd/conf/" id="oval:ssg-object_dir_perms_etc_httpd_conf:obj:1" version="1">
<ns6:path>/etc/httpd/conf</ns6:path>
<ns6:filename xsi:nil="true" />
</ns6:file_object>
<ns6:file_object comment="/var/log/httpd/" id="oval:ssg-object_dir_perms_var_log_httpd:obj:1" version="1">
<ns6:path>/var/log/httpd</ns6:path>
<ns6:filename xsi:nil="true" />
</ns6:file_object>
<ns6:file_object comment="only local directories" id="oval:ssg-object_only_local_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_world_writable_and_not_sticky:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_hostbasedauthentication:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)HostbasedAuthentication(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_prelinking_disabled:obj:1" version="2">
<ns7:filepath>/etc/sysconfig/prelink</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*PRELINKING=no[\s]*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_core_dumps_limitsconf:obj:1" version="1">
<ns7:filepath>/etc/security/limits.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:hard|-)[\s]+core[\s]+([\d]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="gpgcheck set in /etc/yum.conf" id="oval:ssg-object_yum_ensure_gpgcheck_globally_activated:obj:1" version="1">
<ns7:filepath>/etc/yum.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*1\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="gpgcheck set in /etc/dnf/dnf.conf" id="oval:ssg-object_dnf_ensure_gpgcheck_globally_activated:obj:1" version="1">
<ns7:filepath>/etc/dnf/dnf.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*1\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ensure_gpgcheck_never_disabled:obj:1" version="1">
<ns7:path>/etc/yum.repos.d</ns7:path>
<ns7:filename operation="pattern match">.*</ns7:filename>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*0\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logrotate_conf_daily_setting:obj:1" version="2">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/logrotate.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:daily)*.*(?=[\n][\s]*daily)(.*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
<ns3:filter action="exclude">oval:ssg-state_another_rotate_interval_after_daily:ste:1</ns3:filter>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_cron_daily_logrotate_existence:obj:1" version="1">
<ns7:filepath>/etc/cron.daily/logrotate</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*/usr/sbin/logrotate[\s]*/etc/logrotate.conf(?:.*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:rpminfo_object id="oval:ssg-object_package_gpg-pubkey:obj:1" version="1">
<ns8:name>gpg-pubkey</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_groupowner_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_file_groupowner_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_file_groupowner_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_owner_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_file_owner_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_file_owner_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="binary directories" id="oval:ssg-object_file_ownership_binary_directories:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_binaries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="binary files" id="oval:ssg-object_file_ownership_binary_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_binaries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library directories" id="oval:ssg-object_file_ownership_lib_dir:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_libraries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library files" id="oval:ssg-object_file_ownership_lib_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_libraries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="binary files" id="oval:ssg-object_file_permissions_binary_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_perms_binary_files_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_perms_binary_files_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_permissions_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_etc_shadow:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="home directories" id="oval:ssg-object_file_permissions_home_dirs:obj:1" version="2">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="exclude">oval:ssg-state_home_dirs_home_itself:ste:1</ns3:filter>
<ns3:filter action="include">oval:ssg-state_home_dirs_wrong_perm:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/etc/httpd/conf/* permissions" id="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/etc/httpd/conf</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="library directories" id="oval:ssg-object_file_permissions_lib_dir:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-perms_state_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library files" id="oval:ssg-object_file_permissions_lib_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-perms_state_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="world writable" id="oval:ssg-object_file_permissions_unauthorized_world_write:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_world_write:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_special_selinux_files:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_proc:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_sys:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="all local files" id="oval:ssg-object_file_permissions_ungroupowned:obj:1" version="1">
<ns6:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path>/</ns6:path>
<ns6:filename operation="pattern match">.*</ns6:filename>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_ungroupowned:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-etc_group_object:obj:1" version="1">
<ns7:filepath>/etc/group</ns7:filepath>
<ns7:pattern operation="pattern match">^[^:]+:[^:]*:([\d]+):[^:]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_var_log_audit_files-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_not_mode_0640:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_var_log_audit_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_not_mode_0600:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_enable:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*xferlog_enable[\s]*=[\s]*YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_format:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*xferlog_std_format[\s]*=[\s]*NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_protocol:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*log_ftp_protocol[\s]*=[\s]*YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Banner for FTP Users" id="oval:ssg-object_test_ftp_present_banner:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*banner_file[\s]*=[\s]*/etc/issue*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_gid_passwd_group_same_var:obj:1" version="1">
<ns7:filepath>/etc/group</ns7:filepath>
<ns7:pattern operation="pattern match">^.*:x:([0-9]+):</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_gid_passwd_group_same:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^.*:[0-9]+:([0-9]+):</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_disable_automatic_login:obj:1" version="1">
<ns7:filepath>/etc/gdm/custom.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\[daemon]([^\n]*\n+)+?AutomaticLoginEnable=[Ff]alse$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_disable_guest_login:obj:1" version="1">
<ns7:filepath>/etc/gdm/custom.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\[daemon]([^\n]*\n+)+?TimedLoginEnable=[Ff]alse$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_groupowner_shadow_file:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_linuxshield_install_antivirus:obj:1" version="1">
<ns8:name>McAfeeVSEForLinux</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_runtime_installed:obj:1" version="1">
<ns8:name>MFErt</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_management_agent:obj:1" version="1">
<ns8:name>MFEcma</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object id="oval:ssg-object_mcafee_accm_exists:obj:1" version="1">
<ns6:path>/opt/McAfee/accm/bin</ns6:path>
<ns6:filename>accm</ns6:filename>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1" version="1">
<ns8:name>MFEhiplsm</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object id="oval:ssg-object_mcafee_auditengine_exists:obj:1" version="1">
<ns6:path>/opt/McAfee/auditengine/bin</ns6:path>
<ns6:filename>auditmanager</ns6:filename>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_centos6:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_centos7:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-object_fedora_release_rpm:obj:1" version="1">
<ns8:name>fedora-release</ns8:name>
</ns8:rpminfo_object>
<ns7:textfilecontent54_object id="oval:ssg-object_fedora_vendor_product:obj:1" version="1">
<ns7:filepath>/etc/system-release-cpe</ns7:filepath>
<ns7:pattern operation="pattern match">^cpe:\/o:fedoraproject:fedora:[\d]+$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:family_object id="oval:ssg-object_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_rhel7_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl6:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl7:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_unix_wrlinux:obj:1" version="1" />
<ns6:file_object id="oval:ssg-obj_test_wrlinux:obj:1" version="1">
<ns6:filepath>/etc/wrlinux-release</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logwatch_configured_hostlimit:obj:1" version="1">
<ns7:filepath>/etc/logwatch/conf/logwatch.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]HostLimit[\s]*=[\s]*no[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logwatch_configured_splithosts:obj:1" version="1">
<ns7:filepath>/etc/logwatch/conf/logwatch.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]SplitHosts[\s]*=[\s]*yes[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_nodev:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_noexec:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_nosuid:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_non_root_partitions:obj:1" version="1">
<ns8:mount_point operation="pattern match">^/\w.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_local_nodev:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nfs_nodev_etc_fstab:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nodev_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nodev_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nodev_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nodev_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nodev_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nodev_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_noexec_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_noexec_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_noexec_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_noexec_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_noexec_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_noexec_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nosuid_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nosuid_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nosuid_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nosuid_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nosuid_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nosuid_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_20340111:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_20340112:obj:1" version="1">
<ns7:filepath>/etc/mtab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_tmp_nodev_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_tmp_noexec_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_tmp_nosuid_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_option_var_tmp:obj:1" version="1">
<ns8:mount_point operation="pattern match">/var/tmp</ns8:mount_point>
</ns8:partition_object>
<ns7:textfilecontent54_object comment="look for the partition mount point in /etc/mtab" id="oval:ssg-object_mount_option_var_tmp_bind:obj:1" version="1">
<ns7:filepath>/etc/mtab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*/tmp[\s]+/var/tmp[\s]+.*bind.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">
1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sysconfig_nozeroconf_yes:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/network</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*NOZEROCONF[\s]*=[\s]*yes</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for udp6 based rpc services" id="oval:ssg-obj_network_ipv6_disable_rpc_udp6:obj:1" version="1">
<ns7:filepath>/etc/netconfig</ns7:filepath>
<ns7:pattern operation="pattern match">^udp6\s+tpi_clts\s+v\s+inet6\s+udp\s+-\s+-$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for tcp6 based rpc services" id="oval:ssg-obj_network_ipv6_disable_rpc_tcp6:obj:1" version="1">
<ns7:filepath>/etc/netconfig</ns7:filepath>
<ns7:pattern operation="pattern match">^tcp6\s+tpi_cots_ord\s+v\s+inet6\s+tcp\s+-\s+-$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:interface_object id="oval:ssg-object_promisc_interfaces:obj:1" version="1">
<ns6:name operation="pattern match">^.*$</ns6:name>
<ns3:filter action="include">oval:ssg-state_promisc:ste:1</ns3:filter>
</ns6:interface_object>
<ns7:textfilecontent54_object comment="/etc/securetty file exists" id="oval:ssg-object_etc_securetty_exists:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="no entries /etc/securetty" id="oval:ssg-object_no_direct_root_logins:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_empty_passwords:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">\s*nullok\s*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-file_permissions_unowned_userid_list_object:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^[^:]+:[^:]+:([\d]+):[\d]+:[^:]*:[^:]+:[^:]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="all local files" id="oval:ssg-file_permissions_unowned_object:obj:1" version="1">
<ns6:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path>/</ns6:path>
<ns6:filename operation="pattern match">.*</ns6:filename>
<ns3:filter action="exclude">oval:ssg-file_permissions_unowned_userid_list_match:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_no_insecure_locks_exports:obj:1" version="2">
<ns7:filepath>/etc/exports</ns7:filepath>
<ns7:pattern operation="pattern match">^(.*?(\binsecure_locks\b)[^$]*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="look for .netrc in /home" id="oval:ssg-object_no_netrc_files_home:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename operation="pattern match">^\.netrc$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for .rhosts or .shosts in /root" id="oval:ssg-object_no_rsh_trust_files_root:obj:1" version="1">
<ns6:path operation="equals">/root</ns6:path>
<ns6:filename operation="pattern match">^\.(r|s)hosts$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for .rhosts or .shosts in /home" id="oval:ssg-object_no_rsh_trust_files_home:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename operation="pattern match">^\.(r|s)hosts$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg-object_no_rsh_trust_files_etc:obj:1" version="1">
<ns6:path operation="equals">/etc</ns6:path>
<ns6:filename operation="pattern match">^s?hosts\.equiv$</ns6:filename>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n(?!#|SYS_)(UID_MIN[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MIN[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MAX[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_passwd_entries:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!root).*:x:([\d]+):[\d]+:[^:]*:[^:]*:(?!\/sbin\/nologin|\/bin\/sync|\/sbin\/shutdown|\/sbin\/halt).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_default_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_default_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_reserved_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_reserved_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_dynalloc_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_aide_installed:obj:1" version="1">
<ns8:name>aide</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_audit_installed:obj:1" version="1">
<ns8:name>audit</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_bind_removed:obj:1" version="1">
<ns8:name>bind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dhcp_removed:obj:1" version="1">
<ns8:name>dhcp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dovecot_removed:obj:1" version="1">
<ns8:name>dovecot</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dracut-fips_installed:obj:1" version="1">
<ns8:name>dracut-fips</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_httpd_removed:obj:1" version="1">
<ns8:name>httpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_mcstrans_removed:obj:1" version="1">
<ns8:name>mcstrans</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_net-snmp_removed:obj:1" version="1">
<ns8:name>net-snmp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ntp_installed:obj:1" version="1">
<ns8:name>ntp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openldap-servers_removed:obj:1" version="1">
<ns8:name>openldap-servers</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openssh-server_removed:obj:1" version="1">
<ns8:name>openssh-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_prelink_removed:obj:1" version="1">
<ns8:name>prelink</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsh-server_removed:obj:1" version="1">
<ns8:name>rsh-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsh_removed:obj:1" version="1">
<ns8:name>rsh</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsyslog_installed:obj:1" version="1">
<ns8:name>rsyslog</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba-common_installed:obj:1" version="1">
<ns8:name>samba-common</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba-common_removed:obj:1" version="1">
<ns8:name>samba-common</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_screen_installed:obj:1" version="1">
<ns8:name>screen</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_sendmail_removed:obj:1" version="1">
<ns8:name>sendmail</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_setroubleshoot_removed:obj:1" version="1">
<ns8:name>setroubleshoot</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_squid_removed:obj:1" version="1">
<ns8:name>squid</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_talk-server_removed:obj:1" version="1">
<ns8:name>talk-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_talk_removed:obj:1" version="1">
<ns8:name>talk</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_telnet-server_removed:obj:1" version="1">
<ns8:name>telnet-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_telnet_removed:obj:1" version="1">
<ns8:name>telnet</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_tftp-server_removed:obj:1" version="1">
<ns8:name>tftp-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_tftp_removed:obj:1" version="1">
<ns8:name>tftp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_vsftpd_installed:obj:1" version="1">
<ns8:name>vsftpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_vsftpd_removed:obj:1" version="1">
<ns8:name>vsftpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_xinetd_removed:obj:1" version="1">
<ns8:name>xinetd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ypbind_removed:obj:1" version="1">
<ns8:name>ypbind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ypserv_removed:obj:1" version="1">
<ns8:name>ypserv</ns8:name>
</ns8:rpminfo_object>
<ns8:partition_object id="oval:ssg-object_mount_home_own_partition:obj:1" version="1">
<ns8:mount_point>/home</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_own_tmp_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_own_partition:obj:1" version="1">
<ns8:mount_point>/var</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_log_own_partition:obj:1" version="1">
<ns8:mount_point>/var/log</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_log_audit_own_partition:obj:1" version="1">
<ns8:mount_point>/var/log/audit</ns8:mount_point>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_postfix_server_banner:obj:1" version="1">
<ns7:filepath>/etc/postfix/main.cf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*smtpd_banner[\s]*=[\s]*\$myhostname[\s]+ESMTP[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object id="oval:ssg-object_removable_partition_doesnt_exist:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_require_smb_client_signing:obj:1" version="1">
<ns7:filepath>/etc/samba/smb.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*client[\s]+signing[\s]*=[\s]*mandatory</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="serial ports /etc/securetty" id="oval:ssg-object_serial_ports_etc_securetty:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^ttyS[0-9]+$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:environmentvariable58_object id="oval:ssg-object_root_path_no_dot:obj:1" version="1">
<ns7:pid datatype="int" xsi:nil="true" />
<ns7:name>PATH</ns7:name>
</ns7:environmentvariable58_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_md5_hash:obj:1" version="1">
<ns8:behaviors nomd5="false" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">^.*bin/.*$</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_md5_hash:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_user_ownership:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_user_ownership:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_group_ownership:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_group_ownership:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_mode:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_mode:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns7:textfilecontent54_object id="oval:ssg-object_rsyslog_nolisten:obj:1" version="2">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\$(?:Input(?:TCP|RELP)|UDP)ServerRun</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_d:obj:1" version="1">
<ns7:path>/etc/rsyslog.d</ns7:path>
<ns7:filename operation="pattern match">.*</ns7:filename>
<ns7:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="virtual consoles /etc/securetty" id="oval:ssg-object_virtual_consoles_etc_securetty:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^vc/[0-9]+$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:selinuxsecuritycontext_object comment="device_t in /dev" id="oval:ssg-object_selinux_all_devicefiles_labeled:obj:1" version="1">
<ns8:behaviors recurse_direction="down" />
<ns8:path>/dev</ns8:path>
<ns8:filename operation="pattern match">^.*$</ns8:filename>
<ns3:filter action="include">oval:ssg-state_selinux_all_devicefiles_labeled:ste:1</ns3:filter>
</ns8:selinuxsecuritycontext_object>
<ns8:selinuxsecuritycontext_object comment="none satisfy initrc_t in /proc" id="oval:ssg-object_selinux_confinement_of_daemons:obj:1" version="1">
<ns8:behaviors max_depth="1" recurse_direction="down" />
<ns8:path>/proc</ns8:path>
<ns8:filename operation="pattern match">^.*$</ns8:filename>
<ns3:filter action="include">oval:ssg-state_selinux_confinement_of_daemons:ste:1</ns3:filter>
</ns8:selinuxsecuritycontext_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_selinux_policy:obj:1" version="1">
<ns7:filepath>/etc/selinux/config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*SELINUXTYPE[\s]*=[\s]*([^\s]*)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_selinux_config:obj:1" version="1">
<ns7:filepath>/etc/selinux/config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*SELINUX[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg-object_etc_libuser_conf_cryptstyle:obj:1" version="1">
<ns7:filepath>/etc/libuser.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*crypt_style[\s]+=[\s]+(?i)sha512[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(ENCRYPT_METHOD\s+\w+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_encrypt_method_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_encrypt_method_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-object_pam_unix_sha512:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:sufficient))[\s]+pam_unix\.so[\s]+.*sha512.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_snmp_default_communities:obj:1" version="1">
<ns7:filepath>/etc/snmp/snmpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity|createUser).*(public|private)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_snmp_versions:obj:1" version="1">
<ns7:filepath>/etc/snmp/snmpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_allow_only_protocol2:obj:1" version="3">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Protocol[\s]+2[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitEmptyPasswords(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_rsh_emulation_disabled:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)IgnoreRhosts(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)RhostsRSAAuthentication(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_permitrootlogin_no:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitRootLogin(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)IgnoreUserKnownHosts(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_no_user_envset:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitUserEnvironment(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_banner_set:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Banner(?-i)[\s]+/etc/issue[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_idle_timeout:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)ClientAliveInterval[\s]+(\d+)[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_clientalivecountmax:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)ClientAliveCountMax[\s]+([\d]+)[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_use_approved_ciphers:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Ciphers(?-i)[\s]+aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_use_approved_macs:obj:1" version="1">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)MACs(?-i)[\s]+hmac-sha2-512,hmac-sha2-256,hmac-sha1[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sysconfig_networking_bootproto_ifcfg:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*BOOTPROTO[\s]*=[\s"]*([^#"\s]*)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppc_64:obj:1" version="1" />
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppcle_64:obj:1" version="1" />
<ns6:uname_object comment="32 bit architecture" id="oval:ssg-object_system_info_architecture_x86:obj:1" version="1" />
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_x86_64:obj:1" version="1" />
<ns7:textfilecontent54_object id="oval:ssg-object_tftpd_uses_secure_mode:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/tftp</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*server_args[\s]+=[\s]+\-s[\s]+.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/init.d/functions" id="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" version="1">
<ns7:filepath>/etc/init.d/functions</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_umask_for_daemons:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_init_d_functions_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_file_etc_shadow:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns7:variable_object id="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_accounts_user_umask_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_var_removable_partition_is_cd_dvd_drive:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_removable_partition:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_var_umask_for_daemons_umask_as_number:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_umask_for_daemons_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_wireless_disable_interfaces:obj:1" version="1">
<ns7:filepath>/proc/net/wireless</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*[-\w]+:</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
</ns3:objects>
<ns3:states>
<ns6:file_state id="oval:ssg-state_rsyslog_files_groupownership:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_rsyslog_files_ownership:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_rsyslog_files_permissions:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_dcredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_dcredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_difok:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_difok:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_lcredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_lcredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_maxrepeat:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_maxrepeat:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_minclass:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_minclass:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_minlen:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_minlen:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_ocredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_ocredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_retry:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_retry:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_ucredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_ucredit:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_setuid_or_setgid_set:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_proper_always_exit_rule_but_for_unprivileged_command:ste:1" version="1">
<ns7:subexpression datatype="string" operation="not equal" var_check="all" var_ref="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_audit_rules_privileged_commands:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_set_dimension_match:ste:1" version="1">
<ns7:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_dimension_of_object_audit_rules_privileged_commands:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_bootloader_audit_argument:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*audit=1.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_bootloader_nousb_argument:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*nousb.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:file_state comment="uid greater than or equal to 500 and world writable" id="oval:ssg-state_gid_is_user_and_world_writable:ste:1" version="1">
<ns6:user_id datatype="int" operation="greater than or equal">500</ns6:user_id>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_group_owner_grub_conf:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_grub_conf:ste:1" version="2">
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_sgid:ste:1" version="1">
<ns6:sgid datatype="boolean">true</ns6:sgid>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_sgid_whitelist:ste:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_sgid_whitelist:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_suid:ste:1" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_suid_whitelist:ste:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_suid_whitelist:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_user_owner_grub_conf:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_banner_message_enable:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="login_banner_text" id="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" version="1">
<ns7:value_of datatype="string" operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_automount:ste:1" version="1">
<ns7:value_of datatype="string">false</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_clock_temperature:ste:1" version="1">
<ns7:value_of datatype="string">false</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_clock_weather:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" version="1">
<ns7:value_of datatype="string" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_restart_shutdown:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_create:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_disconnect:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_notification:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="idle timeout" id="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" version="1">
<ns7:value_of datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-inactivity_timeout_value:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_screensaver_lock_enabled:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" version="1">
<ns7:value_of datatype="string">forced-logout</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="idle timeout" id="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" version="1">
<ns7:value_of datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-inactivity_timeout_value:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_mode:ste:1" version="1">
<ns7:value_of datatype="string">blank-only</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:textfilecontent54_state id="oval:ssg-state_grub_enable_fips_mode:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*fips=1.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_abrtd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_acpid_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_atd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_auditd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_autofs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_avahi-daemon_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_bluetooth_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_certmonger_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cgconfig_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cgred_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cpuspeed_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_crond_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cups_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_dhcpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_dovecot_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_haldaemon_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_httpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_ip6tables_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_iptables_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_irqbalance_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_kdump_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_mdmonitor_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_messagebus_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_named_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_netconsole_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_netfs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_nfs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_nfslock_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_ntpd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_ntpdate_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_oddjobd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_pcscd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_portreserve_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_postfix_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_psacct_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_qpidd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_quota_nld_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rdisc_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_restorecond_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rhnsd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rhsmcertd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcbind_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcgssd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcidmapd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcsvcgssd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_rsyslog_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_saslauthd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_smartd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_smb_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_snmpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_squid_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_sshd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_sysstat_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_tftp_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_vsftpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_xinetd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_ypbind_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns7:textfilecontent54_state id="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*ocsp_on.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_fs_suid_dumpable:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_dmesg_restrict:ste:1" version="1">
<ns6:value datatype="int" operation="equals">1</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_exec_shield:ste:1" version="1">
<ns6:value datatype="int" operation="equals">1</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_randomize_va_space:ste:1" version="1">
<ns6:value datatype="int" operation="equals">2</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_log_martians:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_rp_filter:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_send_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_rp_filter:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_send_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_ip_forward:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_tcp_syncookies:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_ra:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_forwarding:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_ra:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">2</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_account_disable_post_pw_expiration:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than">-1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1" version="1">
<ns7:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_maxlogins:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_pass_max_days_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="less than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_maximum_age_login_defs:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_last_pass_min_days_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_minimum_age_login_defs:var:1" />
</ns7:variable_state>
<ns6:password_state id="oval:ssg-state_accounts_password_all_shadowed:ste:1" version="1">
<ns6:password>x</ns6:password>
</ns6:password_state>
<ns7:variable_state id="oval:ssg-state_last_pass_min_len_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_minlen_login_defs:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_unix_remember:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_pass_warn_age_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state comment="group or other has write privilege" id="oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state comment="symbolic link" id="oval:ssg-state_accounts_root_path_dirs_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_profile_tmout:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_check="all" var_ref="oval:ssg-var_accounts_tmout:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_bashrc:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_csh_cshrc:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_profile:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_use_fips_hashes:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*sha512.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_verify_acls:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*acl.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_verify_ext_attributes:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*xattrs.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1" version="1">
<ns7:subexpression operation="equals" var_ref="oval:ssg-var_auditd_action_mail_acct:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_admin_space_left_action:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_flush:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_flush:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_max_log_file:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_max_log_file_action:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_num_logs:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_num_logs:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_space_left_action:ste:1" version="2">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_space_left_action:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_dir_perms_etc_httpd_conf:ste:1" operator="AND" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_dir_perms_var_log_httpd:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_world_writable_and_not_sticky:ste:1" version="1">
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_core_dumps_limitsconf:ste:1" version="1">
<ns7:subexpression operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_another_rotate_interval_after_daily:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">}[^{]+[\n][\s]*(weekly|monthly|yearly)|[\n][\s]*(weekly|monthly|yearly)[^}]+{</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-fd431d51-4ae0493b:ste:1" version="1">
<ns8:release>4ae0493b</ns8:release>
<ns8:version>fd431d51</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-2fa658e0-45700c69:ste:1" version="1">
<ns8:release>45700c69</ns8:release>
<ns8:version>2fa658e0</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-f4a80eb5-53a7ff4b:ste:1" version="1">
<ns8:release>53a7ff4b</ns8:release>
<ns8:version>f4a80eb5</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-c105b9de-4e0fd3a3:ste:1" version="1">
<ns8:release>4e0fd3a3</ns8:release>
<ns8:version>c105b9de</ns8:version>
</ns8:rpminfo_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_group:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_gshadow:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_passwd:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_group:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_gshadow:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_passwd:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_binaries_not_root:ste:1" operator="OR" version="1">
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_libraries_not_root:ste:1" version="1">
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_not_root_root_var_log_audit:ste:1" operator="OR" version="1">
<ns6:group_id datatype="int" operation="not equal">0</ns6:group_id>
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1" operator="OR" version="1">
<ns6:group_id datatype="int" operation="not equal">0</ns6:group_id>
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_binary_files_nogroupwrite_noworldwrite:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_binary_files_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_etc_group:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_mode_0000:ste:1" version="1">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uread datatype="boolean">false</ns6:uread>
<ns6:uwrite datatype="boolean">false</ns6:uwrite>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_mode_0644_or_stronger:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_mode_0000:ste:1" version="1">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uread datatype="boolean">false</ns6:uread>
<ns6:uwrite datatype="boolean">false</ns6:uwrite>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_home_dirs_home_itself:ste:1" version="1">
<ns6:path operation="equals">/home</ns6:path>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_home_dirs_wrong_perm:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_wrong_file_permissions_httpd_server_conf_files:ste:1" operator="AND" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-perms_state_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_special_selinux_files:ste:1" version="1">
<ns6:filepath operation="pattern match">^/selinux/(?:(?:member)|(?:user)|(?:relabel)|(?:create)|(?:access)|(?:context))$</ns6:filepath>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_proc:ste:1" version="1">
<ns6:filepath operation="pattern match">^/proc/.*$</ns6:filepath>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_sys:ste:1" version="1">
<ns6:filepath operation="pattern match">^/sys/.*$</ns6:filepath>
</ns6:file_state>
<ns6:file_state comment="Files that are owned by a group." id="oval:ssg-state_file_permissions_ungroupowned:ste:1" version="1">
<ns6:group_id datatype="int" var_check="at least one" var_ref="oval:ssg-variable_file_permissions_ungroupowned:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_not_mode_0600:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:uexec datatype="boolean">true</ns6:uexec>
<ns6:gread datatype="boolean">true</ns6:gread>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:gexec datatype="boolean">true</ns6:gexec>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_not_mode_0640:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:uexec datatype="boolean">true</ns6:uexec>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:gexec datatype="boolean">true</ns6:gexec>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_gid_passwd_group_same:ste:1" version="1">
<ns7:subexpression datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_gid_passwd_group_same:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_groupowner_shadow_file:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns8:rpminfo_state id="oval:ssg-state_centos6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_centos7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_server:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_rhel7_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_server:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_wrlinux:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_nodev:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_noexec:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_nosuid:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_local_nodev:ste:1" version="1">
<ns8:device operation="pattern match">^/dev/.*$</ns8:device>
<ns8:mount_options datatype="string" entity_check="all" operation="not equal">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nodev:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*nodev.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nodev_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nodev,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nodev_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nodev_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nodev,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nodev_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_noexec_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?noexec,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_noexec_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_noexec_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?noexec,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_noexec_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nosuid:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*nosuid.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nosuid_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nosuid,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nosuid_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nosuid_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nosuid,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nosuid_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_20340112:ste:1" version="1">
<ns7:instance datatype="int">2</ns7:instance>
<ns7:subexpression operation="pattern match">sec=(krb5i|ntlmv2i)</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_tmp_nodev:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_tmp_noexec:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_tmp_nosuid:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns6:interface_state id="oval:ssg-state_promisc:ste:1" version="1">
<ns6:flag datatype="string" entity_check="at least one" operation="equals">PROMISC</ns6:flag>
</ns6:interface_state>
<ns6:file_state id="oval:ssg-file_permissions_unowned_userid_list_match:ste:1" version="1">
<ns6:user_id datatype="int" var_check="at least one" var_ref="oval:ssg-file_permissions_unowned_userid_list:var:1" />
</ns6:file_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_default_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_reserved_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:environmentvariable58_state comment="starts with colon or period" id="oval:ssg-state_begins_colon_period:ste:1" version="1">
<ns7:value operation="pattern match">^[:\.]</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="colon twice in a row" id="oval:ssg-state_contains_double_colon:ste:1" version="1">
<ns7:value operation="pattern match">::</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="period twice in a row" id="oval:ssg-state_contains_double_period:ste:1" version="1">
<ns7:value operation="pattern match">\.\.</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="ends with colon or period" id="oval:ssg-state_ends_colon_period:ste:1" version="1">
<ns7:value operation="pattern match">[:\.]$</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="begins with a slash" id="oval:ssg-state_begins_slash:ste:1" version="1">
<ns7:value operation="pattern match">^[^/]</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="elements begin with a slash" id="oval:ssg-state_contains_relative_path:ste:1" version="1">
<ns7:value operation="pattern match">[^\\]:[^/]</ns7:value>
</ns7:environmentvariable58_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_md5_hash:ste:1" operator="AND" version="1">
<ns8:md5_differs>fail</ns8:md5_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_user_ownership:ste:1" version="1">
<ns8:ownership_differs>fail</ns8:ownership_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_group_ownership:ste:1" version="1">
<ns8:group_differs>fail</ns8:group_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_mode:ste:1" version="1">
<ns8:mode_differs>fail</ns8:mode_differs>
</ns8:rpmverifyfile_state>
<ns8:selinuxsecuritycontext_state comment="do it" id="oval:ssg-state_selinux_all_devicefiles_labeled:ste:1" version="1">
<ns8:type datatype="string" operation="equals">device_t</ns8:type>
</ns8:selinuxsecuritycontext_state>
<ns8:selinuxsecuritycontext_state comment="do it" id="oval:ssg-state_selinux_confinement_of_daemons:ste:1" version="1">
<ns8:type datatype="string" operation="equals">initrc_t</ns8:type>
</ns8:selinuxsecuritycontext_state>
<ns7:textfilecontent54_state id="oval:ssg-state_selinux_policy:ste:1" version="1">
<ns7:subexpression operation="equals" var_check="all" var_ref="oval:ssg-var_selinux_policy_name:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_selinux_config:ste:1" version="1">
<ns7:subexpression datatype="string" operation="equals" var_check="all" var_ref="oval:ssg-var_selinux_state:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_encrypt_method_instance_value:ste:1" version="1">
<ns7:value datatype="string" operation="equals">SHA512</ns7:value>
</ns7:variable_state>
<ns7:textfilecontent54_state comment="upper bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_upper_bound:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-sshd_idle_timeout_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state comment="lower bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_lower_bound:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_sshd_clientalivecountmax:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_sysconfig_networking_bootproto_ifcfg:ste:1" version="2">
<ns7:subexpression operation="pattern match">^(static|none)$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppc_64:ste:1" version="1">
<ns6:processor_type operation="equals">ppc64</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppcle_64:ste:1" version="1">
<ns6:processor_type operation="equals">ppc64le</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="32 bit architecture" id="oval:ssg-state_system_info_architecture_x86:ste:1" version="1">
<ns6:processor_type operation="equals">i686</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_x86_64:ste:1" version="1">
<ns6:processor_type operation="equals">x86_64</ns6:processor_type>
</ns6:uname_state>
<ns7:variable_state id="oval:ssg-ste_umask_for_daemons:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_umask_for_daemons_umask_as_number:var:1" />
</ns7:variable_state>
<ns6:file_state id="oval:ssg-state_etc_shadow_uid_root:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns7:variable_state id="oval:ssg-state_var_removable_partition_is_cd_dvd_drive:ste:1" version="1">
<ns7:value operation="equals">/dev/cdrom</ns7:value>
</ns7:variable_state>
</ns3:states>
<ns3:variables>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfg_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfg_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfg_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfg_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfg_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfg_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfg_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfg_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfo_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfo_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfo_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfo_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfo_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfo_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfo_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfo_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfp_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfp_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfp_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfp_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfp_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfp_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfp_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfp_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:external_variable comment="External variable for pam_cracklib dcredit" datatype="int" id="oval:ssg-var_password_pam_dcredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib difok" datatype="int" id="oval:ssg-var_password_pam_difok:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib lcredit" datatype="int" id="oval:ssg-var_password_pam_lcredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib maxrepeat" datatype="int" id="oval:ssg-var_password_pam_maxrepeat:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib minclass" datatype="int" id="oval:ssg-var_password_pam_minclass:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib minlen" datatype="int" id="oval:ssg-var_password_pam_minlen:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib ocredit" datatype="int" id="oval:ssg-var_password_pam_ocredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib retry" datatype="int" id="oval:ssg-var_password_pam_retry:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib ucredit" datatype="int" id="oval:ssg-var_password_pam_ucredit:var:1" version="1" />
<ns3:local_variable comment="full for of audit rules for privileged commands" datatype="string" id="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" version="1">
<ns3:concat>
<ns3:literal_component>-a always,exit -F path=</ns3:literal_component>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_privileged_commands:obj:1" />
<ns3:literal_component> -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="cardinality of system privileged commands set" datatype="int" id="oval:ssg-variable_dimension_of_object_system_privileged_commands:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_privileged_commands:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:local_variable comment="cardinality of audit.rules privileged commands having expected rule definition set" datatype="int" id="oval:ssg-variable_dimension_of_object_audit_rules_privileged_commands:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_audit_rules_privileged_commands:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:constant_variable comment="sgid whitelist" datatype="string" id="oval:ssg-var_sgid_whitelist:var:1" version="1">
<ns3:value>/bin/cgclassify</ns3:value>
<ns3:value>/bin/cgexec</ns3:value>
<ns3:value>/sbin/netreport</ns3:value>
<ns3:value>/usr/bin/crontab</ns3:value>
<ns3:value>/usr/bin/gnomine</ns3:value>
<ns3:value>/usr/bin/iagno</ns3:value>
<ns3:value>/usr/bin/locate</ns3:value>
<ns3:value>/usr/bin/lockfile</ns3:value>
<ns3:value>/usr/bin/same-gnome</ns3:value>
<ns3:value>/usr/bin/screen</ns3:value>
<ns3:value>/usr/bin/ssh-agent</ns3:value>
<ns3:value>/usr/bin/wall</ns3:value>
<ns3:value>/usr/bin/write</ns3:value>
<ns3:value>/usr/lib64/vte/gnome-pty-helper</ns3:value>
<ns3:value>/usr/libexec/kde4/kdesud</ns3:value>
<ns3:value>/usr/libexec/utempter/utempter</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/admindb</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/admin</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/confirm</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/create</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/edithtml</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/listinfo</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/options</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/private</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/rmlist</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/roster</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/subscribe</ns3:value>
<ns3:value>/usr/lib/mailman/mail/mailman</ns3:value>
<ns3:value>/usr/lib/vte/gnome-pty-helper</ns3:value>
<ns3:value>/usr/sbin/lockdev</ns3:value>
<ns3:value>/usr/sbin/postdrop</ns3:value>
<ns3:value>/usr/sbin/postqueue</ns3:value>
<ns3:value>/usr/sbin/sendmail.sendmail</ns3:value>
</ns3:constant_variable>
<ns3:constant_variable comment="suid whitelist" datatype="string" id="oval:ssg-var_suid_whitelist:var:1" version="1">
<ns3:value>/bin/fusermount</ns3:value>
<ns3:value>/bin/mount</ns3:value>
<ns3:value>/bin/ping6</ns3:value>
<ns3:value>/bin/ping</ns3:value>
<ns3:value>/bin/su</ns3:value>
<ns3:value>/bin/umount</ns3:value>
<ns3:value>/lib64/dbus-1/dbus-daemon-launch-helper</ns3:value>
<ns3:value>/lib/dbus-1/dbus-daemon-launch-helper</ns3:value>
<ns3:value>/sbin/mount.ecryptfs_private</ns3:value>
<ns3:value>/sbin/mount.nfs</ns3:value>
<ns3:value>/sbin/pam_timestamp_check</ns3:value>
<ns3:value>/sbin/unix_chkpwd</ns3:value>
<ns3:value>/usr/bin/abrt-action-install-debuginfo-to-abrt-cache</ns3:value>
<ns3:value>/usr/bin/at</ns3:value>
<ns3:value>/usr/bin/chage</ns3:value>
<ns3:value>/usr/bin/chfn</ns3:value>
<ns3:value>/usr/bin/chsh</ns3:value>
<ns3:value>/usr/bin/crontab</ns3:value>
<ns3:value>/usr/bin/gpasswd</ns3:value>
<ns3:value>/usr/bin/kgrantpty</ns3:value>
<ns3:value>/usr/bin/kpac_dhcp_helper</ns3:value>
<ns3:value>/usr/bin/ksu</ns3:value>
<ns3:value>/usr/bin/newgrp</ns3:value>
<ns3:value>/usr/bin/newrole</ns3:value>
<ns3:value>/usr/bin/passwd</ns3:value>
<ns3:value>/usr/bin/pkexec</ns3:value>
<ns3:value>/usr/bin/rcp</ns3:value>
<ns3:value>/usr/bin/rlogin</ns3:value>
<ns3:value>/usr/bin/rsh</ns3:value>
<ns3:value>/usr/bin/sperl5.10.1</ns3:value>
<ns3:value>/usr/bin/staprun</ns3:value>
<ns3:value>/usr/bin/sudoedit</ns3:value>
<ns3:value>/usr/bin/sudo</ns3:value>
<ns3:value>/usr/bin/Xorg</ns3:value>
<ns3:value>/usr/lib64/amanda/calcsize</ns3:value>
<ns3:value>/usr/lib64/amanda/dumper</ns3:value>
<ns3:value>/usr/lib64/amanda/killpgrp</ns3:value>
<ns3:value>/usr/lib64/amanda/planner</ns3:value>
<ns3:value>/usr/lib64/amanda/rundump</ns3:value>
<ns3:value>/usr/lib64/amanda/runtar</ns3:value>
<ns3:value>/usr/lib64/nspluginwrapper/plugin-config</ns3:value>
<ns3:value>/usr/lib/amanda/calcsize</ns3:value>
<ns3:value>/usr/lib/amanda/dumper</ns3:value>
<ns3:value>/usr/lib/amanda/killpgrp</ns3:value>
<ns3:value>/usr/lib/amanda/planner</ns3:value>
<ns3:value>/usr/lib/amanda/rundump</ns3:value>
<ns3:value>/usr/lib/amanda/runtar</ns3:value>
<ns3:value>/usr/libexec/abrt-action-install-debuginfo-to-abrt-cache</ns3:value>
<ns3:value>/usr/libexec/spice-gtk-x86_64/spice-client-glib-usb-acl-helper</ns3:value>
<ns3:value>/usr/libexec/mc/cons.saver</ns3:value>
<ns3:value>/usr/libexec/openssh/ssh-keysign</ns3:value>
<ns3:value>/usr/libexec/polkit-1/polkit-agent-helper-1</ns3:value>
<ns3:value>/usr/libexec/pt_chown</ns3:value>
<ns3:value>/usr/libexec/pulse/proximity-helper</ns3:value>
<ns3:value>/usr/lib/nspluginwrapper/plugin-config</ns3:value>
<ns3:value>/usr/sbin/amcheck</ns3:value>
<ns3:value>/usr/sbin/seunshare</ns3:value>
<ns3:value>/usr/sbin/suexec</ns3:value>
<ns3:value>/usr/sbin/userhelper</ns3:value>
<ns3:value>/usr/sbin/usernetctl</ns3:value>
</ns3:constant_variable>
<ns3:external_variable comment="login_banner_text" datatype="string" id="oval:ssg-login_banner_text:var:1" version="1" />
<ns3:external_variable comment="inactivity timeout variable" datatype="int" id="oval:ssg-inactivity_timeout_value:var:1" version="1" />
<ns3:local_variable comment="Path to 'rotational' tunable for all block devices on the system" datatype="string" id="oval:ssg-variable_system_block_devices_rotational_paths:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_block_devices:obj:1" />
<ns3:literal_component>/queue/rotational</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Path to 'add_random' tunable for all SSD drives on system" datatype="string" id="oval:ssg-variable_system_solid_state_drives_paths:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="path" object_ref="oval:ssg-object_system_ssd_drives:obj:1" />
<ns3:literal_component>/add_random</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression to check if smartcard authentication is enabled in /etc/pam.d/system-auth" datatype="string" id="oval:ssg-variable_smart_card_enabled_system_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=1[\s]default=ignore\][\s]pam_succeed_if.so[\s]service[\s]notin[\s]</ns3:literal_component>
<ns3:literal_component>login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver[\s]quiet[\s]use_uid</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]authinfo_unavail=ignore[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]card_only\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expressiion to check if smartcard authentication is required in /etc/pam.d/system-auth" datatype="string" id="oval:ssg-variable_smart_card_required_system_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=1[\s]default=ignore\][\s]pam_succeed_if.so[\s]service[\s]notin[\s]</ns3:literal_component>
<ns3:literal_component>login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver[\s]quiet[\s]use_uid</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]wait_for_card[\s]card_only\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression to check if smartcard authentication is required in /etc/pam.d/smartcard-auth" datatype="string" id="oval:ssg-variable_smart_card_required_smartcard_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]wait_for_card[\s]card_only\n.*</ns3:literal_component>
<ns3:literal_component>\npassword[\s]+required[\s]+pam_pkcs11.so\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="External variable for net.ipv4.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.log_martians" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.icmp_echo_ignore_broadcasts" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.icmp_ignore_bogus_error_responses" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.tcp_syncookies" datatype="int" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.forwarding" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="inactive days expiration" datatype="int" id="oval:ssg-var_account_disable_post_pw_expiration:var:1" version="1" />
<ns3:local_variable comment="Count of all username rows retrieved from /etc/passwd (including duplicates if any)" datatype="int" id="oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:local_variable comment="Count of unique username rows retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1" version="1">
<ns3:count>
<ns3:unique>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1" />
</ns3:unique>
</ns3:count>
</ns3:local_variable>
<ns3:external_variable comment="maximum number of concurrent logins per user" datatype="int" id="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MAX_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_max_days_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MAX_DAYS\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Maximum password age" datatype="int" id="oval:ssg-var_accounts_maximum_age_login_defs:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MIN_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_days_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MIN_DAYS\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Minimum password age in days" datatype="int" id="oval:ssg-var_accounts_minimum_age_login_defs:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MIN_LEN directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_len_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MIN_LEN\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Password minimum length" datatype="int" id="oval:ssg-var_accounts_password_minlen_login_defs:var:1" version="1" />
<ns3:external_variable comment="number of passwords that should be remembered" datatype="int" id="oval:ssg-var_password_pam_unix_remember:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_WARN_AGE directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_warn_age_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_WARN_AGE\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="password expiration warning age in days" datatype="int" id="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" version="1" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" version="1" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" version="2" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" version="2" />
<ns3:local_variable comment="Split the PATH on the : delimiter" datatype="string" id="oval:ssg-var_accounts_root_path_dirs_no_write:var:1" version="1">
<ns3:split delimiter=":">
<ns3:object_component item_field="value" object_ref="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1" />
</ns3:split>
</ns3:local_variable>
<ns3:external_variable comment="external variable for TMOUT" datatype="int" id="oval:ssg-var_accounts_tmout:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/bashrc umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_bashrc_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="Required umask converted from string to octal number" datatype="int" id="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/csh.cshrc umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_csh_cshrc_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="First octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/login.defs umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_login_defs_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="First octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/profile umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_profile_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Absolute path of Aide build database file" datatype="string" id="oval:ssg-variable_aide_build_new_database_absolute_path:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_database_dirpath:obj:1" />
<ns3:literal_component>/</ns3:literal_component>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_new_database_filename:obj:1" />
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Absolute path of Aide build database file" datatype="string" id="oval:ssg-variable_aide_operational_database_absolute_path:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_database_dirpath:obj:1" />
<ns3:literal_component>/</ns3:literal_component>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_operational_database_filename:obj:1" />
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="audit action_mail_acct setting" datatype="string" id="oval:ssg-var_auditd_action_mail_acct:var:1" version="1" />
<ns3:external_variable comment="audit admin_space_left_action setting" datatype="string" id="oval:ssg-var_auditd_admin_space_left_action:var:1" version="1" />
<ns3:external_variable comment="audit flush setting" datatype="string" id="oval:ssg-var_auditd_flush:var:1" version="1" />
<ns3:external_variable comment="audit max_log_file settting" datatype="int" id="oval:ssg-var_auditd_max_log_file:var:1" version="1" />
<ns3:external_variable comment="audit max_log_file_action setting" datatype="string" id="oval:ssg-var_auditd_max_log_file_action:var:1" version="1" />
<ns3:external_variable comment="audit num_logs settting" datatype="int" id="oval:ssg-var_auditd_num_logs:var:1" version="1" />
<ns3:external_variable comment="audit space_left_action setting" datatype="string" id="oval:ssg-var_auditd_space_left_action:var:1" version="2" />
<ns3:local_variable comment="all GIDs on the target system" datatype="int" id="oval:ssg-variable_file_permissions_ungroupowned:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-etc_group_object:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="GIDs from /etc/group" datatype="string" id="oval:ssg-var_gid_passwd_group_same:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_gid_passwd_group_same_var:obj:1" />
</ns3:local_variable>
<ns3:constant_variable comment="CD/DVD drive alternative names whitelist" datatype="string" id="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" version="1">
<ns3:value>/dev/cdrom</ns3:value>
<ns3:value>/dev/dvd</ns3:value>
<ns3:value>/dev/scd0</ns3:value>
<ns3:value>/dev/sr0</ns3:value>
</ns3:constant_variable>
<ns3:local_variable comment="Regular expression pattern for CD / DVD drive alternative names" datatype="string" id="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" version="1">
<ns3:concat>
<ns3:literal_component>^[\s]*</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns3:literal_component>[\s]+[/\w]+[\s]+[\w]+[\s]+([^\s]+)(?:[\s]+[\d]+){2}$</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression pattern for removable block special device other than CD / DVD drive" datatype="string" id="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" version="1">
<ns3:concat>
<ns3:literal_component>^[\s]*</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_removable_partition:var:1" />
<ns3:literal_component>[\s]+[/\w]+[\s]+[\w]+[\s]+([^\s]+)(?:[\s]+[\d]+){2}$</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="removable partition" datatype="string" id="oval:ssg-var_removable_partition:var:1" version="1" />
<ns3:local_variable comment="List of valid user ids" datatype="int" id="oval:ssg-file_permissions_unowned_userid_list:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-file_permissions_unowned_userid_list_object:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="UIDs retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_sys_uids_etc_passwd:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_entries:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="Value of last UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_uid_min_value:var:1" version="1">
<ns3:regex_capture pattern="UID_MIN[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - 0) * (x - (UID_MIN - 1)) expression" datatype="int" id="oval:ssg-variable_default_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_uid_min_value:var:1" />
<ns3:literal_component datatype="int">-1</ns3:literal_component>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Value of last SYS_UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_min_value:var:1" version="1">
<ns3:regex_capture pattern="SYS_UID_MIN[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Value of last SYS_UID_MAX from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_max_value:var:1" version="1">
<ns3:regex_capture pattern="SYS_UID_MAX[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - 0) * (x - SYS_UID_MIN) expression" datatype="int" id="oval:ssg-variable_reserved_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - SYS_UID_MIN) * (x - SYS_UID_MAX) expression" datatype="int" id="oval:ssg-variable_dynalloc_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_max_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="External variable: name of selinux policy in /etc/selinux/config" datatype="string" id="oval:ssg-var_selinux_policy_name:var:1" version="1" />
<ns3:external_variable comment="external variable for selinux state" datatype="string" id="oval:ssg-var_selinux_state:var:1" version="1" />
<ns3:local_variable comment="The value of last ENCRYPT_METHOD directive in /etc/login.defs" datatype="string" id="oval:ssg-variable_last_encrypt_method_instance_value:var:1" version="1">
<ns3:regex_capture pattern="ENCRYPT_METHOD\s+(\w+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="timeout value" datatype="int" id="oval:ssg-sshd_idle_timeout_value:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/init.d/functions umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_init_d_functions_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="Required umask converted from string to octal number" datatype="int" id="oval:ssg-var_umask_for_daemons_umask_as_number:var:1" version="1" />
<ns3:external_variable comment="Value of var_accounts_user_umask (the required umask) as string" datatype="string" id="oval:ssg-var_accounts_user_umask:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:external_variable comment="Value of var_umask_for_daemons (the required umask) as string" datatype="string" id="oval:ssg-var_umask_for_daemons:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
</ns3:variables>
</ns3:oval_definitions>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_ssg-rhel6-ocil.xml" timestamp="2017-08-11T21:23:31">
<ns9:ocil>
<ns9:generator>
<ns9:schema_version>2.0</ns9:schema_version>
<ns9:timestamp>2017-08-11T09:18:08Z</ns9:timestamp>
</ns9:generator>
<ns9:questionnaires>
<ns9:questionnaire id="ocil:ssg-partition_for_tmp_ocil:questionnaire:1">
<ns9:title>Ensure /tmp Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_tmp_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_ocil:questionnaire:1">
<ns9:title>Ensure /var Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_log_ocil:questionnaire:1">
<ns9:title>Ensure /var/log Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_log_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1">
<ns9:title>Ensure /var/log/audit Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_home_ocil:questionnaire:1">
<ns9:title>Ensure /home Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_home_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-encrypt_partitions_ocil:questionnaire:1">
<ns9:title>Encrypt Partitions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-encrypt_partitions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_redhat_gpgkey_installed_ocil:questionnaire:1">
<ns9:title>Ensure Red Hat GPG Key Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_redhat_gpgkey_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1">
<ns9:title>Ensure gpgcheck Enabled In Main Yum Configuration</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_gpgcheck_never_disabled_ocil:questionnaire:1">
<ns9:title>Ensure gpgcheck Enabled For All Yum Package Repositories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_gpgcheck_never_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1">
<ns9:title>Ensure Software Patches Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-security_patches_up_to_date_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_aide_installed_ocil:questionnaire:1">
<ns9:title>Install AIDE</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_aide_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-aide_build_database_ocil:questionnaire:1">
<ns9:title>Build and Test AIDE Database</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-aide_build_database_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1">
<ns9:title>Configure Periodic Execution of AIDE</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-aide_periodic_cron_checking_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rpm_verify_permissions_ocil:questionnaire:1">
<ns9:title>Verify and Correct File Permissions with RPM</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rpm_verify_permissions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rpm_verify_hashes_ocil:questionnaire:1">
<ns9:title>Verify File Hashes with RPM</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rpm_verify_hashes_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-install_hids_ocil:questionnaire:1">
<ns9:title>Install Intrusion Detection Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-install_hids_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-install_antivirus_ocil:questionnaire:1">
<ns9:title>Install Virus Scanning Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-install_antivirus_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dracut-fips_installed_ocil:questionnaire:1">
<ns9:title>Install the dracut-fips Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dracut-fips_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-grub_enable_fips_mode_ocil:questionnaire:1">
<ns9:title>Enable FIPS Mode in GRUB</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-grub_enable_fips_mode_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1">
<ns9:title>The Installed Operating System Is Vendor Supported and Certified</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-installed_OS_is_certified_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1">
<ns9:title>Disable GDM Automatic Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gnome_gdm_disable_guest_login_ocil:questionnaire:1">
<ns9:title>Disable GDM Guest Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gnome_gdm_disable_guest_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1">
<ns9:title>Disable the User List</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Login Restart and Shutdown Buttons</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Inactivity Timeout</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1">
<ns9:title>GNOME Desktop Screensaver Mandatory Use</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1">
<ns9:title>Enable Screen Lock Activation After Idle Period</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1">
<ns9:title>Implement Blank Screensaver</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Maximum Allowed Inactivity</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Maximum Allowed Inactivity Action</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1">
<ns9:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Clock Temperature Feature</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Clock Weather Feature</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Connection Creation in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Disconnect Notification in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Connection Notification in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1">
<ns9:title>Disable GNOME Automounting</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_automount_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1">
<ns9:title>Disable All GNOME Thumbnailers</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_noexec_removable_partitions_ocil:questionnaire:1">
<ns9:title>Add noexec Option to Removable Media Partitions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_noexec_removable_partitions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_usb-storage_disabled_ocil:questionnaire:1">
<ns9:title>Disable Modprobe Loading of USB Storage Driver</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_usb-storage_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1">
<ns9:title>Disable the Automounter</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_autofs_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-userowner_shadow_file_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-userowner_shadow_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-groupowner_shadow_file_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-groupowner_shadow_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1">
<ns9:title>Verify Permissions on shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_shadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1">
<ns9:title>Verify Permissions on group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify Permissions on gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify Permissions on passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1">
<ns9:title>Verify that Shared Library Files Have Restrictive Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_library_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1">
<ns9:title>Verify that Shared Library Files Have Root Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_library_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1">
<ns9:title>Verify that System Executables Have Restrictive Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_binary_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1">
<ns9:title>Verify that System Executables Have Root Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_binary_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1">
<ns9:title>Verify that All World-Writable Directories Have Sticky Bits Set</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1">
<ns9:title>Ensure No World-Writable Files Exist</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1">
<ns9:title>Ensure All SGID Executables Are Authorized</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1">
<ns9:title>Ensure All SUID Executables Are Authorized</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1">
<ns9:title>Ensure All Files Are Owned by a User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_files_unowned_by_user_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1">
<ns9:title>Ensure All Files Are Owned by a Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_ungroupowned_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-dir_perms_world_writable_system_owned_ocil:questionnaire:1">
<ns9:title>Ensure All World-Writable Directories Are Owned by a System Account</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-dir_perms_world_writable_system_owned_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-umask_for_daemons_ocil:questionnaire:1">
<ns9:title>Set Daemon Umask</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-umask_for_daemons_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_users_coredumps_ocil:questionnaire:1">
<ns9:title>Disable Core Dumps for All Users</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_users_coredumps_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1">
<ns9:title>Disable Core Dumps for SUID programs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_exec_shield_ocil:questionnaire:1">
<ns9:title>Enable ExecShield</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_exec_shield_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1">
<ns9:title>Enable Randomized Layout of Virtual Address Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_dmesg_restrict_ocil:questionnaire:1">
<ns9:title>Restrict Access to Kernel Message Buffer</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_dmesg_restrict_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-enable_selinux_bootloader_ocil:questionnaire:1">
<ns9:title>Ensure SELinux Not Disabled in /etc/grub.conf</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-enable_selinux_bootloader_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_state_ocil:questionnaire:1">
<ns9:title>Ensure SELinux State is Enforcing</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_state_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_policytype_ocil:questionnaire:1">
<ns9:title>Configure SELinux Policy</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_policytype_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_all_devicefiles_labeled_ocil:questionnaire:1">
<ns9:title>Ensure No Device Files are Unknown to SELinux</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_all_devicefiles_labeled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1">
<ns9:title>Direct root Logins Not Allowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_direct_root_logins_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1">
<ns9:title>Restrict Virtual Console Root Logins</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-securetty_root_login_console_only_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1">
<ns9:title>Restrict Serial Port Root Logins</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-restrict_serial_port_logins_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_root_webbrowsing_ocil:questionnaire:1">
<ns9:title>Restrict Web Browser Use for Administrative Accounts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_root_webbrowsing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_shelllogin_for_systemaccounts_ocil:questionnaire:1">
<ns9:title>Ensure that System Accounts Do Not Run a Shell Upon Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_shelllogin_for_systemaccounts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1">
<ns9:title>Verify Only Root Has UID 0</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_no_uid_except_zero_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-root_path_default_ocil:questionnaire:1">
<ns9:title>Root Path Must Be Vendor Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-root_path_default_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_empty_passwords_ocil:questionnaire:1">
<ns9:title>Prevent Log In to Accounts With Empty Password</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_empty_passwords_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1">
<ns9:title>Verify All Account Password Hashes are Shadowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_all_shadowed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1">
<ns9:title>All GIDs referenced in /etc/passwd must be defined in /etc/group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gid_passwd_group_same_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_netrc_files_ocil:questionnaire:1">
<ns9:title>Verify No netrc Files Exist</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_netrc_files_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Length in login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Maximum Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Warning Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1">
<ns9:title>Set Account Expiration Following Inactivity</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_disable_post_pw_expiration_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_unique_name_ocil:questionnaire:1">
<ns9:title>Ensure All Accounts on the System Have Unique Names</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_unique_name_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1">
<ns9:title>Assign Expiration Date to Temporary Accounts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_temp_expire_date_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-display_login_attempts_ocil:questionnaire:1">
<ns9:title>Set Last Login/Access Notification</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-display_login_attempts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_retry_ocil:questionnaire:1">
<ns9:title>Set Password Retry Prompts Permitted Per-Session</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_retry_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_maxrepeat_ocil:questionnaire:1">
<ns9:title>Set Password to Maximum of Three Consecutive Repeating Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_maxrepeat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_dcredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Digit Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_dcredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_minlen_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Length</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_minlen_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_ucredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Uppercase Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_ucredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_ocredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Special Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_ocredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_lcredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Lowercase Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_lcredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_difok_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Different Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_difok_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_minclass_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Different Categories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_minclass_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_deny_ocil:questionnaire:1">
<ns9:title>Set Deny For Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_deny_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_ocil:questionnaire:1">
<ns9:title>Set Lockout Time For Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_unlock_time_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_interval_ocil:questionnaire:1">
<ns9:title>Set Interval For Counting Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_interval_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1">
<ns9:title>Limit Password Reuse</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_libuserconf_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/libuser.conf</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_libuserconf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_tmout_ocil:questionnaire:1">
<ns9:title>Set Interactive Session Timeout</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_tmout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1">
<ns9:title>Limit the Number of Concurrent Login Sessions Allowed Per User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1">
<ns9:title>Ensure that Root's Path Does Not Include World or Group-Writable Directories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1">
<ns9:title>Ensure that User Home Directories are not Group-Writable or World-Readable</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_home_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_bashrc_ocil:questionnaire:1">
<ns9:title>Ensure the Default Bash Umask is Set Correctly</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_bashrc_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_csh_cshrc_ocil:questionnaire:1">
<ns9:title>Ensure the Default C Shell Umask is Set Correctly</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_csh_cshrc_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1">
<ns9:title>Ensure the Default Umask is Set Correctly in /etc/profile</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_profile_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1">
<ns9:title>Ensure the Default Umask is Set Correctly in login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_user_owner_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /etc/grub.conf User Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_user_owner_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_group_owner_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /etc/grub.conf Group Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_group_owner_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /boot/grub/grub.conf Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-bootloader_password_ocil:questionnaire:1">
<ns9:title>Set Boot Loader Password</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-bootloader_password_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-require_singleuser_auth_ocil:questionnaire:1">
<ns9:title>Require Authentication for Single User Mode</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-require_singleuser_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1">
<ns9:title>Disable Ctrl-Alt-Del Reboot Activation</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_interactive_boot_ocil:questionnaire:1">
<ns9:title>Disable Interactive Boot</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_interactive_boot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_screen_installed_ocil:questionnaire:1">
<ns9:title>Install the screen Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_screen_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-smartcard_auth_ocil:questionnaire:1">
<ns9:title>Enable Smart Card Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-smartcard_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-banner_etc_issue_ocil:questionnaire:1">
<ns9:title>Modify the System Login Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-banner_etc_issue_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1">
<ns9:title>Enable GUI Warning Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1">
<ns9:title>Set GUI Warning Banner Text</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for Sending ICMP Redirects by Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for IP Forwarding</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Secure Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Log Martian Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting ICMP Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Secure Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Ignore Bogus ICMP Error Responses</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use TCP Syncookies</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use Reverse Path Filtering for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use Reverse Path Filtering by Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_bluetooth_disabled_ocil:questionnaire:1">
<ns9:title>Disable Bluetooth Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_bluetooth_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_bluetooth_disabled_ocil:questionnaire:1">
<ns9:title>Disable Bluetooth Kernel Modules</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_bluetooth_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1">
<ns9:title>Disable IPv6 Networking Support Automatic Loading</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Router Advertisements</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Router Advertisements</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for Interfaces By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for IPv6 Forwarding</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1">
<ns9:title>Verify ip6tables Enabled if Using IPv6</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ip6tables_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1">
<ns9:title>Set Default ip6tables Policy for Incoming Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_ip6tables_default_rule_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1">
<ns9:title>Verify iptables Enabled</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_iptables_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1">
<ns9:title>Set Default iptables Policy for Incoming Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_iptables_default_rule_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1">
<ns9:title>Set Default iptables Policy for Forwarded Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_iptables_default_rule_forward_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_dccp_disabled_ocil:questionnaire:1">
<ns9:title>Disable DCCP Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_dccp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_sctp_disabled_ocil:questionnaire:1">
<ns9:title>Disable SCTP Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_sctp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1">
<ns9:title>Disable RDS Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_rds_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1">
<ns9:title>Disable TIPC Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_tipc_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_openswan_installed_ocil:questionnaire:1">
<ns9:title>Install openswan or libreswan Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_openswan_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1">
<ns9:title>Ensure rsyslog is Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsyslog_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1">
<ns9:title>Enable rsyslog Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rsyslog_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1">
<ns9:title>Ensure Log Files Are Owned By Appropriate User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_ownership_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1">
<ns9:title>Ensure Log Files Are Owned By Appropriate Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_groupownership_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1">
<ns9:title>Ensure System Log Files Have Correct Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_permissions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1">
<ns9:title>Ensure Logs Sent To Remote Host</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_remote_loghost_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1">
<ns9:title>Ensure Logrotate Runs Periodically</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_logrotate_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1">
<ns9:title>Enable auditd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_auditd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-bootloader_audit_argument_ocil:questionnaire:1">
<ns9:title>Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-bootloader_audit_argument_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1">
<ns9:title>Configure auditd Number of Logs Retained</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_num_logs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1">
<ns9:title>Configure auditd Max Log File Size</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1">
<ns9:title>Configure auditd max_log_file_action Upon Reaching Maximum Log Size</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1">
<ns9:title>Configure auditd space_left Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1">
<ns9:title>Configure auditd admin_space_left Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1">
<ns9:title>Configure auditd mail_acct Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_flush_ocil:questionnaire:1">
<ns9:title>Configure auditd flush priority</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_flush_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1">
<ns9:title>Configure auditd to use audispd's syslog plugin</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1">
<ns9:title>Record attempts to alter time through adjtimex</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_adjtimex_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1">
<ns9:title>Record attempts to alter time through settimeofday</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_settimeofday_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter Time Through stime</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_stime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter Time Through clock_settime</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_clock_settime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter the localtime File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify User/Group Information</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Network Environment</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_var_log_audit_ocil:questionnaire:1">
<ns9:title>System Audit Logs Must Have Mode 0640 or Less Permissive</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1">
<ns9:title>System Audit Logs Must Be Owned By Root</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Mandatory Access Controls</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_mac_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - chmod</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - chown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchmod</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchmodat</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchownat</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fremovexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fsetxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lchown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lremovexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lsetxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - removexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - setxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on the Use of Privileged Commands</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_privileged_commands_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on Exporting to Media (successful)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_media_export_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects File Deletion Events by User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_file_deletion_events_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects System Administrator Actions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on Kernel Module Loading and Unloading</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_xinetd_disabled_ocil:questionnaire:1">
<ns9:title>Disable xinetd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_xinetd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_xinetd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall xinetd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_xinetd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_telnetd_disabled_ocil:questionnaire:1">
<ns9:title>Disable telnet Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_telnetd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall telnet-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_telnet-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_telnet_removed_ocil:questionnaire:1">
<ns9:title>Remove telnet Clients</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_telnet_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsh-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall rsh-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsh-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rexec_disabled_ocil:questionnaire:1">
<ns9:title>Disable rexec Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rexec_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rsh_disabled_ocil:questionnaire:1">
<ns9:title>Disable rsh Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rsh_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsh_removed_ocil:questionnaire:1">
<ns9:title>Uninstal rsh Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsh_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rlogin_disabled_ocil:questionnaire:1">
<ns9:title>Disable rlogin Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rlogin_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1">
<ns9:title>Remove Rsh Trust Files</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_rsh_trust_files_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_ypserv_removed_ocil:questionnaire:1">
<ns9:title>Uninstall ypserv Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_ypserv_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ypbind_disabled_ocil:questionnaire:1">
<ns9:title>Disable ypbind Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ypbind_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_ypbind_removed_ocil:questionnaire:1">
<ns9:title>Remove NIS Client</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_ypbind_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_tftp_disabled_ocil:questionnaire:1">
<ns9:title>Disable tftp Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_tftp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_tftp-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall tftp-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_tftp-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_tftp_removed_ocil:questionnaire:1">
<ns9:title>Remove tftp</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_tftp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-tftpd_uses_secure_mode_ocil:questionnaire:1">
<ns9:title>Ensure tftp Daemon Uses Secure Mode</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-tftpd_uses_secure_mode_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_talk-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall talk-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_talk-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_talk_removed_ocil:questionnaire:1">
<ns9:title>Uninstall talk Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_talk_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_abrtd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Automatic Bug Reporting Tool (abrtd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_abrtd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_acpid_disabled_ocil:questionnaire:1">
<ns9:title>Disable Advanced Configuration and Power Interface (acpid)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_acpid_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_certmonger_disabled_ocil:questionnaire:1">
<ns9:title>Disable Certmonger Service (certmonger)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_certmonger_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cgconfig_disabled_ocil:questionnaire:1">
<ns9:title>Disable Control Group Config (cgconfig)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cgconfig_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cgred_disabled_ocil:questionnaire:1">
<ns9:title>Disable Control Group Rules Engine (cgred)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cgred_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cpuspeed_disabled_ocil:questionnaire:1">
<ns9:title>Disable CPU Speed (cpuspeed)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cpuspeed_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_haldaemon_disabled_ocil:questionnaire:1">
<ns9:title>Disable Hardware Abstraction Layer Service (haldaemon)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_haldaemon_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_irqbalance_enabled_ocil:questionnaire:1">
<ns9:title>Enable IRQ Balance (irqbalance)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_irqbalance_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1">
<ns9:title>Disable KDump Kernel Crash Analyzer (kdump)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_kdump_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_mdmonitor_disabled_ocil:questionnaire:1">
<ns9:title>Disable Software RAID Monitor (mdmonitor)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_mdmonitor_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_messagebus_disabled_ocil:questionnaire:1">
<ns9:title>Disable D-Bus IPC Service (messagebus)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_messagebus_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_netconsole_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network Console (netconsole)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_netconsole_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ntpdate_disabled_ocil:questionnaire:1">
<ns9:title>Disable ntpdate Service (ntpdate)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ntpdate_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_oddjobd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Odd Job Daemon (oddjobd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_oddjobd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_portreserve_disabled_ocil:questionnaire:1">
<ns9:title>Disable Portreserve (portreserve)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_portreserve_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_psacct_enabled_ocil:questionnaire:1">
<ns9:title>Enable Process Accounting (psacct)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_psacct_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_qpidd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Apache Qpid (qpidd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_qpidd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_quota_nld_disabled_ocil:questionnaire:1">
<ns9:title>Disable Quota Netlink (quota_nld)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_quota_nld_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rdisc_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network Router Discovery Daemon (rdisc)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rdisc_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rhnsd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Red Hat Network Service (rhnsd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rhnsd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rhsmcertd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Red Hat Subscription Manager Daemon (rhsmcertd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rhsmcertd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_saslauthd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Cyrus SASL Authentication Daemon (saslauthd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_saslauthd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_smartd_disabled_ocil:questionnaire:1">
<ns9:title>Disable SMART Disk Monitoring Service (smartd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_smartd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_sysstat_disabled_ocil:questionnaire:1">
<ns9:title>Disable System Statistics Reset Service (sysstat)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_sysstat_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_crond_enabled_ocil:questionnaire:1">
<ns9:title>Enable cron Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_crond_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_anacron_ocil:questionnaire:1">
<ns9:title>Disable anacron Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_anacron_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_atd_disabled_ocil:questionnaire:1">
<ns9:title>Disable At Service (atd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_atd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1">
<ns9:title>Allow Only SSH Protocol 2</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_allow_only_protocol2_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1">
<ns9:title>Set SSH Idle Timeout Interval</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_set_idle_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1">
<ns9:title>Set SSH Client Alive Count</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_set_keepalive_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1">
<ns9:title>Disable SSH Support for .rhosts Files</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_rhosts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_host_auth_ocil:questionnaire:1">
<ns9:title>Disable Host-Based Authentication</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_host_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1">
<ns9:title>Disable SSH Root Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_root_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1">
<ns9:title>Disable SSH Access via Empty Passwords</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_empty_passwords_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1">
<ns9:title>Enable SSH Warning Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_enable_warning_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1">
<ns9:title>Do Not Allow SSH Environment Options</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1">
<ns9:title>Use Only Approved Ciphers</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_use_approved_ciphers_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1">
<ns9:title>Use Only Approved MACs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_use_approved_macs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_sssd_installed_ocil:questionnaire:1">
<ns9:title>Install the SSSD Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_sssd_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_sssd_enabled_ocil:questionnaire:1">
<ns9:title>Enable the SSSD Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_sssd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1">
<ns9:title>Configure SSSD's Memory Cache to Expire</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_memcache_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1">
<ns9:title>Configure SSSD to Expire Offline Credentials</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_offline_cred_expiration_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_ssh_known_hosts_timeout_ocil:questionnaire:1">
<ns9:title>Configure SSSD to Expire SSH Known Hosts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_ssh_known_hosts_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-xwindows_runlevel_setting_ocil:questionnaire:1">
<ns9:title>Disable X Windows Startup By Setting Runlevel</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-xwindows_runlevel_setting_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_xorg-x11-server-common_removed_ocil:questionnaire:1">
<ns9:title>Remove the X Windows Package Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_xorg-x11-server-common_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_avahi-daemon_disabled_ocil:questionnaire:1">
<ns9:title>Disable Avahi Server Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_avahi-daemon_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cups_disabled_ocil:questionnaire:1">
<ns9:title>Disable the CUPS Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cups_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_dhcpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable DHCP Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_dhcpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dhcp_removed_ocil:questionnaire:1">
<ns9:title>Uninstall DHCP Server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dhcp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_ocil:questionnaire:1">
<ns9:title>Disable DHCP Client</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysconfig_networking_bootproto_ifcfg_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1">
<ns9:title>Enable the NTP Daemon</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ntpd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1">
<ns9:title>Specify a Remote NTP Server</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ntpd_specify_remote_server_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_postfix_enabled_ocil:questionnaire:1">
<ns9:title>Enable Postfix Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_postfix_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_sendmail_removed_ocil:questionnaire:1">
<ns9:title>Uninstall Sendmail Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_sendmail_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-postfix_network_listening_disabled_ocil:questionnaire:1">
<ns9:title>Disable Postfix Network Listening</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-postfix_network_listening_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ldap_client_start_tls_ocil:questionnaire:1">
<ns9:title>Configure LDAP Client to Use TLS For All Transactions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ldap_client_start_tls_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ldap_client_tls_cacertpath_ocil:questionnaire:1">
<ns9:title>Configure Certificate Directives for LDAP Use of TLS</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ldap_client_tls_cacertpath_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_openldap-servers_removed_ocil:questionnaire:1">
<ns9:title>Uninstall openldap-servers Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_openldap-servers_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-nfs_no_anonymous_ocil:questionnaire:1">
<ns9:title>Specify UID and GID for Anonymous NFS Connections</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-nfs_no_anonymous_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_nfs_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network File System (nfs)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_nfs_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rpcsvcgssd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Secure RPC Server Service (rpcsvcgssd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rpcsvcgssd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_nodev_remote_filesystems_ocil:questionnaire:1">
<ns9:title>Mount Remote Filesystems with nodev</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_nodev_remote_filesystems_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_nosuid_remote_filesystems_ocil:questionnaire:1">
<ns9:title>Mount Remote Filesystems with nosuid</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_nosuid_remote_filesystems_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_insecure_locks_exports_ocil:questionnaire:1">
<ns9:title>Ensure Insecure File Locking is Not Allowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_insecure_locks_exports_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_named_disabled_ocil:questionnaire:1">
<ns9:title>Disable DNS Server</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_named_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_bind_removed_ocil:questionnaire:1">
<ns9:title>Uninstall bind Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_bind_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_vsftpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable vsftpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_vsftpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_vsftpd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall vsftpd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_vsftpd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ftp_log_transactions_ocil:questionnaire:1">
<ns9:title>Enable Logging of All FTP Transactions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ftp_log_transactions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ftp_present_banner_ocil:questionnaire:1">
<ns9:title>Create Warning Banners for All FTP Users</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ftp_present_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_httpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable httpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_httpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_httpd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall httpd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_httpd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_dovecot_disabled_ocil:questionnaire:1">
<ns9:title>Disable Dovecot Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_dovecot_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dovecot_removed_ocil:questionnaire:1">
<ns9:title>Uninstall dovecot Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dovecot_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_smb_disabled_ocil:questionnaire:1">
<ns9:title>Disable Samba</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_smb_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_samba_removed_ocil:questionnaire:1">
<ns9:title>Uninstall samba Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_samba_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_samba-common_installed_ocil:questionnaire:1">
<ns9:title>Install the Samba Common Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_samba-common_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-require_smb_client_signing_ocil:questionnaire:1">
<ns9:title>Require Client SMB Packet Signing, if using smbclient</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-require_smb_client_signing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_smb_client_signing_ocil:questionnaire:1">
<ns9:title>Require Client SMB Packet Signing, if using mount.cifs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_smb_client_signing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_squid_disabled_ocil:questionnaire:1">
<ns9:title>Disable Squid</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_squid_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_squid_removed_ocil:questionnaire:1">
<ns9:title>Uninstall squid Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_squid_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_snmpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable snmpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_snmpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_net-snmp_removed_ocil:questionnaire:1">
<ns9:title>Uninstall net-snmp Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_net-snmp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-snmpd_use_newer_protocol_ocil:questionnaire:1">
<ns9:title>Configure SNMP Service to Use Only SNMPv3 or Newer </ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-snmpd_use_newer_protocol_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-snmpd_not_default_password_ocil:questionnaire:1">
<ns9:title>Ensure Default Password Is Not Used</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-snmpd_not_default_password_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_generic_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_generic_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_auditing_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_auditing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_nonselected_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_nonselected_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_nonfinding_nonselected_scope_ocil:questionnaire:1">
<ns9:title>Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_nonfinding_nonselected_scope_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_finding_nonselected_ocil:questionnaire:1">
<ns9:title>Implementation of the Requirement is Not Supported</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_finding_nonselected_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_nonfinding_scope_ocil:questionnaire:1">
<ns9:title>Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_nonfinding_scope_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-update_process_ocil:questionnaire:1">
<ns9:title>A process for prompt installation of OS updates must exist.</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-update_process_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
</ns9:questionnaires>
<ns9:test_actions>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_tmp_action:testaction:1" question_ref="ocil:ssg-partition_for_tmp_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_action:testaction:1" question_ref="ocil:ssg-partition_for_var_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_log_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_log_audit_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_home_action:testaction:1" question_ref="ocil:ssg-partition_for_home_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-encrypt_partitions_action:testaction:1" question_ref="ocil:ssg-encrypt_partitions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_redhat_gpgkey_installed_action:testaction:1" question_ref="ocil:ssg-ensure_redhat_gpgkey_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1" question_ref="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_gpgcheck_never_disabled_action:testaction:1" question_ref="ocil:ssg-ensure_gpgcheck_never_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-security_patches_up_to_date_action:testaction:1" question_ref="ocil:ssg-security_patches_up_to_date_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_aide_installed_action:testaction:1" question_ref="ocil:ssg-package_aide_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-aide_build_database_action:testaction:1" question_ref="ocil:ssg-aide_build_database_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-aide_periodic_cron_checking_action:testaction:1" question_ref="ocil:ssg-aide_periodic_cron_checking_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rpm_verify_permissions_action:testaction:1" question_ref="ocil:ssg-rpm_verify_permissions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rpm_verify_hashes_action:testaction:1" question_ref="ocil:ssg-rpm_verify_hashes_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-install_hids_action:testaction:1" question_ref="ocil:ssg-install_hids_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-install_antivirus_action:testaction:1" question_ref="ocil:ssg-install_antivirus_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dracut-fips_installed_action:testaction:1" question_ref="ocil:ssg-package_dracut-fips_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-grub_enable_fips_mode_action:testaction:1" question_ref="ocil:ssg-grub_enable_fips_mode_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-installed_OS_is_certified_action:testaction:1" question_ref="ocil:ssg-installed_OS_is_certified_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1" question_ref="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gnome_gdm_disable_guest_login_action:testaction:1" question_ref="ocil:ssg-gnome_gdm_disable_guest_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_automount_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_noexec_removable_partitions_action:testaction:1" question_ref="ocil:ssg-mount_option_noexec_removable_partitions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_usb-storage_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_usb-storage_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_autofs_disabled_action:testaction:1" question_ref="ocil:ssg-service_autofs_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-userowner_shadow_file_action:testaction:1" question_ref="ocil:ssg-userowner_shadow_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-groupowner_shadow_file_action:testaction:1" question_ref="ocil:ssg-groupowner_shadow_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_shadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_shadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_group_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_library_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_library_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_binary_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_binary_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_files_unowned_by_user_action:testaction:1" question_ref="ocil:ssg-no_files_unowned_by_user_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_ungroupowned_action:testaction:1" question_ref="ocil:ssg-file_permissions_ungroupowned_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_system_owned_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_system_owned_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-umask_for_daemons_action:testaction:1" question_ref="ocil:ssg-umask_for_daemons_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_users_coredumps_action:testaction:1" question_ref="ocil:ssg-disable_users_coredumps_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1" question_ref="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_exec_shield_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_exec_shield_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_dmesg_restrict_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_dmesg_restrict_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-enable_selinux_bootloader_action:testaction:1" question_ref="ocil:ssg-enable_selinux_bootloader_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_state_action:testaction:1" question_ref="ocil:ssg-selinux_state_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_policytype_action:testaction:1" question_ref="ocil:ssg-selinux_policytype_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_all_devicefiles_labeled_action:testaction:1" question_ref="ocil:ssg-selinux_all_devicefiles_labeled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_direct_root_logins_action:testaction:1" question_ref="ocil:ssg-no_direct_root_logins_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-securetty_root_login_console_only_action:testaction:1" question_ref="ocil:ssg-securetty_root_login_console_only_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-restrict_serial_port_logins_action:testaction:1" question_ref="ocil:ssg-restrict_serial_port_logins_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_root_webbrowsing_action:testaction:1" question_ref="ocil:ssg-no_root_webbrowsing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_shelllogin_for_systemaccounts_action:testaction:1" question_ref="ocil:ssg-no_shelllogin_for_systemaccounts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_no_uid_except_zero_action:testaction:1" question_ref="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-root_path_default_action:testaction:1" question_ref="ocil:ssg-root_path_default_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_empty_passwords_action:testaction:1" question_ref="ocil:ssg-no_empty_passwords_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_all_shadowed_action:testaction:1" question_ref="ocil:ssg-accounts_password_all_shadowed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gid_passwd_group_same_action:testaction:1" question_ref="ocil:ssg-gid_passwd_group_same_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_netrc_files_action:testaction:1" question_ref="ocil:ssg-no_netrc_files_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_disable_post_pw_expiration_action:testaction:1" question_ref="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_unique_name_action:testaction:1" question_ref="ocil:ssg-account_unique_name_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_temp_expire_date_action:testaction:1" question_ref="ocil:ssg-account_temp_expire_date_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-display_login_attempts_action:testaction:1" question_ref="ocil:ssg-display_login_attempts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_retry_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_retry_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_maxrepeat_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_maxrepeat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_dcredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_dcredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_minlen_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_minlen_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_ucredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_ucredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_ocredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_ocredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_lcredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_lcredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_difok_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_difok_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_minclass_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_minclass_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_deny_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_deny_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_interval_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_interval_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_libuserconf_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_libuserconf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_tmout_action:testaction:1" question_ref="ocil:ssg-accounts_tmout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1" question_ref="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1" question_ref="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_home_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_home_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_bashrc_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_bashrc_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_csh_cshrc_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_csh_cshrc_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_profile_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_profile_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_user_owner_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_user_owner_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_group_owner_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_group_owner_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_permissions_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-bootloader_password_action:testaction:1" question_ref="ocil:ssg-bootloader_password_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-require_singleuser_auth_action:testaction:1" question_ref="ocil:ssg-require_singleuser_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_interactive_boot_action:testaction:1" question_ref="ocil:ssg-disable_interactive_boot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_screen_installed_action:testaction:1" question_ref="ocil:ssg-package_screen_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-smartcard_auth_action:testaction:1" question_ref="ocil:ssg-smartcard_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-banner_etc_issue_action:testaction:1" question_ref="ocil:ssg-banner_etc_issue_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_bluetooth_disabled_action:testaction:1" question_ref="ocil:ssg-service_bluetooth_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_bluetooth_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_bluetooth_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ip6tables_enabled_action:testaction:1" question_ref="ocil:ssg-service_ip6tables_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_ip6tables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_ip6tables_default_rule_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_iptables_enabled_action:testaction:1" question_ref="ocil:ssg-service_iptables_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_forward_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_dccp_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_dccp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_sctp_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_sctp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_rds_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_rds_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_tipc_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_openswan_installed_action:testaction:1" question_ref="ocil:ssg-package_openswan_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsyslog_installed_action:testaction:1" question_ref="ocil:ssg-package_rsyslog_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rsyslog_enabled_action:testaction:1" question_ref="ocil:ssg-service_rsyslog_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_ownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_ownership_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_groupownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_groupownership_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_permissions_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_permissions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_remote_loghost_action:testaction:1" question_ref="ocil:ssg-rsyslog_remote_loghost_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_logrotate_activated_action:testaction:1" question_ref="ocil:ssg-ensure_logrotate_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_auditd_enabled_action:testaction:1" question_ref="ocil:ssg-service_auditd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-bootloader_audit_argument_action:testaction:1" question_ref="ocil:ssg-bootloader_audit_argument_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_num_logs_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_flush_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_flush_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_adjtimex_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_settimeofday_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_stime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_stime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_clock_settime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_var_log_audit_action:testaction:1" question_ref="ocil:ssg-file_permissions_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_var_log_audit_action:testaction:1" question_ref="ocil:ssg-file_ownership_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_mac_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_mac_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_media_export_action:testaction:1" question_ref="ocil:ssg-audit_rules_media_export_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_file_deletion_events_action:testaction:1" question_ref="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1" question_ref="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_xinetd_disabled_action:testaction:1" question_ref="ocil:ssg-service_xinetd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_xinetd_removed_action:testaction:1" question_ref="ocil:ssg-package_xinetd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_telnetd_disabled_action:testaction:1" question_ref="ocil:ssg-service_telnetd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_telnet-server_removed_action:testaction:1" question_ref="ocil:ssg-package_telnet-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_telnet_removed_action:testaction:1" question_ref="ocil:ssg-package_telnet_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsh-server_removed_action:testaction:1" question_ref="ocil:ssg-package_rsh-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rexec_disabled_action:testaction:1" question_ref="ocil:ssg-service_rexec_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rsh_disabled_action:testaction:1" question_ref="ocil:ssg-service_rsh_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsh_removed_action:testaction:1" question_ref="ocil:ssg-package_rsh_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rlogin_disabled_action:testaction:1" question_ref="ocil:ssg-service_rlogin_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_rsh_trust_files_action:testaction:1" question_ref="ocil:ssg-no_rsh_trust_files_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_ypserv_removed_action:testaction:1" question_ref="ocil:ssg-package_ypserv_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ypbind_disabled_action:testaction:1" question_ref="ocil:ssg-service_ypbind_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_ypbind_removed_action:testaction:1" question_ref="ocil:ssg-package_ypbind_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_tftp_disabled_action:testaction:1" question_ref="ocil:ssg-service_tftp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_tftp-server_removed_action:testaction:1" question_ref="ocil:ssg-package_tftp-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_tftp_removed_action:testaction:1" question_ref="ocil:ssg-package_tftp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-tftpd_uses_secure_mode_action:testaction:1" question_ref="ocil:ssg-tftpd_uses_secure_mode_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_talk-server_removed_action:testaction:1" question_ref="ocil:ssg-package_talk-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_talk_removed_action:testaction:1" question_ref="ocil:ssg-package_talk_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_abrtd_disabled_action:testaction:1" question_ref="ocil:ssg-service_abrtd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_acpid_disabled_action:testaction:1" question_ref="ocil:ssg-service_acpid_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_certmonger_disabled_action:testaction:1" question_ref="ocil:ssg-service_certmonger_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cgconfig_disabled_action:testaction:1" question_ref="ocil:ssg-service_cgconfig_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cgred_disabled_action:testaction:1" question_ref="ocil:ssg-service_cgred_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cpuspeed_disabled_action:testaction:1" question_ref="ocil:ssg-service_cpuspeed_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_haldaemon_disabled_action:testaction:1" question_ref="ocil:ssg-service_haldaemon_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_irqbalance_enabled_action:testaction:1" question_ref="ocil:ssg-service_irqbalance_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_kdump_disabled_action:testaction:1" question_ref="ocil:ssg-service_kdump_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_mdmonitor_disabled_action:testaction:1" question_ref="ocil:ssg-service_mdmonitor_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_messagebus_disabled_action:testaction:1" question_ref="ocil:ssg-service_messagebus_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_netconsole_disabled_action:testaction:1" question_ref="ocil:ssg-service_netconsole_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ntpdate_disabled_action:testaction:1" question_ref="ocil:ssg-service_ntpdate_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_oddjobd_disabled_action:testaction:1" question_ref="ocil:ssg-service_oddjobd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_portreserve_disabled_action:testaction:1" question_ref="ocil:ssg-service_portreserve_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_psacct_enabled_action:testaction:1" question_ref="ocil:ssg-service_psacct_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_qpidd_disabled_action:testaction:1" question_ref="ocil:ssg-service_qpidd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_quota_nld_disabled_action:testaction:1" question_ref="ocil:ssg-service_quota_nld_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rdisc_disabled_action:testaction:1" question_ref="ocil:ssg-service_rdisc_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rhnsd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rhnsd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rhsmcertd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rhsmcertd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_saslauthd_disabled_action:testaction:1" question_ref="ocil:ssg-service_saslauthd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_smartd_disabled_action:testaction:1" question_ref="ocil:ssg-service_smartd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_sysstat_disabled_action:testaction:1" question_ref="ocil:ssg-service_sysstat_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_crond_enabled_action:testaction:1" question_ref="ocil:ssg-service_crond_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_anacron_action:testaction:1" question_ref="ocil:ssg-disable_anacron_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_atd_disabled_action:testaction:1" question_ref="ocil:ssg-service_atd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_allow_only_protocol2_action:testaction:1" question_ref="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_set_idle_timeout_action:testaction:1" question_ref="ocil:ssg-sshd_set_idle_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_set_keepalive_action:testaction:1" question_ref="ocil:ssg-sshd_set_keepalive_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_rhosts_action:testaction:1" question_ref="ocil:ssg-sshd_disable_rhosts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_host_auth_action:testaction:1" question_ref="ocil:ssg-disable_host_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_root_login_action:testaction:1" question_ref="ocil:ssg-sshd_disable_root_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_empty_passwords_action:testaction:1" question_ref="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_enable_warning_banner_action:testaction:1" question_ref="ocil:ssg-sshd_enable_warning_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1" question_ref="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_use_approved_ciphers_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_use_approved_macs_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_macs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_sssd_installed_action:testaction:1" question_ref="ocil:ssg-package_sssd_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_sssd_enabled_action:testaction:1" question_ref="ocil:ssg-service_sssd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_memcache_timeout_action:testaction:1" question_ref="ocil:ssg-sssd_memcache_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_offline_cred_expiration_action:testaction:1" question_ref="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_ssh_known_hosts_timeout_action:testaction:1" question_ref="ocil:ssg-sssd_ssh_known_hosts_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-xwindows_runlevel_setting_action:testaction:1" question_ref="ocil:ssg-xwindows_runlevel_setting_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_xorg-x11-server-common_removed_action:testaction:1" question_ref="ocil:ssg-package_xorg-x11-server-common_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_avahi-daemon_disabled_action:testaction:1" question_ref="ocil:ssg-service_avahi-daemon_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cups_disabled_action:testaction:1" question_ref="ocil:ssg-service_cups_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_dhcpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_dhcpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dhcp_removed_action:testaction:1" question_ref="ocil:ssg-package_dhcp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_action:testaction:1" question_ref="ocil:ssg-sysconfig_networking_bootproto_ifcfg_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ntpd_enabled_action:testaction:1" question_ref="ocil:ssg-service_ntpd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ntpd_specify_remote_server_action:testaction:1" question_ref="ocil:ssg-ntpd_specify_remote_server_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_postfix_enabled_action:testaction:1" question_ref="ocil:ssg-service_postfix_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_sendmail_removed_action:testaction:1" question_ref="ocil:ssg-package_sendmail_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-postfix_network_listening_disabled_action:testaction:1" question_ref="ocil:ssg-postfix_network_listening_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ldap_client_start_tls_action:testaction:1" question_ref="ocil:ssg-ldap_client_start_tls_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ldap_client_tls_cacertpath_action:testaction:1" question_ref="ocil:ssg-ldap_client_tls_cacertpath_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_openldap-servers_removed_action:testaction:1" question_ref="ocil:ssg-package_openldap-servers_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-nfs_no_anonymous_action:testaction:1" question_ref="ocil:ssg-nfs_no_anonymous_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_nfs_disabled_action:testaction:1" question_ref="ocil:ssg-service_nfs_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rpcsvcgssd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rpcsvcgssd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_nodev_remote_filesystems_action:testaction:1" question_ref="ocil:ssg-mount_option_nodev_remote_filesystems_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_nosuid_remote_filesystems_action:testaction:1" question_ref="ocil:ssg-mount_option_nosuid_remote_filesystems_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_insecure_locks_exports_action:testaction:1" question_ref="ocil:ssg-no_insecure_locks_exports_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_named_disabled_action:testaction:1" question_ref="ocil:ssg-service_named_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_bind_removed_action:testaction:1" question_ref="ocil:ssg-package_bind_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_vsftpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_vsftpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_vsftpd_removed_action:testaction:1" question_ref="ocil:ssg-package_vsftpd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ftp_log_transactions_action:testaction:1" question_ref="ocil:ssg-ftp_log_transactions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ftp_present_banner_action:testaction:1" question_ref="ocil:ssg-ftp_present_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_httpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_httpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_httpd_removed_action:testaction:1" question_ref="ocil:ssg-package_httpd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_dovecot_disabled_action:testaction:1" question_ref="ocil:ssg-service_dovecot_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dovecot_removed_action:testaction:1" question_ref="ocil:ssg-package_dovecot_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_smb_disabled_action:testaction:1" question_ref="ocil:ssg-service_smb_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_samba_removed_action:testaction:1" question_ref="ocil:ssg-package_samba_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_samba-common_installed_action:testaction:1" question_ref="ocil:ssg-package_samba-common_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-require_smb_client_signing_action:testaction:1" question_ref="ocil:ssg-require_smb_client_signing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_smb_client_signing_action:testaction:1" question_ref="ocil:ssg-mount_option_smb_client_signing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_squid_disabled_action:testaction:1" question_ref="ocil:ssg-service_squid_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_squid_removed_action:testaction:1" question_ref="ocil:ssg-package_squid_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_snmpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_snmpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_net-snmp_removed_action:testaction:1" question_ref="ocil:ssg-package_net-snmp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-snmpd_use_newer_protocol_action:testaction:1" question_ref="ocil:ssg-snmpd_use_newer_protocol_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-snmpd_not_default_password_action:testaction:1" question_ref="ocil:ssg-snmpd_not_default_password_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_generic_action:testaction:1" question_ref="ocil:ssg-met_inherently_generic_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_auditing_action:testaction:1" question_ref="ocil:ssg-met_inherently_auditing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_nonselected_action:testaction:1" question_ref="ocil:ssg-met_inherently_nonselected_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_nonfinding_nonselected_scope_action:testaction:1" question_ref="ocil:ssg-unmet_nonfinding_nonselected_scope_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_finding_nonselected_action:testaction:1" question_ref="ocil:ssg-unmet_finding_nonselected_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_nonfinding_scope_action:testaction:1" question_ref="ocil:ssg-unmet_nonfinding_scope_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-update_process_action:testaction:1" question_ref="ocil:ssg-update_process_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
</ns9:test_actions>
<ns9:questions>
<ns9:boolean_question id="ocil:ssg-partition_for_tmp_question:question:1">
<ns9:question_text>
Run the following command to determine if /tmp
is on its own partition or logical volume:
$ mount | grep "on /tmp "
If /tmp has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_question:question:1">
<ns9:question_text>
Run the following command to determine if /var
is on its own partition or logical volume:
$ mount | grep "on /var "
If /var has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_log_question:question:1">
<ns9:question_text>
Run the following command to determine if /var/log
is on its own partition or logical volume:
$ mount | grep "on /var/log "
If /var/log has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_log_audit_question:question:1">
<ns9:question_text>
Run the following command to determine if /var/log/audit
is on its own partition or logical volume:
$ mount | grep "on /var/log/audit "
If /var/log/audit has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_home_question:question:1">
<ns9:question_text>
Run the following command to determine if /home
is on its own partition or logical volume:
$ mount | grep "on /home "
If /home has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-encrypt_partitions_question:question:1">
<ns9:question_text>
Determine if encryption must be used to protect data on the system.
Is it the case that encryption must be used and is not employed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_redhat_gpgkey_installed_question:question:1">
<ns9:question_text>
To ensure that the GPG key is installed, run:
$ rpm -q --queryformat "%{SUMMARY}\n" gpg-pubkey
The command should return the string below:
gpg(Red Hat, Inc. (release key 2) <security@redhat.com>
Is it the case that the Red Hat GPG Key is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
<ns9:question_text>
To determine whether yum is configured to use gpgcheck,
inspect /etc/yum.conf and ensure the following appears in the
[main] section:
gpgcheck=1
A value of 1 indicates that gpgcheck is enabled. Absence of a
gpgcheck line or a setting of 0 indicates that it is
disabled.
Is it the case that GPG checking is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_gpgcheck_never_disabled_question:question:1">
<ns9:question_text>
To determine whether yum has been configured to disable
gpgcheck for any repos, inspect all files in
/etc/yum.repos.d and ensure the following does not appear in any
sections:
gpgcheck=0
A value of 0 indicates that gpgcheck has been disabled for that repo.
Is it the case that GPG checking is disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-security_patches_up_to_date_question:question:1">
<ns9:question_text>
If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or
a yum server which provides updates, invoking the following command will
indicate if updates are available:
$ sudo yum check-update
If the system is not configured to update from one of these sources,
run the following command to list when each package was last updated:
$ rpm -qa -last
Compare this to Red Hat Security Advisories (RHSA) listed at
https://access.redhat.com/security/updates/active/https://access.redhat.com/security/updates/active/
to determine if the system is missing applicable updates.
Is it the case that updates are not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_aide_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the aide package is installed:
$ rpm -q aide
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-aide_build_database_question:question:1">
<ns9:question_text>
To find the location of the AIDE databse file, run the following command:
$ sudo ls -l DBDIR/database_file_name
Is it the case that there is no database file?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-aide_periodic_cron_checking_question:question:1">
<ns9:question_text>
To determine that periodic AIDE execution has been scheduled, run the following command:
$ grep aide /etc/crontab
Is it the case that there is no output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rpm_verify_permissions_question:question:1">
<ns9:question_text>
The following command will list which files on the system have permissions different from what
is expected by the RPM database:
$ rpm -Va | grep '^.M'
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rpm_verify_hashes_question:question:1">
<ns9:question_text> The following command will list which files on the system
have file hashes different from what is expected by the RPM database.
$ rpm -Va | awk '$1 ~ /..5/ && $2 != "c"'
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-install_hids_question:question:1">
<ns9:question_text>
Inspect the system to determine if intrusion detection software has been installed.
Verify this intrusion detection software is active.
Is it the case that no host-based intrusion detection tools are installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-install_antivirus_question:question:1">
<ns9:question_text>
Inspect the system for a cron job or system service which executes
a virus scanning tool regularly.
To verify the McAfee VSEL system service is operational,
run the following command:
$ sudo /sbin/service nails status
To check on the age of uvscan virus definition files, run the following command:
$ sudo cd /opt/NAI/LinuxShield/engine/dat
$ sudo ls -la avvscan.dat avvnames.dat avvclean.dat
Is it the case that virus scanning software does not run continuously, or at least daily, or has signatures that are out of date?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dracut-fips_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dracut-fips package is installed:
$ rpm -q dracut-fips
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-grub_enable_fips_mode_question:question:1">
<ns9:question_text>
To verify that FIPS is enabled properly in grub, run the following command:
$ grep fips /etc/grub.conf
The output should contain fips=1
Is it the case that FIPS is not configured or enabled in grub?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-installed_OS_is_certified_question:question:1">
<ns9:question_text>
To verify that the installed operating system is supported or certified, run
the following command:
$ grep -i "red hat" /etc/redhat-release
The output should contain something similar to:
Red Hat Enterprise Linux Server 6.3 (Santiago)
Is it the case that the installed operating system is not supported or certified?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
<ns9:question_text>
To verify that automatic logins are disabled, run the following command:
$ grep -Pzoi "^\[daemon]\\nautomaticlogin.*" /etc/gdm/custom.conf
The output should show the following:
[daemon]
AutomaticLoginEnable=false
Is it the case that GDM allows users to automatically login?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gnome_gdm_disable_guest_login_question:question:1">
<ns9:question_text>
To verify that timed logins are disabled, run the following command:
$ grep -Pzoi "^\[daemon]\\ntimedlogin.*" /etc/gdm/custom.conf
The output should show the following:
[daemon]
TimedLoginEnable=false
Is it the case that GDM allows a guest to login without credentials?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
<ns9:question_text>
To ensure the user list is disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_user_list
The output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
<ns9:question_text>
To ensure disable and restart on the login screen are disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_restart_buttons
The output should be true.
Is it the case that disable-restart-buttons has not been configured or is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/idle_delay
If properly configured, the output should be .
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
<ns9:question_text>To check the screensaver mandatory use status, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/idle_activation_enabled
If properly configured, the output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/lock_enabled
If properly configured, the output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
<ns9:question_text>
To ensure the screensaver is configured to be blank, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/mode
If properly configured, the output should be blank-only
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_time
If properly configured, the output should be .
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_action
If properly configured, the output should be forced-logout.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
<ns9:question_text>
To ensure the system is configured to ignore the Ctrl-Alt-Del sequence,
run the following command:
$ gconftool-2 -g /apps/gnome_settings_daemon/keybindings/power
The output should return nothing.
Is it the case that GNOME3 is configured to reboot when Ctrl-Alt-Del is pressed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_temperature
If properly configured, the output should be false.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_weather
If properly configured, the output should be false.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
<ns9:question_text>
To ensure that WIFI connections cannot be created, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-wifi-create
The output should return true.
Is it the case that WIFI connections can be created through GNOME?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
<ns9:question_text>
To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-disconnected-notifications
The output should return true.
Is it the case that wireless disconnecting network notification is enabled and not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
<ns9:question_text>
To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-connected-notifications
The output should return true.
Is it the case that wireless connecting network notification is enabled and not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
<ns9:question_text>
These settings can be verified by running the following:
$ gconftool-2 -g /apps/nautilus/preferences/media_automount
The output should return false.
$ gconftool-2 -g /apps/nautilus/preferences/media_autorun_never
The output should return true.
Is it the case that GNOME automounting is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
<ns9:question_text>
These settings can be verified by running the following:
$ gconftool-2 -g /desktop/gnome/thumbnailers/disable_all
The output should return true.
Is it the case that GNOME thumbnailers are not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_noexec_removable_partitions_question:question:1">
<ns9:question_text>
To verify that binaries cannot be directly executed from removable media, run the following command:
$ grep -v noexec /etc/fstab
The resulting output will show partitions which do not have the noexec flag. Verify all partitions
in the output are not removable media.
Is it the case that removable media partitions are present?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_usb-storage_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
usb-storage kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r usb-storage /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_autofs_disabled_question:question:1">
<ns9:question_text>
To check that the autofs service is disabled in system boot configuration, run the following command:
$ sudo chkconfig autofs --list
Output should indicate the autofs service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig autofs --list
autofs 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify autofs is disabled through current runtime configuration:
$ sudo service autofs status
If the service is disabled the command will return the following output:
autofs is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-userowner_shadow_file_question:question:1">
<ns9:question_text>
To check the ownership of /etc/shadow, run the command:
$ ls -lL /etc/shadow
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-groupowner_shadow_file_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/shadow, run the command:
$ ls -lL /etc/shadow
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_shadow_question:question:1">
<ns9:question_text>
To check the permissions of /etc/shadow, run the command:
$ ls -l /etc/shadow
If properly configured, the output should indicate the following permissions:
----------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_group_question:question:1">
<ns9:question_text>
To check the ownership of /etc/group, run the command:
$ ls -lL /etc/group
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_group_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/group, run the command:
$ ls -lL /etc/group
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_group_question:question:1">
<ns9:question_text>
To check the permissions of /etc/group, run the command:
$ ls -l /etc/group
If properly configured, the output should indicate the following permissions:
-rw-r--r--
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_gshadow_question:question:1">
<ns9:question_text>
To check the ownership of /etc/gshadow, run the command:
$ ls -lL /etc/gshadow
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/gshadow, run the command:
$ ls -lL /etc/gshadow
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
<ns9:question_text>
To check the permissions of /etc/gshadow, run the command:
$ ls -l /etc/gshadow
If properly configured, the output should indicate the following permissions:
----------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_passwd_question:question:1">
<ns9:question_text>
To check the ownership of /etc/passwd, run the command:
$ ls -lL /etc/passwd
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/passwd, run the command:
$ ls -lL /etc/passwd
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_passwd_question:question:1">
<ns9:question_text>
To check the permissions of /etc/passwd, run the command:
$ ls -l /etc/passwd
If properly configured, the output should indicate the following permissions:
-rw-r--r--
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_library_dirs_question:question:1">
<ns9:question_text>
Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64
To find shared libraries that are group-writable or world-writable,
run the following command for each directory DIR which contains shared libraries:
$ sudo find -L DIR -perm /022 -type f
Is it the case that any of these files are group-writable or world-writable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_library_dirs_question:question:1">
<ns9:question_text>
Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64
For each of these directories, run the following command to find files not
owned by root:
$ sudo find -L $DIR \! -user root -exec chown root {} \;
Is it the case that any of these files are not owned by root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_binary_dirs_question:question:1">
<ns9:question_text>
System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are group-writable or world-writable,
run the following command for each directory DIR which contains system executables:
$ sudo find -L DIR -perm /022 -type f
Is it the case that any system executables are found to be group or world writable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_binary_dirs_question:question:1">
<ns9:question_text>
System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are not owned by root,
run the following command for each directory DIR which contains system executables:
$ sudo find DIR/ \! -user root
Is it the case that any system executables are found to not be owned by root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
<ns9:question_text>
To find world-writable directories that lack the sticky bit, run the following command:
$ sudo find / -xdev -type d -perm 002 ! -perm 1000
Is it the case that any world-writable directories are missing the sticky bit?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_files_unowned_by_user_question:question:1">
<ns9:question_text>
The following command will discover and print any
files on local partitions which do not belong to a valid user.
Run it once for each local partition PART:
$ sudo find PART -xdev -nouser -print
Is it the case that files exist that are not owned by a valid user?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_ungroupowned_question:question:1">
<ns9:question_text>
The following command will discover and print any
files on local partitions which do not belong to a valid group.
Run it once for each local partition PART:
$ sudo find PART -xdev -nogroup -print
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-dir_perms_world_writable_system_owned_question:question:1">
<ns9:question_text>
The following command will discover and print world-writable directories that
are not owned by a system account, given the assumption that only system
accounts have a uid lower than 500. Run it once for each local partition PART:
$ sudo find PART -xdev -type d -perm -0002 -uid +499 -print
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-umask_for_daemons_question:question:1">
<ns9:question_text>
To check the value of the umask, run the following command:
$ grep umask /etc/init.d/functions
The output should show either 022 or 027.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_users_coredumps_question:question:1">
<ns9:question_text>
To verify that core dumps are disabled for all users, run the following command:
$ grep core /etc/security/limits.conf
The output should be:
* hard core 0
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
<ns9:question_text>
The status of the fs.suid_dumpable kernel parameter can be queried
by running the following command:
preserve$ sysctl fs.suid_dumpable
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_exec_shield_question:question:1">
<ns9:question_text>
The status of the kernel.exec-shield kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.exec-shield
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
<ns9:question_text>
The status of the kernel.randomize_va_space kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.randomize_va_space
The output of the command should indicate a value of 2.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_dmesg_restrict_question:question:1">
<ns9:question_text>
The status of the kernel.dmesg_restrict kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.dmesg_restrict
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-enable_selinux_bootloader_question:question:1">
<ns9:question_text>
Inspect /etc/grub.conf for any instances of selinux=0
in the kernel boot arguments. Presence of selinux=0 indicates
that SELinux is disabled at boot time.
Is it the case that SELinux is disabled at boot time?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_state_question:question:1">
<ns9:question_text>
Check the file /etc/selinux/config and ensure the following line appears:
SELINUX=
Is it the case that SELINUX is not set to enforcing?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_policytype_question:question:1">
<ns9:question_text>
Check the file /etc/selinux/config and ensure the following line appears:
SELINUXTYPE=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_all_devicefiles_labeled_question:question:1">
<ns9:question_text>To check for unlabeled device files, run the following command:
$ sudo find /dev -context *:device_t:* \( -type c -o -type b \) -printf "%p %Z\n"
It should produce no output in a well-configured system.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_direct_root_logins_question:question:1">
<ns9:question_text>
To ensure root may not directly login to the system over physical consoles,
run the following command:
cat /etc/securetty
If any output is returned, this is a finding.
Is it the case that the /etc/securetty file is not empty?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-securetty_root_login_console_only_question:question:1">
<ns9:question_text>
To check for virtual console entries which permit root login, run the
following command:
$ sudo grep ^vc/[0-9] /etc/securetty
If any output is returned, then root logins over virtual console devices is permitted.
Is it the case that root login over virtual console devices is permitted?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-restrict_serial_port_logins_question:question:1">
<ns9:question_text>
To check for serial port entries which permit root login,
run the following command:
$ sudo grep ^ttyS/[0-9] /etc/securetty
If any output is returned, then root login over serial ports is permitted.
Is it the case that root login over serial ports is permitted?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_root_webbrowsing_question:question:1">
<ns9:question_text>
Check the root home directory for a .mozilla directory. If
one exists, ensure browsing is limited to local service administration.
Is it the case that this is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_shelllogin_for_systemaccounts_question:question:1">
<ns9:question_text>
To obtain a listing of all users, their UIDs, and their shells, run the
command: $ awk -F: '{print $1 ":" $3 ":" $7}' /etc/passwd Identify
the system accounts from this listing. These will primarily be the accounts
with UID numbers less than UID_MIN, other than root. Value of the UID_MIN
directive is set in /etc/login.defs configuration file. In the default
configuration UID_MIN is set to 500.
Is it the case that any system account (other than root) has a login shell?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
<ns9:question_text>
To list all password file entries for accounts with UID 0, run the following command:
$ awk -F: '($3 == 0) {print}' /etc/passwd
This should print only one line, for the user root.
Is it the case that any account other than root has a UID of 0?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-root_path_default_question:question:1">
<ns9:question_text>
To view the root user's PATH, run the following command:
$ sudo env | grep PATH
If correctly configured, the PATH must: use vendor default settings,
have no empty entries, and have no entries beginning with a character
other than a slash (/).
Is it the case that any of these conditions are not met?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_empty_passwords_question:question:1">
<ns9:question_text>
To verify that null passwords cannot be used, run the following command:
$ grep nullok /etc/pam.d/system-auth
If this produces any output, it may be possible to log into accounts
with empty passwords.
Is it the case that NULL passwords can be used?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_all_shadowed_question:question:1">
<ns9:question_text>
To check that no password hashes are stored in
/etc/passwd, run the following command:
$ awk -F: '($2 != "x") {print}' /etc/passwd
If it produces any output, then a password hash is
stored in /etc/passwd.
Is it the case that any stored hashes are found in /etc/passwd?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gid_passwd_group_same_question:question:1">
<ns9:question_text>
To ensure all GIDs referenced in /etc/passwd are defined in /etc/group,
run the following command:
$ sudo pwck -qr
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_netrc_files_question:question:1">
<ns9:question_text>
To check the system for the existence of any .netrc files,
run the following command:
$ sudo find /root /home -xdev -name .netrc
Is it the case that any .netrc files exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
<ns9:question_text>
To check the minimum password length, run the command:
$ grep PASS_MIN_LEN /etc/login.defs
The DoD requirement is 15.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
<ns9:question_text>
To check the minimum password age, run the command:
$ grep PASS_MIN_DAYS /etc/login.defs
The DoD and FISMA requirement is 1.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
<ns9:question_text>
To check the maximum password age, run the command:
$ grep PASS_MAX_DAYS /etc/login.defs
The DoD and FISMA requirement is 60.
A value of 180 days is sufficient for many environments.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
<ns9:question_text>
To check the password warning age, run the command:
$ grep PASS_WARN_AGE /etc/login.defs
The DoD requirement is 7.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
<ns9:question_text>
To verify the INACTIVE setting, run the following command:
grep "INACTIVE" /etc/default/useradd
The output should indicate the INACTIVE configuration option is set
to an appropriate integer as shown in the example below:
$ sudo grep "INACTIVE" /etc/default/useradd
INACTIVE=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_unique_name_question:question:1">
<ns9:question_text>
Run the following command to check for duplicate account names:
$ sudo pwck -qr
If there are no duplicate names, no line will be returned.
Is it the case that a line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_temp_expire_date_question:question:1">
<ns9:question_text>
For every temporary and emergency account, run the following command
to obtain its account aging and expiration information:
$ sudo chage -l USER
Verify each of these accounts has an expiration date set as documented.
Is it the case that any temporary or emergency accounts have no expiration date set or do not expire within a documented time frame?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-display_login_attempts_question:question:1">
<ns9:question_text>
To ensure that last login/access notification is configured correctly, run
the following command:
$ grep pam_lastlog.so /etc/pam.d/system-auth
The output should show output showfailed.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_retry_question:question:1">
<ns9:question_text>
To check how many retry attempts are permitted on a per-session basis, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The retry parameter will indicate how many attempts are permitted.
The DoD required value is less than or equal to 3.
This would appear as retry=3, or a lower value.
Is it the case that it is not the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_maxrepeat_question:question:1">
<ns9:question_text>
To check the maximum value for consecutive repeating characters, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
Look for the value of the maxrepeat parameter. The DoD requirement is 3.
Is it the case that maxrepeat is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_dcredit_question:question:1">
<ns9:question_text>
To check how many digits are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The dcredit parameter (as a negative number) will indicate how many digits are required.
The DoD requires at least one digit in a password.
This would appear as dcredit=-1.
Is it the case that dcredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_minlen_question:question:1">
<ns9:question_text>
To check how many characters are required in a password, run the following command:
$ grep cracklib /etc/pam.d/system-auth
Your output should contain minlen=
Is it the case that minlen is not found or not set to the required value (or higher)?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_ucredit_question:question:1">
<ns9:question_text>
To check how many uppercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ucredit parameter (as a negative number) will indicate how many uppercase characters are required.
The DoD and FISMA require at least one uppercase character in a password.
This would appear as ucredit=-1.
Is it the case that ucredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_ocredit_question:question:1">
<ns9:question_text>
To check how many special characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ocredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one special character in a password.
This would appear as ocredit=-1.
Is it the case that ocredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_lcredit_question:question:1">
<ns9:question_text>
To check how many lowercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The lcredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one lowercase character in a password.
This would appear as lcredit=-1.
Is it the case that lcredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_difok_question:question:1">
<ns9:question_text>
To check how many characters must differ during a password change, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The difok parameter will indicate how many characters must differ.
The DoD requires four characters differ during a password change.
This would appear as difok=4.
Is it the case that difok is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_minclass_question:question:1">
<ns9:question_text>
To check how many categories of characters must be used in password during a password change,
run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The minclass parameter will indicate how many character classes must be used. If
the requirement was for the password to contain characters from three different categories,
then this would appear as minclass=3.
Is it the case that minclass is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_deny_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth
The output should show deny=.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth /etc/pam.d/password-auth
The output should show unlock_time=<some-large-number>; the largest acceptable value is 604800 seconds (one week).
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_interval_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth /etc/pam.d/password-auth
For each file, the output should show fail_interval=<interval-in-seconds> where interval-in-seconds is 900 (15 minutes) or greater. If the fail_interval parameter is not set, the default setting of 900 seconds is acceptable.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
<ns9:question_text>
To verify the password reuse setting is compliant, run the following command:
$ grep remember /etc/pam.d/system-auth
The output should show the following at the end of the line:
remember=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
<ns9:question_text>
Inspect the password section of /etc/pam.d/system-auth and
ensure that the pam_unix.so module includes the argument
sha512:
$ grep sha512 /etc/pam.d/system-auth
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
<ns9:question_text>
Inspect /etc/login.defs and ensure the following line appears:
ENCRYPT_METHOD SHA512
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_libuserconf_question:question:1">
<ns9:question_text>
Inspect /etc/libuser.conf and ensure the following line appears
in the [default] section:
crypt_style = sha512
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_tmout_question:question:1">
<ns9:question_text>
Run the following command to ensure the TMOUT value is configured for all users
on the system:
$ sudo grep TMOUT /etc/profile
Is it the case that value of TMOUT is not greater than or equal to expected setting?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
<ns9:question_text>
Run the following command to ensure the maxlogins value is configured for all users
on the system:
$ grep "maxlogins" /etc/security/limits.conf
You should receive output similar to the following:
* hard maxlogins
Is it the case that it is not similar?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
<ns9:question_text>
To ensure write permissions are disabled for group and other
for each element in root's path, run the following command:
$ sudo ls -ld DIR
Is it the case that group or other write permissions exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_home_dirs_question:question:1">
<ns9:question_text>
To ensure the user home directory is not group-writable or world-readable, run the following:
$ sudo ls -ld /home/USER
Is it the case that the user home directory is group-writable or world-readable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_bashrc_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/bashrc file by
running the following command:
$ grep "umask" /etc/bashrc
All output must show the value of umask set as shown below:
$ grep "umask" /etc/bashrc
umask
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_csh_cshrc_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/csh.cshrc file by
running the following command:
$ grep "umask" /etc/csh.cshrc
All output must show the value of umask set as shown in the below:
$ grep "umask" /etc/csh.cshrc
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_profile_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/profile file by
running the following command:
$ grep "umask" /etc/profile
All output must show the value of umask set as shown in the below:
$ grep "umask" /etc/profile
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
<ns9:question_text>
Verify the UMASK setting is configured correctly in the /etc/login.defs file by
running the following command:
$ grep -i "UMASK" /etc/login.defs
All output must show the value of umask set as shown in the below:
$ grep -i "UMASK" /etc/login.defs
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_user_owner_grub_conf_question:question:1">
<ns9:question_text>
To check the ownership of /etc/grub.conf, run the command:
$ ls -lL /etc/grub.conf
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_group_owner_grub_conf_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/grub.conf, run the command:
$ ls -lL /etc/grub.conf
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_grub_conf_question:question:1">
<ns9:question_text>
To check the permissions of /etc/grub.conf, run the command:
$ sudo ls -lL /etc/grub.conf
If properly configured, the output should indicate the following
permissions: -rw-------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-bootloader_password_question:question:1">
<ns9:question_text>
To verify the boot loader password has been set and encrypted, run the following command:
$ sudo grep password /etc/grub.conf
The output should show the following:
password --encrypted password-hash
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-require_singleuser_auth_question:question:1">
<ns9:question_text>
To check if authentication is required for single-user mode, run the following command:
$ grep SINGLE /etc/sysconfig/init
The output should be the following:
SINGLE=/sbin/sulogin
Is it the case that the output is different?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
<ns9:question_text>
To ensure the system is configured to log a message instead of rebooting the system when
Ctrl-Alt-Del is pressed, ensure the following line is in /etc/init/control-alt-delete.conf:
exec /usr/bin/logger -p security.info "Control-Alt-Delete pressed"
Is it the case that the system is configured to run the shutdown command?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_interactive_boot_question:question:1">
<ns9:question_text>
To check whether interactive boot is disabled, run the following commands:
$ grep PROMPT /etc/sysconfig/init If interactive boot is
disabled, the output will show: PROMPT=no$ grep confirm /etc/grub.conf If interactive boot is disabled,
there should be no output.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_screen_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the screen package is installed:
$ rpm -q screen
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-smartcard_auth_question:question:1">
<ns9:question_text>
Interview the SA to determine if all accounts not exempted by policy are using
CAC authentication. For DoD systems, the following systems and accounts are
exempt from using smart card (CAC) authentication:
SIPRNET systemsStandalone systemsApplication accountsTemporary employee accounts, such as students or interns, who cannot easily receive a CAC or PIVOperational tactical locations that are not collocated with RAPIDS workstations to issue CAC or ALTTest systems, such as those with an Interim Approval to Test (IATT) and use a separate VPN, firewall, or security measure preventing access to network and system components from outside the protection boundary documented in the IATT.
Is it the case that non-exempt accounts are not using CAC authentication?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-banner_etc_issue_question:question:1">
<ns9:question_text>
To check if the system login banner is compliant,
run the following command:
$ cat /etc/issue
Is it the case that it does not display the required banner?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
<ns9:question_text>
To ensure a login warning banner is enabled, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_enable
Search for the banner_message_enable schema.
If properly configured, the default value should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
<ns9:question_text>
To ensure the login warning banner text is properly set, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_text
If properly configured, the proper banner text will appear within this schema.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.send_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.send_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
<ns9:question_text>
The status of the net.ipv4.ip_forward kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.ip_forward
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
The ability to forward packets is only appropriate for routers.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.secure_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.secure_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.log_martians kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.log_martians
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.secure_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.secure_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
<ns9:question_text>
The status of the net.ipv4.icmp_echo_ignore_broadcasts kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.icmp_echo_ignore_broadcasts
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_question:question:1">
<ns9:question_text>
The status of the net.ipv4.icmp_ignore_bogus_error_responses kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.icmp_ignore_bogus_error_responses
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
<ns9:question_text>
The status of the net.ipv4.tcp_syncookies kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.tcp_syncookies
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.rp_filter kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.rp_filter
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.rp_filter kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.rp_filter
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_bluetooth_disabled_question:question:1">
<ns9:question_text>
To check that the bluetooth service is disabled in system boot configuration, run the following command:
# chkconfig bluetooth --list
Output should indicate the bluetooth service has either not been installed or has been disabled at all runlevels, as shown in the example below:
# chkconfig bluetooth --list
bluetooth 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Is it the case that the service is configured to run?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_bluetooth_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
bluetooth kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r bluetooth /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
<ns9:question_text>
If the system uses IPv6, this is not applicable.
If the system is configured to disable the
ipv6 kernel module, it will contain a line
of the form:
options ipv6 disable=1
Such lines may be inside any file in /etc/modprobe.d or the
deprecated/etc/modprobe.conf. This permits insertion of the IPv6
kernel module (which other parts of the system expect to be present), but
otherwise keeps it inactive. Run the following command to search for such
lines in all files in /etc/modprobe.d and the deprecated
/etc/modprobe.conf:
preserve$ grep -r ipv6 /etc/modprobe.conf /etc/modprobe.d
Is it the case that the ipv6 kernel module is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_ra kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_ra
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_ra kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_ra
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.forwarding kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.forwarding
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
The ability to forward packets is only appropriate for routers.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ip6tables_enabled_question:question:1">
<ns9:question_text>
If IPv6 is disabled, this is not applicable.
Run the following command to determine the current status of the
ip6tables service:
$ sudo service ip6tables status
If the service is enabled, it should return the following: ip6tables is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_ip6tables_default_rule_question:question:1">
<ns9:question_text>
If IPv6 is disabled, this is not applicable.
Inspect the file /etc/sysconfig/ip6tables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/ip6tables
Is it the case that the default policy for the INPUT chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_iptables_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
iptables service:
$ sudo service iptables status
If the service is enabled, it should return the following: iptables is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_iptables_default_rule_question:question:1">
<ns9:question_text>Inspect the file /etc/sysconfig/iptables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/iptables
Is it the case that the default policy for the INPUT chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
<ns9:question_text>
Run the following command to ensure the default FORWARD policy is DROP:
grep ":FORWARD" /etc/sysconfig/iptables
The output should be similar to the following:
$ sudo grep ":FORWARD" /etc/sysconfig/iptables
:FORWARD DROP [0:0
Is it the case that the default policy for the FORWARD chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_dccp_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
dccp kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r dccp /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_sctp_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
sctp kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r sctp /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_rds_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
rds kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r rds /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
tipc kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r tipc /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_openswan_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the openswan package is installed:
$ rpm -q openswan
Run the following command to determine if the libreswan package is installed:
$ rpm -q libreswan
If the system does not communicate over untrusted networks, this is not applicable.
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsyslog_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the rsyslog package is installed:
$ rpm -q rsyslog
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rsyslog_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
rsyslog service:
$ sudo service rsyslog status
If the service is enabled, it should return the following: rsyslog is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_ownership_question:question:1">
<ns9:question_text>
The owner of all log files written by rsyslog should be root.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the owner of a given log file, run the following command:
$ ls -l LOGFILE
Is it the case that the owner is not root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_groupownership_question:question:1">
<ns9:question_text>
The group-owner of all log files written by rsyslog should be root.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the group-owner of a given log file, run the following command:
$ ls -l LOGFILE
Is it the case that the group-owner is not root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_permissions_question:question:1">
<ns9:question_text>
The file permissions for all log files written by rsyslog
should be set to 600, or more restrictive.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the permissions of a given log file, run the following command:
$ ls -l LOGFILE
The permissions should be 600, or more restrictive. Some log files referenced
in /etc/rsyslog.conf may be created by other programs and may require
exclusion from consideration, such as /var/log/boot.log.
Is it the case that the permissions are not correct?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_remote_loghost_question:question:1">
<ns9:question_text>
To ensure logs are sent to a remote host, examine the file
/etc/rsyslog.conf.
If using UDP, a line similar to the following should be present:
*.* @loghost.example.com
If using TCP, a line similar to the following should be present:
*.* @@loghost.example.com
If using RELP, a line similar to the following should be present:
*.* :omrelp:loghost.example.com
Is it the case that none of these are present?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_logrotate_activated_question:question:1">
<ns9:question_text>
To determine the status and frequency of logrotate, run the following command:
$ sudo grep logrotate /var/log/cron*
If logrotate is configured properly, output should include references to
/etc/cron.daily.
Is it the case that logrotate is not configured to run daily?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_auditd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
auditd service:
$ sudo service auditd status
If the service is enabled, it should return the following: auditd is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-bootloader_audit_argument_question:question:1">
<ns9:question_text>
Inspect the kernel boot arguments (which follow the word kernel) in
/etc/grub.conf. If they include audit=1, then
auditing is enabled at boot time.
Is it the case that auditing is not enabled at boot time?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine how many logs the system is configured to retain after rotation:
$ sudo grep num_logs /etc/audit/auditd.conf
num_logs = 5
Is it the case that the system log file retention has not been properly configured?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine how much data the system will retain in each audit log file:
$ sudo grep max_log_file /etc/audit/auditd.conf
max_log_file = 6
Is it the case that the system audit data threshold has not been properly configured?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to rotate logs when they reach their
maximum size:
$ sudo grep max_log_file_action /etc/audit/auditd.conf
max_log_file_action rotate
Is it the case that the system has not been properly configured to rotate audit logs?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to email the administrator when
disk space is starting to run low:
$ sudo grep space_left_action /etc/audit/auditd.conf
space_left_action
Acceptable values are email, suspend, single, and halt.
Is it the case that the system is not configured to send an email to the system administrator when disk space is starting to run low?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to either suspend, switch to single-user mode,
or halt when disk space has run low:
admin_space_left_action single
Is it the case that the system is not configured to switch to single-user mode for corrective action?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to send email to an
account when it needs to notify an administrator:
action_mail_acct = root
Is it the case that auditd is not configured to send emails per identified actions?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_flush_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to synchronize audit event data
with the log files on the disk:
$ sudo grep flush /etc/audit/auditd.conf
flush = DATA
Acceptable values are DATA, and SYNC. The setting is
case-insensitive.
Is it the case that auditd is not configured to synchronously write audit event data to disk?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
<ns9:question_text>
To verify the audispd's syslog plugin is active, run the following command:
$ sudo grep active /etc/audisp/plugins.d/syslog.conf
If the plugin is active, the output will show yes.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the adjtimex
system call, run the following command:
preserve$ sudo grep "adjtimex" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the settimeofday
system call, run the following command:
preserve$ sudo grep "settimeofday" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_stime_question:question:1">
<ns9:question_text>
If the system is 64-bit only, this is not applicable.
To determine if the system is configured to audit calls to
the stime
system call, run the following command:
preserve$ sudo grep "stime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the clock_settime
system call, run the following command:
preserve$ sudo grep "clock_settime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit attempts to
alter time via the /etc/localtime file, run the following
command:
$ sudo auditctl -l | grep "watch=/etc/localtime"
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit account changes,
run the following command:
auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow|/etc/security/opasswd)'
If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
Is it the case that the system is not configured to audit account changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit changes to its network configuration,
run the following command:
auditctl -l | egrep '(/etc/issue|/etc/issue.net|/etc/hosts|/etc/sysconfig/network)'
If the system is configured to watch for network configuration changes, a line should be returned for
each file specified (and perm=wa should be indicated for each).
Is it the case that the system is not configured to audit changes of the network configuration?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_var_log_audit_question:question:1">
<ns9:question_text>
Run the following command to check the mode of the system audit logs:
$ sudo ls -l /var/log/audit
Audit logs must be mode 0640 or less permissive.
Is it the case that any are more permissive?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_var_log_audit_question:question:1">
<ns9:question_text>
To check the ownership of /var/log, run the command:
$ ls -lL /var/log
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_mac_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit changes to its SELinux
configuration files, run the following command:
$ sudo auditctl -l | grep "dir=/etc/selinux"
If the system is configured to watch for changes to its SELinux
configuration, a line should be returned (including
perm=wa indicating permissions that are watched).
Is it the case that the system is not configured to audit attempts to change the MAC policy?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the chmod
system call, run the following command:
preserve$ sudo grep "chmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit permission changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the chown
system call, run the following command:
preserve$ sudo grep "chown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchmod
system call, run the following command:
preserve$ sudo grep "fchmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchmodat
system call, run the following command:
preserve$ sudo grep "fchmodat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchown
system call, run the following command:
preserve$ sudo grep "fchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchownat
system call, run the following command:
preserve$ sudo grep "fchownat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fremovexattr
system call, run the following command:
preserve$ sudo grep "fremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fsetxattr
system call, run the following command:
preserve$ sudo grep "fsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lchown
system call, run the following command:
preserve$ sudo grep "lchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lremovexattr
system call, run the following command:
preserve$ sudo grep "lremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lsetxattr
system call, run the following command:
preserve$ sudo grep "lsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the removexattr
system call, run the following command:
preserve$ sudo grep "removexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the setxattr
system call, run the following command:
preserve$ sudo grep "setxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
<ns9:question_text>
To verify that the audit system collects unauthorized file accesses, run the following commands:
$ sudo grep EACCES /etc/audit/audit.rules
$ sudo grep EPERM /etc/audit/audit.rules
Is it the case that 32-bit and 64-bit system calls to creat, open, openat, open_by_handle_at, truncate, and ftruncate are not audited during EACCES and EPERM?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_privileged_commands_question:question:1">
<ns9:question_text>
To verify that auditing of privileged command use is configured, run the
following command for each local partition PART to find relevant
setuid / setgid programs:
$ sudo find PART -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null
Run the following command to verify entries in the audit rules for all programs
found with the previous command:
$ sudo grep path /etc/audit/audit.rules
It should be the case that all relevant setuid / setgid programs have a line
in the audit rules.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_media_export_question:question:1">
<ns9:question_text>
To verify that auditing is configured for all media exportation events, run the following command:
$ sudo auditctl -l | grep syscall | grep mount
Is it the case that there is not output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the unlink
system call, run the following command:
preserve$ sudo grep "unlink" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the unlinkat
system call, run the following command:
preserve$ sudo grep "unlinkat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the rename
system call, run the following command:
preserve$ sudo grep "rename" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the renameat
system call, run the following command:
preserve$ sudo grep "renameat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
<ns9:question_text>
To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/etc/sudoers"
Is it the case that there is not output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the init_module
system call, run the following command:
preserve$ sudo grep "init_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the delete_module
system call, run the following command:
preserve$ sudo grep "delete_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_xinetd_disabled_question:question:1">
<ns9:question_text>
If network services are using the xinetd service, this is not applicable.
To check that the xinetd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig xinetd --list
Output should indicate the xinetd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig xinetd --list
xinetd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify xinetd is disabled through current runtime configuration:
$ sudo service xinetd status
If the service is disabled the command will return the following output:
xinetd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_xinetd_removed_question:question:1">
<ns9:question_text>
If network services are using the xinetd service, this is not applicable.
Run the following command to determine if the xinetd package is installed:
$ rpm -q xinetd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_telnetd_disabled_question:question:1">
<ns9:question_text>
To check that the telnet service is disabled in system boot configuration, run the following command:
$ sudo chkconfig telnet --list
Output should indicate the telnet service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig telnet --list
telnet off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_telnet-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the telnet-server package is installed:
$ rpm -q telnet-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_telnet_removed_question:question:1">
<ns9:question_text>
The telnet package can be removed with the following command:
$ sudo yum erase telnet
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsh-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the rsh-server package is installed:
$ rpm -q rsh-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rexec_disabled_question:question:1">
<ns9:question_text>
To check that the rexec service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rexec --list
Output should indicate the rexec service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rexec --list
rexec off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rsh_disabled_question:question:1">
<ns9:question_text>
To check that the rsh service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rsh --list
Output should indicate the rsh service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rsh --list
rsh off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsh_removed_question:question:1">
<ns9:question_text>
The rsh package can be removed with the following command:
$ sudo yum erase rsh
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rlogin_disabled_question:question:1">
<ns9:question_text>
To check that the rlogin service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rlogin --list
Output should indicate the rlogin service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rlogin --list
rlogin off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_rsh_trust_files_question:question:1">
<ns9:question_text>
The existence of the file /etc/hosts.equiv or a file named
.rhosts inside a user home directory indicates the presence
of an Rsh trust relationship.
Is it the case that these files exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_ypserv_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the ypserv package is installed:
$ rpm -q ypserv
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ypbind_disabled_question:question:1">
<ns9:question_text>
To check that the ypbind service is disabled in system boot configuration, run the following command:
$ sudo chkconfig ypbind --list
Output should indicate the ypbind service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig ypbind --list
ypbind 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify ypbind is disabled through current runtime configuration:
$ sudo service ypbind status
If the service is disabled the command will return the following output:
ypbind is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_ypbind_removed_question:question:1">
<ns9:question_text>
The ypbind package can be removed with the following command:
$ sudo yum erase ypbind
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_tftp_disabled_question:question:1">
<ns9:question_text>
To check that the tftp service is disabled in system boot configuration, run the following command:
$ sudo chkconfig tftp --list
Output should indicate the tftp service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig tftp --list
tftp 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify tftp is disabled through current runtime configuration:
$ sudo service tftp status
If the service is disabled the command will return the following output:
tftp is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_tftp-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the tftp-server package is installed:
$ rpm -q tftp-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_tftp_removed_question:question:1">
<ns9:question_text>
The tftp package can be removed with the following command:
$ sudo yum erase tftp
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-tftpd_uses_secure_mode_question:question:1">
<ns9:question_text>
If TFTP is not installed, this is not applicable. To determine if TFTP is installed,
run the following command:
$ rpm -qa | grep tftp
Verify tftp is configured by with the -s option by running the
following command:
grep "server_args" /etc/xinetd.d/tftp
The output should indicate the server_args variable is configured with the -s
flag, matching the example below:
$ grep "server_args" /etc/xinetd.d/tftp
server_args = -s /var/lib/tftpboot
Is it the case that this flag is missing?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_talk-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the talk-server package is installed:
$ rpm -q talk-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_talk_removed_question:question:1">
<ns9:question_text>
The talk package can be removed with the following command:
$ sudo yum erase talk
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_abrtd_disabled_question:question:1">
<ns9:question_text>
To check that the abrtd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig abrtd --list
Output should indicate the abrtd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig abrtd --list
abrtd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify abrtd is disabled through current runtime configuration:
$ sudo service abrtd status
If the service is disabled the command will return the following output:
abrtd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_acpid_disabled_question:question:1">
<ns9:question_text>
To check that the acpid service is disabled in system boot configuration, run the following command:
$ sudo chkconfig acpid --list
Output should indicate the acpid service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig acpid --list
acpid 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify acpid is disabled through current runtime configuration:
$ sudo service acpid status
If the service is disabled the command will return the following output:
acpid is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_certmonger_disabled_question:question:1">
<ns9:question_text>
To check that the certmonger service is disabled in system boot configuration, run the following command:
$ sudo chkconfig certmonger --list
Output should indicate the certmonger service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig certmonger --list
certmonger 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify certmonger is disabled through current runtime configuration:
$ sudo service certmonger status
If the service is disabled the command will return the following output:
certmonger is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cgconfig_disabled_question:question:1">
<ns9:question_text>
To check that the cgconfig service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cgconfig --list
Output should indicate the cgconfig service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cgconfig --list
cgconfig 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cgconfig is disabled through current runtime configuration:
$ sudo service cgconfig status
If the service is disabled the command will return the following output:
cgconfig is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cgred_disabled_question:question:1">
<ns9:question_text>
To check that the cgred service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cgred --list
Output should indicate the cgred service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cgred --list
cgred 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cgred is disabled through current runtime configuration:
$ sudo service cgred status
If the service is disabled the command will return the following output:
cgred is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cpuspeed_disabled_question:question:1">
<ns9:question_text>
To check that the cpuspeed service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cpuspeed --list
Output should indicate the cpuspeed service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cpuspeed --list
cpuspeed 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cpuspeed is disabled through current runtime configuration:
$ sudo service cpuspeed status
If the service is disabled the command will return the following output:
cpuspeed is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_haldaemon_disabled_question:question:1">
<ns9:question_text>
To check that the haldaemon service is disabled in system boot configuration, run the following command:
$ sudo chkconfig haldaemon --list
Output should indicate the haldaemon service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig haldaemon --list
haldaemon 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify haldaemon is disabled through current runtime configuration:
$ sudo service haldaemon status
If the service is disabled the command will return the following output:
haldaemon is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_irqbalance_enabled_question:question:1">
<ns9:question_text>
To check that the irqbalance service is disabled in system boot configuration, run the following command:
$ sudo chkconfig irqbalance --list
Output should indicate the irqbalance service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig irqbalance --list
irqbalance 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify irqbalance is disabled through current runtime configuration:
$ sudo service irqbalance status
If the service is disabled the command will return the following output:
irqbalance is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_kdump_disabled_question:question:1">
<ns9:question_text>
To check that the kdump service is disabled in system boot configuration, run the following command:
$ sudo chkconfig kdump --list
Output should indicate the kdump service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig kdump --list
kdump 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify kdump is disabled through current runtime configuration:
$ sudo service kdump status
If the service is disabled the command will return the following output:
kdump is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_mdmonitor_disabled_question:question:1">
<ns9:question_text>
To check that the mdmonitor service is disabled in system boot configuration, run the following command:
$ sudo chkconfig mdmonitor --list
Output should indicate the mdmonitor service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig mdmonitor --list
mdmonitor 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify mdmonitor is disabled through current runtime configuration:
$ sudo service mdmonitor status
If the service is disabled the command will return the following output:
mdmonitor is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_messagebus_disabled_question:question:1">
<ns9:question_text>
To check that the messagebus service is disabled in system boot configuration, run the following command:
$ sudo chkconfig messagebus --list
Output should indicate the messagebus service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig messagebus --list
messagebus 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify messagebus is disabled through current runtime configuration:
$ sudo service messagebus status
If the service is disabled the command will return the following output:
messagebus is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_netconsole_disabled_question:question:1">
<ns9:question_text>
To check that the netconsole service is disabled in system boot configuration, run the following command:
$ sudo chkconfig netconsole --list
Output should indicate the netconsole service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig netconsole --list
netconsole 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify netconsole is disabled through current runtime configuration:
$ sudo service netconsole status
If the service is disabled the command will return the following output:
netconsole is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ntpdate_disabled_question:question:1">
<ns9:question_text>
To check that the ntpdate service is disabled in system boot configuration, run the following command:
$ sudo chkconfig ntpdate --list
Output should indicate the ntpdate service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig ntpdate --list
ntpdate 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify ntpdate is disabled through current runtime configuration:
$ sudo service ntpdate status
If the service is disabled the command will return the following output:
ntpdate is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_oddjobd_disabled_question:question:1">
<ns9:question_text>
To check that the oddjobd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig oddjobd --list
Output should indicate the oddjobd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig oddjobd --list
oddjobd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify oddjobd is disabled through current runtime configuration:
$ sudo service oddjobd status
If the service is disabled the command will return the following output:
oddjobd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_portreserve_disabled_question:question:1">
<ns9:question_text>
To check that the portreserve service is disabled in system boot configuration, run the following command:
$ sudo chkconfig portreserve --list
Output should indicate the portreserve service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig portreserve --list
portreserve 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify portreserve is disabled through current runtime configuration:
$ sudo service portreserve status
If the service is disabled the command will return the following output:
portreserve is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_psacct_enabled_question:question:1">
<ns9:question_text>
To check that the psacct service is disabled in system boot configuration, run the following command:
$ sudo chkconfig psacct --list
Output should indicate the psacct service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig psacct --list
psacct 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify psacct is disabled through current runtime configuration:
$ sudo service psacct status
If the service is disabled the command will return the following output:
psacct is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_qpidd_disabled_question:question:1">
<ns9:question_text>
To check that the qpidd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig qpidd --list
Output should indicate the qpidd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig qpidd --list
qpidd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify qpidd is disabled through current runtime configuration:
$ sudo service qpidd status
If the service is disabled the command will return the following output:
qpidd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_quota_nld_disabled_question:question:1">
<ns9:question_text>
To check that the quota_nld service is disabled in system boot configuration, run the following command:
$ sudo chkconfig quota_nld --list
Output should indicate the quota_nld service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig quota_nld --list
quota_nld 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify quota_nld is disabled through current runtime configuration:
$ sudo service quota_nld status
If the service is disabled the command will return the following output:
quota_nld is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rdisc_disabled_question:question:1">
<ns9:question_text>
To check that the rdisc service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rdisc --list
Output should indicate the rdisc service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rdisc --list
rdisc 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rdisc is disabled through current runtime configuration:
$ sudo service rdisc status
If the service is disabled the command will return the following output:
rdisc is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rhnsd_disabled_question:question:1">
<ns9:question_text>
To check that the rhnsd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rhnsd --list
Output should indicate the rhnsd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rhnsd --list
rhnsd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rhnsd is disabled through current runtime configuration:
$ sudo service rhnsd status
If the service is disabled the command will return the following output:
rhnsd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rhsmcertd_disabled_question:question:1">
<ns9:question_text>
To check that the rhsmcertd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rhsmcertd --list
Output should indicate the rhsmcertd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rhsmcertd --list
rhsmcertd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rhsmcertd is disabled through current runtime configuration:
$ sudo service rhsmcertd status
If the service is disabled the command will return the following output:
rhsmcertd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_saslauthd_disabled_question:question:1">
<ns9:question_text>
To check that the saslauthd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig saslauthd --list
Output should indicate the saslauthd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig saslauthd --list
saslauthd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify saslauthd is disabled through current runtime configuration:
$ sudo service saslauthd status
If the service is disabled the command will return the following output:
saslauthd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_smartd_disabled_question:question:1">
<ns9:question_text>
To check that the smartd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig smartd --list
Output should indicate the smartd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig smartd --list
smartd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify smartd is disabled through current runtime configuration:
$ sudo service smartd status
If the service is disabled the command will return the following output:
smartd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_sysstat_disabled_question:question:1">
<ns9:question_text>
To check that the sysstat service is disabled in system boot configuration, run the following command:
$ sudo chkconfig sysstat --list
Output should indicate the sysstat service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig sysstat --list
sysstat 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify sysstat is disabled through current runtime configuration:
$ sudo service sysstat status
If the service is disabled the command will return the following output:
sysstat is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_crond_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
crond service:
$ sudo service crond status
If the service is enabled, it should return the following: crond is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_anacron_question:question:1">
<ns9:question_text>
Run the following command to determine if the cronie-anacron package is installed:
$ rpm -q cronie-anacron
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_atd_disabled_question:question:1">
<ns9:question_text>
To check that the atd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig atd --list
Output should indicate the atd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig atd --list
atd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify atd is disabled through current runtime configuration:
$ sudo service atd status
If the service is disabled the command will return the following output:
atd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
<ns9:question_text>
To check which SSH protocol version is allowed, run the following command:
$ sudo grep Protocol /etc/ssh/sshd_config
If configured properly, output should be Protocol 2
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_set_idle_timeout_question:question:1">
<ns9:question_text>
Run the following command to see what the timeout interval is:
$ sudo grep ClientAliveInterval /etc/ssh/sshd_config
If properly configured, the output should be:
ClientAliveInterval 900
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_set_keepalive_question:question:1">
<ns9:question_text>
To ensure the SSH idle timeout will occur when the ClientAliveCountMax is set, run the following command:
$ sudo grep ClientAliveCountMax /etc/ssh/sshd_config
If properly configured, output should be:
ClientAliveCountMax 0
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_rhosts_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
IgnoreRhosts
option is set, run the following command:
preserve$ sudo grep -i IgnoreRhosts /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
yes is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_host_auth_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
HostbasedAuthentication
option is set, run the following command:
preserve$ sudo grep -i HostbasedAuthentication /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_root_login_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
PermitRootLogin
option is set, run the following command:
preserve$ sudo grep -i PermitRootLogin /etc/ssh/sshd_config
If a line indicating no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
PermitEmptyPasswords
option is set, run the following command:
preserve$ sudo grep -i PermitEmptyPasswords /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_enable_warning_banner_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
Banner
option is set, run the following command:
preserve$ sudo grep -i Banner /etc/ssh/sshd_config
If a line indicating /etc/issue is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
<ns9:question_text>
To ensure users are not able to present environment daemons, run the following command:
$ sudo grep PermitUserEnvironment /etc/ssh/sshd_config
If properly configured, output should be:
PermitUserEnvironment no
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
<ns9:question_text>
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved
ciphers are in use, run the following command:
$ sudo grep Ciphers /etc/ssh/sshd_config
The output should contain only those ciphers which are FIPS-approved, namely, the
AES and 3DES ciphers.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_use_approved_macs_question:question:1">
<ns9:question_text>
Only FIPS-approved MACs should be used. To verify that only FIPS-approved
MACs are in use, run the following command:
$ sudo grep -i macs /etc/ssh/sshd_config
The output should contain only those MACs which are FIPS-approved, namely,
hmac-sha2-512, hmac-sha2-256, and hmac-sha1 hash functions.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_sssd_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the sssd package is installed:
$ rpm -q sssd
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_sssd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
sssd service:
$ systemctl is-active sssd
If the service is running, it should return the following: active
Is it the case that the service is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_memcache_timeout_question:question:1">
<ns9:question_text>
To verify that SSSD's in-memory cache expires after a day, run the following command:
$ sudo grep memcache_timeout /etc/sssd/sssd.conf
If configured properly, output should be memcache_timeout = 86400.
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
<ns9:question_text>
To verify that SSSD expires offline credentials, run the following command:
$ sudo grep offline_credentials_expiration
If configured properly, output should be
offline_credentials_expiration = 1
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_ssh_known_hosts_timeout_question:question:1">
<ns9:question_text>
To verify that SSSD expires known SSH host keys, run the following command:
$ sudo grep ssh_known_hosts_timeout
If configured properly, output should be
ssh_known_hosts_timeout = 86400
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-xwindows_runlevel_setting_question:question:1">
<ns9:question_text>
To verify the default runlevel is 3, run the following command:
$ grep initdefault /etc/inittab
The output should show the following:
id:3:initdefault:
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_xorg-x11-server-common_removed_question:question:1">
<ns9:question_text>
To ensure the X Windows package group is removed, run the following command:
$ rpm -qi xorg-x11-server-common
The output should be:
package xorg-x11-server-common is not installed
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_avahi-daemon_disabled_question:question:1">
<ns9:question_text>
To check that the avahi-daemon service is disabled in system boot configuration, run the following command:
$ sudo chkconfig avahi-daemon --list
Output should indicate the avahi-daemon service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig avahi-daemon --list
avahi-daemon 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify avahi-daemon is disabled through current runtime configuration:
$ sudo service avahi-daemon status
If the service is disabled the command will return the following output:
avahi-daemon is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cups_disabled_question:question:1">
<ns9:question_text>
To check that the cups service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cups --list
Output should indicate the cups service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cups --list
cups 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cups is disabled through current runtime configuration:
$ sudo service cups status
If the service is disabled the command will return the following output:
cups is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_dhcpd_disabled_question:question:1">
<ns9:question_text>
To check that the dhcpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig dhcpd --list
Output should indicate the dhcpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig dhcpd --list
dhcpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify dhcpd is disabled through current runtime configuration:
$ sudo service dhcpd status
If the service is disabled the command will return the following output:
dhcpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dhcp_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dhcp package is installed:
$ rpm -q dhcp
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_question:question:1">
<ns9:question_text>
To verify that DHCP is not being used, examine the following file for each interface:
# /etc/sysconfig/network-scripts/ifcfg-interface
Look for the following:
BOOTPROTO=none
and the following, substituting the appropriate values based on your site's addressing scheme:
NETMASK=255.255.255.0
IPADDR=192.168.1.2
GATEWAY=192.168.1.1
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ntpd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
ntpd service:
$ sudo service ntpd status
If the service is enabled, it should return the following: ntpd is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ntpd_specify_remote_server_question:question:1">
<ns9:question_text>
To verify that a remote NTP service is configured for time synchronization,
open the following file:
/etc/ntp.conf
In the file, there should be a section similar to the following:
server ntpserver
Is it the case that this is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_postfix_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
postfix service:
$ sudo service postfix status
If the service is enabled, it should return the following: postfix is running...
Is it the case that the system is not a cross domain solution and the service is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_sendmail_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the sendmail package is installed:
$ rpm -q sendmail
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-postfix_network_listening_disabled_question:question:1">
<ns9:question_text>
Run the following command to ensure postfix accepts mail messages from only the local system:
$ grep inet_interfaces /etc/postfix/main.cf
If properly configured, the output should show only localhost.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ldap_client_start_tls_question:question:1">
<ns9:question_text>
To ensure LDAP is configured to use TLS for all transactions, run the following command:
$ grep start_tls /etc/pam_ldap.conf
The result should contain:
ssl start_tls
Is it the case that LDAP is not in use, the line is commented out, or not configured correctly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ldap_client_tls_cacertpath_question:question:1">
<ns9:question_text>
To ensure TLS is configured with trust certificates, run the following command:
$ grep cert /etc/pam_ldap.conf
The result should return either
tls_cacertdir /etc/pki/tls/CA
or
tls_cacertfile /etc/pki/tls/CA/cacert.pem
Is it the case that LDAP is not in use, the line is commented out, or not configured correctly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_openldap-servers_removed_question:question:1">
<ns9:question_text>
To verify the openldap-servers package is not installed,
run the following command:
$ rpm -q openldap-servers
The output should show the following:
package openldap-servers is not installed
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-nfs_no_anonymous_question:question:1">
<ns9:question_text>
Inspect the mounts configured in /etc/exports. Each mount should specify a value
greater than UID_MAX and GID_MAX as defined in /etc/login.defs.
Is it the case that anonuid or anongid are not set to a value greater than UID_MAX (for anonuid) and GID_MAX (for anongid)?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_nfs_disabled_question:question:1">
<ns9:question_text>
It is prudent to ensure the nfs service is disabled in system boot, as well as
not currently running. First, run the following to verify the service is stopped:
$ service nfs status
If the service is stopped or disabled, it will return the following:
rpc.svcgssd is stopped
rpc.mountd is stopped
nfsd is stopped
rpc.rquotad is stopped
To verify that the nfs service is disabled, run the following command:
$ chkconfig --list nfs
If properly configured, the output should look like:
nfs 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rpcsvcgssd_disabled_question:question:1">
<ns9:question_text>
To check that the rpcsvcgssd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rpcsvcgssd --list
Output should indicate the rpcsvcgssd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rpcsvcgssd --list
rpcsvcgssd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rpcsvcgssd is disabled through current runtime configuration:
$ sudo service rpcsvcgssd status
If the service is disabled the command will return the following output:
rpcsvcgssd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_nodev_remote_filesystems_question:question:1">
<ns9:question_text>
To verify the nodev option is configured for all NFS mounts, run the following command:
$ mount | grep nfs
All NFS mounts should show the nodev setting in parentheses. This is not applicable if NFS is
not implemented.
Is it the case that the setting does not show?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_nosuid_remote_filesystems_question:question:1">
<ns9:question_text>
To verify the nosuid option is configured for all NFS mounts, run the following command:
$ mount | grep nfs
All NFS mounts should show the nosuid setting in parentheses. This is not applicable if NFS is
not implemented.
Is it the case that the setting does not show?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_insecure_locks_exports_question:question:1">
<ns9:question_text>
To verify insecure file locking has been disabled, run the following command:
$ grep insecure_locks /etc/exports
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_named_disabled_question:question:1">
<ns9:question_text>
To check that the named service is disabled in system boot configuration, run the following command:
$ sudo chkconfig named --list
Output should indicate the named service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig named --list
named 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify named is disabled through current runtime configuration:
$ sudo service named status
If the service is disabled the command will return the following output:
named is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_bind_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the bind package is installed:
$ rpm -q bind
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_vsftpd_disabled_question:question:1">
<ns9:question_text>
To check that the vsftpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig vsftpd --list
Output should indicate the vsftpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig vsftpd --list
vsftpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify vsftpd is disabled through current runtime configuration:
$ sudo service vsftpd status
If the service is disabled the command will return the following output:
vsftpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_vsftpd_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the vsftpd package is installed:
$ rpm -q vsftpd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ftp_log_transactions_question:question:1">
<ns9:question_text>
Find if logging is applied to the FTP daemon.
Procedures:
If vsftpd is started by xinetd the following command will indicate the xinetd.d startup file:
$ grep vsftpd /etc/xinetd.d/*
$ grep server_args vsftpd xinetd.d startup file
This will indicate the vsftpd config file used when starting through xinetd.
If the server_args line is missing or does not include the vsftpd configuration file, then the default config file (/etc/vsftpd/vsftpd.conf) is used.
$ sudo grep xferlog_enable vsftpd config file
Is it the case that xferlog_enable is missing, or is not set to yes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ftp_present_banner_question:question:1">
<ns9:question_text>
If FTP services are not installed, this is not applicable.
To verify this configuration, run the following command:
grep "banner_file" /etc/vsftpd/vsftpd.conf
The output should show the value of banner_file is set to /etc/issue, an example of which is shown below:
$ sudo grep "banner_file" /etc/vsftpd/vsftpd.conf
banner_file=/etc/issue
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_httpd_disabled_question:question:1">
<ns9:question_text>
To check that the httpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig httpd --list
Output should indicate the httpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig httpd --list
httpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify httpd is disabled through current runtime configuration:
$ sudo service httpd status
If the service is disabled the command will return the following output:
httpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_httpd_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the httpd package is installed:
$ rpm -q httpd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_dovecot_disabled_question:question:1">
<ns9:question_text>
To check that the dovecot service is disabled in system boot configuration, run the following command:
$ sudo chkconfig dovecot --list
Output should indicate the dovecot service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig dovecot --list
dovecot 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify dovecot is disabled through current runtime configuration:
$ sudo service dovecot status
If the service is disabled the command will return the following output:
dovecot is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dovecot_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dovecot package is installed:
$ rpm -q dovecot
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_smb_disabled_question:question:1">
<ns9:question_text>
To check that the smb service is disabled in system boot configuration, run the following command:
$ sudo chkconfig smb --list
Output should indicate the smb service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig smb --list
smb 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify smb is disabled through current runtime configuration:
$ sudo service smb status
If the service is disabled the command will return the following output:
smb is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_samba_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the samba package is installed:
$ rpm -q samba
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_samba-common_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the samba-common package is installed:
$ rpm -q samba-common
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-require_smb_client_signing_question:question:1">
<ns9:question_text>
To verify that Samba clients running smbclient must use packet signing, run the following command:
$ grep signing /etc/samba/smb.conf
The output should show:
client signing = mandatory
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_smb_client_signing_question:question:1">
<ns9:question_text>
To verify that Samba clients using mount.cifs must use packet signing, run the following command:
$ grep sec /etc/fstab
The output should show either krb5i or ntlmv2i in use.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_squid_disabled_question:question:1">
<ns9:question_text>
To check that the squid service is disabled in system boot configuration, run the following command:
$ sudo chkconfig squid --list
Output should indicate the squid service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig squid --list
squid 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify squid is disabled through current runtime configuration:
$ sudo service squid status
If the service is disabled the command will return the following output:
squid is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_squid_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the squid package is installed:
$ rpm -q squid
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_snmpd_disabled_question:question:1">
<ns9:question_text>
To check that the snmpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig snmpd --list
Output should indicate the snmpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig snmpd --list
snmpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify snmpd is disabled through current runtime configuration:
$ sudo service snmpd status
If the service is disabled the command will return the following output:
snmpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_net-snmp_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the net-snmp package is installed:
$ rpm -q net-snmp
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-snmpd_use_newer_protocol_question:question:1">
<ns9:question_text>
To ensure only SNMPv3 or newer is used, run the following command:
$ sudo grep 'rocommunity\|rwcommunity\|com2sec' /etc/snmp/snmpd.conf | grep -v "^#"
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-snmpd_not_default_password_question:question:1">
<ns9:question_text>
To ensure the default password is not set, run the following command:
$ sudo grep -v "^#" /etc/snmp/snmpd.conf| grep public
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_generic_question:question:1">
<ns9:question_text>RHEL6 supports this requirement and cannot be configured to be out of
compliance. This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_auditing_question:question:1">
<ns9:question_text>The RHEL6 auditing system supports this requirement and cannot be configured to be out of
compliance. Every audit record in RHEL includes a timestamp, the operation attempted,
success or failure of the operation, the subject involved (executable/process),
the object involved (file/path), and security labels for the subject and object.
It also includes the ability to label events with custom key labels. The auditing system
centralizes the recording of audit events for the entire system and includes
reduction (ausearch), reporting (aureport), and real-time
response (audispd) facilities.
This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_nonselected_question:question:1">
<ns9:question_text>RHEL6 supports this requirement and cannot be configured to be out of
compliance. This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_nonfinding_nonselected_scope_question:question:1">
<ns9:question_text>
RHEL6 cannot support this requirement without assistance from an external
application, policy, or service. This requirement is NA.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_finding_nonselected_question:question:1">
<ns9:question_text>
This is a permanent finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_nonfinding_scope_question:question:1">
<ns9:question_text>
RHEL6 cannot support this requirement without assistance from an external
application, policy, or service. This requirement is NA.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-update_process_question:question:1">
<ns9:question_text>
Ask an administrator if a process exists to promptly and automatically apply OS
software updates. If such a process does not exist, this is a finding.
If the OS update process limits automatic updates of software packages, where
such updates would impede normal system operation, to scheduled maintenance
windows, but still within IAVM-dictated timeframes, this is not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
</ns9:questions>
</ns9:ocil>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_ssg-rhel6-xccdf-1.2.xml" timestamp="2017-08-11T21:23:31">
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-6" resolved="1" style="SCAP_1.2" xml:lang="en-US">
<ns10:status date="2017-08-11">draft</ns10:status>
<ns10:title xml:lang="en-US">Guide to the Secure Configuration of Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">This guide presents a catalog of security-relevant
configuration settings for Red Hat Enterprise Linux 6. It is a rendering of
content structured in the eXtensible Configuration Checklist Description Format (XCCDF)
in order to support security automation. The SCAP content is
is available in the <html:code>scap-security-guide</html:code> package which is developed at
<html:a href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a>.
<html:br />
<html:br />
Providing system administrators with such guidance informs them how to securely
configure systems under their control in a variety of network roles. Policy
makers and baseline creators can use this catalog of settings, with its
associated references to higher-level security control catalogs, in order to
assist them in security baseline creation. This guide is a <html:i>catalog, not a
checklist,</html:i> and satisfaction of every item is not likely to be possible or
sensible in many operational scenarios. However, the XCCDF format enables
granular selection and adjustment of settings, and their association with OVAL
and OCIL content provides an automated checking capability. Transformations of
this document, and its associated automated checking content, are capable of
providing baselines that meet a diverse set of policy objectives. Some example
XCCDF <html:i>Profiles</html:i>, which are selections of items that form checklists and
can be used as baselines, are available with this guide. They can be
processed, in an automated fashion, with tools that support the Security
Content Automation Protocol (SCAP). The DISA STIG for Red Hat Enterprise Linux 6,
which provides required settings for US Department of Defense systems, is
one example of a baseline created from this guidance.
</ns10:description>
<ns10:notice id="centos_warning"><html:div>
<html:p>This benchmark is a direct port of a <html:i>SCAP Security Guide </html:i> benchmark developed for <html:i>Red Hat Enterprise Linux</html:i>. It has been modified through an automated process to remove specific dependencies on <html:i>Red Hat Enterprise Linux</html:i> and to function with <html:i>CentOS</html:i>. The result is a generally useful <html:i>SCAP Security Guide</html:i> benchmark with the following caveats:</html:p>
<html:ul>
<html:li><html:i>CentOS</html:i> is not an exact copy of <html:i>Red Hat Enterprise Linux</html:i>. There may be configuration differences that produce false positives and/or false negatives. If this occurs please file a bug report.</html:li>
<html:li><html:i>CentOS</html:i> has its own build system, compiler options, patchsets, and is a community supported, non-commercial operating system. <html:i>CentOS</html:i> does not inherit certifications or evaluations from <html:i>Red Hat Enterprise Linux</html:i>. As such, some configuration rules (such as those requiring <html:i>FIPS 140-2</html:i> encryption) will continue to fail on <html:i>CentOS</html:i>.</html:li>
</html:ul>
<html:p>Members of the <html:i>CentOS</html:i> community are invited to participate in <html:a href="http://open-scap.org">OpenSCAP</html:a> and <html:a href="https://github.com/OpenSCAP/scap-security-guide">SCAP Security Guide</html:a> development. Bug reports and patches can be sent to GitHub: <html:a href="https://github.com/OpenSCAP/scap-security-guide">https://github.com/OpenSCAP/scap-security-guide</html:a>. The mailing list is at <html:a href="https://fedorahosted.org/mailman/listinfo/scap-security-guide">https://fedorahosted.org/mailman/listinfo/scap-security-guide</html:a>.</html:p></html:div></ns10:notice>
<ns10:notice id="terms_of_use" xml:lang="en-US">Do not attempt to implement any of the settings in
this guide without first testing them in a non-operational environment. The
creators of this guidance assume no responsibility whatsoever for its use by
other parties, and makes no guarantees, expressed or implied, about its
quality, reliability, or any other characteristic.</ns10:notice>
<ns10:front-matter xml:lang="en-US">The SCAP Security Guide Project<html:br />
<html:a href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a></ns10:front-matter>
<ns10:rear-matter xml:lang="en-US">Red Hat and Red Hat Enterprise Linux are either registered
trademarks or trademarks of Red Hat, Inc. in the United States and other
countries. All other names are registered trademarks or trademarks of their
respective companies.</ns10:rear-matter>
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6" />
<ns10:platform idref="cpe:/o:centos:centos:6" />
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6::client" />
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6::computenode" />
<ns10:version update="https://github.com/OpenSCAP/scap-security-guide/releases/latest">0.1.31</ns10:version>
<ns10:metadata>
<dc:publisher>SCAP Security Guide Project</dc:publisher>
<dc:creator>SCAP Security Guide Project</dc:creator>
<dc:contributor>Gabe Alford <redhatrises@gmail.com></dc:contributor>
<dc:contributor>Christopher Anderson <cba@fedoraproject.org></dc:contributor>
<dc:contributor>Chuck Atkins <chuck.atkins@kitware.com></dc:contributor>
<dc:contributor>Molly Jo Bault <Molly.Jo.Bault@ballardtech.com></dc:contributor>
<dc:contributor>Joseph Bisch <joseph.bisch@gmail.com></dc:contributor>
<dc:contributor>Jeffrey Blank <blank@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Blake Burkhart <blake.burkhart@us.af.mil></dc:contributor>
<dc:contributor>Patrick Callahan <pmc@patrickcallahan.com></dc:contributor>
<dc:contributor>Nick Carboni <ncarboni@redhat.com></dc:contributor>
<dc:contributor>Frank Caviggia <fcaviggi@ra.iad.redhat.com></dc:contributor>
<dc:contributor>Eric Christensen <echriste@redhat.com></dc:contributor>
<dc:contributor>Caleb Cooper <coopercd@ornl.gov></dc:contributor>
<dc:contributor>Maura Dailey <maura@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Klaas Demter <demter@atix.de></dc:contributor>
<dc:contributor>Jean-Baptiste Donnette <jean-baptiste.donnette@epita.fr></dc:contributor>
<dc:contributor>drax <applezip@gmail.com></dc:contributor>
<dc:contributor>Greg Elin <gregelin@gitmachines.com></dc:contributor>
<dc:contributor>Andrew Gilmore <agilmore2@gmail.com></dc:contributor>
<dc:contributor>Joshua Glemza <jglemza@nasa.gov></dc:contributor>
<dc:contributor>Steve Grubb <sgrubb@redhat.com></dc:contributor>
<dc:contributor>Trey Henefield <thenefield@gmail.com></dc:contributor>
<dc:contributor>Robin Price II <robin@redhat.com></dc:contributor>
<dc:contributor>Jeremiah Jahn <jeremiah@goodinassociates.com></dc:contributor>
<dc:contributor>Stephan Joerrens <Stephan.Joerrens@fiduciagad.de></dc:contributor>
<dc:contributor>Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com></dc:contributor>
<dc:contributor>Luke Kordell <luke.t.kordell@lmco.com></dc:contributor>
<dc:contributor>kspargur <kspargur@kspargur.csb></dc:contributor>
<dc:contributor>Fen Labalme <fen@civicactions.com></dc:contributor>
<dc:contributor>Jan Lieskovsky <jlieskov@redhat.com></dc:contributor>
<dc:contributor>Šimon Lukašík <slukasik@redhat.com></dc:contributor>
<dc:contributor>Jamie Lorwey Martin <jlmartin@redhat.com></dc:contributor>
<dc:contributor>Michael McConachie <michael@redhat.com></dc:contributor>
<dc:contributor>Rodney Mercer <rmercer@harris.com></dc:contributor>
<dc:contributor>Brian Millett <bmillett@gmail.com></dc:contributor>
<dc:contributor>mmosel <mmosel@kde.example.com></dc:contributor>
<dc:contributor>Zbynek Moravec <zmoravec@redhat.com></dc:contributor>
<dc:contributor>Kazuo Moriwaka <moriwaka@users.noreply.github.com></dc:contributor>
<dc:contributor>Michael Moseley <michael@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Joe Nall <joe@nall.com></dc:contributor>
<dc:contributor>Michele Newman <mnewman@redhat.com></dc:contributor>
<dc:contributor>Kaustubh Padegaonkar <theTuxRacer@gmail.com></dc:contributor>
<dc:contributor>Michael Palmiotto <mpalmiotto@tresys.com></dc:contributor>
<dc:contributor>pcactr <paul.c.arnold4.ctr@mail.mil></dc:contributor>
<dc:contributor>Kenneth Peeples <kennethwpeeples@gmail.com></dc:contributor>
<dc:contributor>Frank Lin PIAT <fpiat@klabs.be></dc:contributor>
<dc:contributor>Martin Preisler <mpreisle@redhat.com></dc:contributor>
<dc:contributor>T.O. Radzy Radzykewycz <radzy@windriver.com></dc:contributor>
<dc:contributor>Rick Renshaw <Richard_Renshaw@xtoenergy.com></dc:contributor>
<dc:contributor>Chris Reynolds <c.reynolds82@gmail.com></dc:contributor>
<dc:contributor>Pat Riehecky <riehecky@fnal.gov></dc:contributor>
<dc:contributor>Joshua Roys <roysjosh@gmail.com></dc:contributor>
<dc:contributor>rrenshaw <bofh69@yahoo.com></dc:contributor>
<dc:contributor>Ray Shaw (Cont ARL/CISD) rvshaw <rvshaw@esme.arl.army.mil></dc:contributor>
<dc:contributor>Willy Santos <wsantos@redhat.com></dc:contributor>
<dc:contributor>Gautam Satish <gautams@hpe.com></dc:contributor>
<dc:contributor>Watson Sato <wsato@redhat.com></dc:contributor>
<dc:contributor>Satoru SATOH <satoru.satoh@gmail.com></dc:contributor>
<dc:contributor>Spencer Shimko <sshimko@tresys.com></dc:contributor>
<dc:contributor>Francisco Slavin <fslavin@tresys.com></dc:contributor>
<dc:contributor>David Smith <dsmith@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Kevin Spargur <kspargur@redhat.com></dc:contributor>
<dc:contributor>Kenneth Stailey <kstailey.lists@gmail.com></dc:contributor>
<dc:contributor>Leland Steinke <leland.j.steinke.ctr@mail.mil></dc:contributor>
<dc:contributor>Philippe Thierry <phil@reseau-libre.net></dc:contributor>
<dc:contributor>Paul Tittle <ptittle@cmf.nrl.navy.mil></dc:contributor>
<dc:contributor>Jeb Trayer <jeb.d.trayer@uscg.mil></dc:contributor>
<dc:contributor>Shawn Wells <shawn@redhat.com></dc:contributor>
<dc:contributor>Rob Wilmoth <rwilmoth@redhat.com></dc:contributor>
<dc:contributor>Lucas Yamanishi <lucas.yamanishi@onyxpoint.com></dc:contributor>
<dc:contributor>Kevin Zimmerman <kevin.zimmerman@kitware.com></dc:contributor>
<dc:contributor>Jan Černý <jcerny@redhat.com></dc:contributor>
<dc:contributor>Michal Šrubař <msrubar@redhat.com></dc:contributor>
<dc:source>https://github.com/OpenSCAP/scap-security-guide/releases/latest</dc:source>
</ns10:metadata>
<ns10:model system="urn:xccdf:scoring:default" />
<ns10:Profile id="xccdf_org.ssgproject.content_profile_standard">
<ns10:title xml:lang="en-US">Standard System Security Profile</ns10:title>
<ns10:description xml:lang="en-US">This profile contains rules to ensure standard security baseline of Red Hat Enterprise Linux 6 system.
Regardless of your system's workload all of these checks should pass.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disk_partitioning" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_aide" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_partitions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_permissions_important_account_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_permissions_within_important_dirs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_execshield_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_selinux" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_logins" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_password_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-pam" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_password_quality" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_password_quality_pamcracklib" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_locking_out_password_attempts" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_set_password_hashing_algorithm" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-physical" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_bootloader" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-banners" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-kernel" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_and_router_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_activation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-uncommon" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_logging" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_log_rotation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_auditing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_auditd_data_retention" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_auditd_configure_rules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_audit_time_rules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_audit_dac_actions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_obsolete" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_inetd_and_xinetd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_telnet" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_r_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nis" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_tftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_base" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_cron_and_at" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ssh" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ssh_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_service_avahi-daemon_disabled_group" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ntp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mail" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_CS2">
<ns10:title xml:lang="en-US">Example Server Profile</ns10:title>
<ns10:description xml:lang="en-US">This profile is an example of a customized server profile.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_PAE_kernel_on_x86-32" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_root_path_default" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_logwatch_for_logserver" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_logwatch_configured_splithosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_restorecond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_static_address" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_privacy_extensions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_default_gateway" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgred_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_sshd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_limit_user_access" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_cups_disable_browsing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_disable_ddns" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_deny_decline" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_deny_bootp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_minimize_served_info" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_configure_logging" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_tcp_port" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_udp_port" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_nfs_fixed_statd_port" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_nfs_fixed_mountd_port" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_use_root_squashing_all_exports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_nfs_clients_to_privileged_ports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_nfs_no_anonymous" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dns_server_disable_dynamic_updates" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_servertokens_prod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_mod_rewrite" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_server_side_includes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_webdav" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_server_activity_status" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_server_configuration_display" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_url_correction" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_proxy_support" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_cache_support" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_cgi_support" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_digest_authentication" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_ldap_support" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_mime_magic" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_restrict_root_directory" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_restrict_web_directory" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_restrict_critical_directories" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_limit_available_methods" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_install_mod_ssl" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_install_mod_security" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_etc_httpd_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_httpd_server_conf_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dovecot_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dovecot_enable_ssl" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_cert" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_key" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smb_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smb_server_disable_root" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_squid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_snmpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_avahi_ip_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_avahi_check_ttl" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_avahi_prevent_port_sharing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_avahi_disable_publishing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_activation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_auditd_data_retention" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="180" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="10" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="dod_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="60_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_common">
<ns10:title xml:lang="en-US">Common Profile for General-Purpose Systems</ns10:title>
<ns10:description xml:lang="en-US">This profile contains items common to general-purpose desktop and server installations.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_desktop">
<ns10:title override="true" xml:lang="en-US">Desktop Baseline</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is for a desktop installation of Red Hat Enterprise Linux 6.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smb_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_squid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_snmpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dovecot_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_server">
<ns10:title override="true" xml:lang="en-US">Server Baseline</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is for Red Hat Enterprise Linux 6 acting as a server.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_ftp-server">
<ns10:title override="true" xml:lang="en-US">ftp</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is for FTP servers.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_restrict_to_anon" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_disable_uploads" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_home_partition" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_stig-rhel6-workstation-upstream">
<ns10:title override="true" xml:lang="en-US">Upstream STIG for Red Hat Enterprise Linux 6 Workstation</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is developed under the DoD consensus model and DISA FSO Vendor STIG process,
serving as the upstream development environment for the Red Hat Enterprise Linux 6 Server STIG.
As a result of the upstream/downstream relationship between the SCAP Security Guide project
and the official DISA FSO STIG baseline, users should expect variance between SSG and DISA FSO content.
For official DISA FSO STIG content, refer to http://iase.disa.mil/stigs/os/unix-linux/Pages/red-hat.aspx.
While this profile is packaged by Red Hat as part of the SCAP Security Guide package, please note
that commercial support of this SCAP content is NOT available. This profile is provided as example
SCAP content with no endorsement for suitability or production readiness. Support for this
profile is provided by the upstream SCAP Security Guide community on a best-effort basis. The
upstream project homepage is https://www.open-scap.org/security-policies/scap-security-guide/.
</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_antivirus" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_not_default_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="10" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="604800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="60" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="dod_default" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_stig-rhel6-server-gui-upstream">
<ns10:title override="true" xml:lang="en-US">Upstream STIG for Red Hat Enterprise Linux 6 Server Running GUIs</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is developed under the DoD consensus model and DISA FSO Vendor STIG process,
serving as the upstream development environment for the Red Hat Enterprise Linux 6 Server STIG.
As a result of the upstream/downstream relationship between the SCAP Security Guide project
and the official DISA FSO STIG baseline, users should expect variance between SSG and DISA FSO content.
For official DISA FSO STIG content, refer to http://iase.disa.mil/stigs/os/unix-linux/Pages/red-hat.aspx.
While this profile is packaged by Red Hat as part of the SCAP Security Guide package, please note
that commercial support of this SCAP content is NOT available. This profile is provided as example
SCAP content with no endorsement for suitability or production readiness. Support for this
profile is provided by the upstream SCAP Security Guide community on a best-effort basis. The
upstream project homepage is https://www.open-scap.org/security-policies/scap-security-guide/.
</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_antivirus" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_not_default_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="10" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="604800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="60" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="dod_default" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_stig-rhel6-server-upstream">
<ns10:title override="true" xml:lang="en-US">Upstream STIG for Red Hat Enterprise Linux 6 Server</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile is developed under the DoD consensus model and DISA FSO Vendor STIG process,
serving as the upstream development environment for the Red Hat Enterprise Linux 6 Server STIG.
As a result of the upstream/downstream relationship between the SCAP Security Guide project
and the official DISA FSO STIG baseline, users should expect variance between SSG and DISA FSO content.
For official DISA FSO STIG content, refer to http://iase.disa.mil/stigs/os/unix-linux/Pages/red-hat.aspx.
While this profile is packaged by Red Hat as part of the SCAP Security Guide package, please note
that commercial support of this SCAP content is NOT available. This profile is provided as example
SCAP content with no endorsement for suitability or production readiness. Support for this
profile is provided by the upstream SCAP Security Guide community on a best-effort basis. The
upstream project homepage is https://www.open-scap.org/security-policies/scap-security-guide/.
</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_antivirus" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_snmpd_not_default_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="10" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="dod_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="604800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="60" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="15_minutes" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_usgcb-rhel6-server">
<ns10:title xml:lang="en-US">United States Government Configuration Baseline (USGCB)</ns10:title>
<ns10:description xml:lang="en-US">This profile is a working draft for a USGCB submission against RHEL6 Server.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_PAE_kernel_on_x86-32" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_root_path_no_dot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dovecot_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smb_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_squid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_snmpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_permissions_within_important_dirs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_auditd_data_retention" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="60" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="12" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="24" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="30" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_rht-ccp">
<ns10:title xml:lang="en-US">Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)</ns10:title>
<ns10:description xml:lang="en-US">This is a *draft* SCAP profile for Red Hat Certified Cloud Providers</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_partitions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_account_expiration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-session" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-banners" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-kernel" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_and_router_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_logging" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_log_rotation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_auditd_data_retention" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_audit_time_rules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_audit_dac_actions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ntp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mail" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_CSCF-RHEL6-MLS">
<ns10:title xml:lang="en-US">CSCF RHEL6 MLS Core Baseline</ns10:title>
<ns10:description xml:lang="en-US"> This profile reflects the Centralized Super Computing Facility
(CSCF) baseline for Red Hat Enterprise Linux 6. This baseline has received
government ATO through the ICD 503 process, utilizing the CNSSI 1253 cross
domain overlay. This profile should be considered in active development.
Additional tailoring will be needed, such as the creation of RBAC roles
for production deployment.</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bios_disable_usb_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_cups_disable_browsing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_cups_disable_printserver" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_deny_bootp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_deny_decline" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dhcp_server_disable_ddns" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_anacron" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dns_server_authenticate_zone_transfers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_httpd_server_conf_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_var_log_httpd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_httpd_servertokens_prod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_listen_tcp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_psacct_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_quota_nld_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_antivirus" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bios_enable_execution_restrictions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_updating" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rpm_verification" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-session" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_inetd_and_xinetd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_telnet" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="keep_logs" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="180" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="12" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="mls" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_C2S">
<ns10:title xml:lang="en-US">C2S for Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">This profile demonstrates compliance against the
U.S. Government Commercial Cloud Services (C2S) baseline.
This baseline was inspired by the Center for Internet Security
(CIS) Red Hat Enterprise Linux 6 Benchmark, v1.2.0 - 06-25-2013.
For the SCAP Security Guide project to remain in compliance with
CIS' terms and conditions, specifically Restrictions(8), note
there is no representation or claim that the C2S profile will
ensure a system is in compliance or consistency with the CIS
baseline.
</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_setroubleshoot_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_mcstrans_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypbind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_talk_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_talk-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rpcbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_samba_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_audit_dac_actions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_limit_user_access" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_set_password_hashing_algorithm" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_password_quality_pamcracklib" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_root_path_default" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_password_quality" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="027" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_pci-dss">
<ns10:title xml:lang="en-US">PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">This is a *draft* profile for PCI-DSS v3</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_minlen" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disk_partitioning" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_partitions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_permissions_within_important_dirs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_daemon_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_execshield_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_selinux" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_logins" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-session" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_console_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_accounts-banners" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-kernel" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_host_and_router_parameters" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-wireless" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_wireless_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_ipv6" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_activation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ruleset_modifications" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-uncommon" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_obsolete" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_inetd_and_xinetd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_telnet" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_r_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nis" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_tftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_base" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_cron_and_at" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_service_avahi-daemon_disabled_group" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mail" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="4" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="1800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_nist-cl-il-al">
<ns10:title override="true" xml:lang="en-US">CNSSI 1253 Low/Low/Low Control Baseline for Red Hat Enterprise Linux 6</ns10:title>
<ns10:description override="true" xml:lang="en-US">This profile follows the Committee on National Security Systems Instruction
(CNSSI) No. 1253, "Security Categorization and Control Selection for National Security
Systems" on security controls to meet low confidentiality, low integrity, and low
assurance."</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_home" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_restorecond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bios_disable_usb_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_psacct_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_cups_disable_browsing" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_cups_disable_printserver" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgred_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_quota_nld_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_tmout" selector="10_min" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="15" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="14" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" selector="077" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" selector="5" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" selector="rotate" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="single" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" selector="root" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="5_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="40" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_state" selector="enforcing" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" selector="targeted" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="022" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" selector="disabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" selector="enabled" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" selector="enabled" />
</ns10:Profile>
<ns10:Profile id="xccdf_org.ssgproject.content_profile_fisma-medium-rhel6-server">
<ns10:title xml:lang="en-US">FISAMA Medium for Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">FISMA Medium for Red Hat Enterprise Linux 6</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_state" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_restorecond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsh_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bios_disable_usb_boot" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cgred_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_quota_nld_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_password" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_group_remediation_functions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_general-principles" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-minimize-software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-separate-servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-use-security-tools" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_principle-least-privilege" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_how-to-use" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-read-sections-completely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-test-non-production" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-root-shell-assumed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-formatting-conventions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_intro-reboot-required" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_entropy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_updating" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_additional_security_software" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_fips" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_certified-vendor" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_login_screen" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_screen_locking" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_system_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_network_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_remote_access_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gnome_media_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_coredumps" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_execshield_settings" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_enable_nx" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_root_paths" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_user_umask" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smart_card_login" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_gui_login_banner" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_icmp_disabled" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_network-ipsec" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_rsyslog_sending_messages" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_talk" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_restrict_at_cron_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_sssd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_xwindows" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_avahi_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dhcp_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dhcp_client_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mail" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_harden_os" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_configuration" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_client" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_openldap_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_and_rpc" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfs_services" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_netfs" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_clients" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_nfsd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_mounting_remote_filesystems" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_nfs_configuring_servers" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_exports_restrictively" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_export_filesystems_read_only" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dns_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_isolation" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_dedicated" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_protection" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dns_server_partition_with_views" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_use_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_ftp_restrict_users" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_http" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_installing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_securing_httpd" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_core_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_basic_authentication" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_optional_components" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_directory_restrictions" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_modules_improve_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_php_securely" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_configure_iptables" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_httpd_chroot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_imap" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configure_dovecot" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_configuring_samba" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_smb_disable_printing" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_proxy" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_squid" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_disabling_snmp_service" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_snmp_configure_server" selected="false" />
<ns10:select idref="xccdf_org.ssgproject.content_group_srg_support" selected="false" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" selector="022" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="3" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" selector="900" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="604800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_login_banner_text" selector="usgcb_default" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" selector="1" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" selector="0" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" selector="halt" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="24" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" selector="12" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" selector="1" />
</ns10:Profile>
<ns10:Group id="xccdf_org.ssgproject.content_group_remediation_functions">
<ns10:title xml:lang="en-US">Remediation functions used by the SCAP Security Guide Project</ns10:title>
<ns10:description xml:lang="en-US">XCCDF form of the various remediation functions as used by
remediation scripts from the SCAP Security Guide Project</ns10:description>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to fix syscall audit rule for given system call</ns10:title>
<ns10:description xml:lang="en-US">Function to fix syscall audit rule for given system call. It is
based on example audit syscall rule definitions as outlined in
/usr/share/doc/audit-2.3.7/stig.rules file provided with the audit package. It
will combine multiple system calls belonging to the same syscall group into one
audit rule (rather than to create audit rule per different system call) to
avoid audit infrastructure performance penalty in the case of
'one-audit-rule-definition-per-one-system-call'. See:
https://www.redhat.com/archives/linux-audit/2014-November/msg00009.html
for further details.
Expects five arguments (each of them is required) in the form of:
* audit tool tool used to load audit rules,
either 'auditctl', or 'augenrules
* audit rules' pattern audit rule skeleton for same syscall
* syscall group greatest common string this rule shares
with other rules from the same group
* architecture architecture this rule is intended for
* full form of new rule to add expected full form of audit rule as to
be added into audit.rules file
Note: The 2-th up to 4-th arguments are used to determine how many existing
audit rules will be inspected for resemblance with the new audit rule
(5-th argument) the function is going to add. The rule's similarity check
is performed to optimize audit.rules definition (merge syscalls of the same
group into one rule) to avoid the "single-syscall-per-audit-rule" performance
penalty.
Example call:
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k delete"
# Use escaped BRE regex to specify rule group
GROUP="\(rmdir\|unlink\|rename\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete"
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to fix audit file system object watch rule for given path</ns10:title>
<ns10:description xml:lang="en-US">Function to fix audit file system object watch rule for given path:
* if rule exists, also verifies the -w bits match the requirements
* if rule doesn't exist yet, appends expected rule form to $files_to_inspect
audit rules file, depending on the tool which was used to load audit rules
Expects four arguments (each of them is required) in the form of:
* audit tool tool used to load audit rules,
either 'auditctl', or 'augenrules'
* path value of -w audit rule's argument
* required access bits value of -p audit rule's argument
* key value of -k audit rule's argument
Example call:
fix_audit_watch_rule "auditctl" "/etc/localtime" "wa" "audit_time_rules"
</ns10:description>
<ns10:value>
function fix_audit_watch_rule {
# Load function arguments into local variables
local tool="$1"
local path="$2"
local required_access_bits="$3"
local key="$4"
# Check sanity of the input
if [ $# -ne "4" ]
then
echo "Usage: fix_audit_watch_rule 'tool' 'path' 'bits' 'key'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
declare -a files_to_inspect
# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If the audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# into the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules')
# If the audit is 'augenrules', then check if rule is already defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to list of files for inspection.
# If rule isn't defined, add '/etc/audit/rules.d/$key.rules' to list of files for inspection.
elif [ "$tool" == 'augenrules' ]
then
# Case when particular audit rule is already defined in some of /etc/audit/rules.d/*.rules file
# Get pair -- filepath : matching_row into @matches array
IFS=$'\n' matches=($(grep -P "[\s]*-w[\s]+$path" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
# For each of the matched entries
for match in "${matches[@]}"
do
# Extract filepath from the match
rulesd_audit_file=$(echo $match | cut -f1 -d ':')
# Append that path into list of files for inspection
files_to_inspect=("${files_to_inspect[@]}" "$rulesd_audit_file")
done
# Case when particular audit rule isn't defined yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
# Append '/etc/audit/rules.d/$key.rules' into list of files for inspection
files_to_inspect="/etc/audit/rules.d/$key.rules"
# If the $key.rules file doesn't exist yet, create it with correct permissions
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
# Finally perform the inspection and possible subsequent audit rule
# correction for each of the files previously identified for inspection
for audit_rules_file in "${files_to_inspect[@]}"
do
# Check if audit watch file system object rule for given path already present
if grep -q -P -- "[\s]*-w[\s]+$path" "$audit_rules_file"
then
# Rule is found => verify yet if existing rule definition contains
# all of the required access type bits
# Escape slashes in path for use in sed pattern below
local esc_path=${path//$'/'/$'\/'}
# Define BRE whitespace class shortcut
local sp="[[:space:]]"
# Extract current permission access types (e.g. -p [r|w|x|a] values) from audit rule
current_access_bits=$(sed -ne "s/$sp*-w$sp\+$esc_path$sp\+-p$sp\+\([rxwa]\{1,4\}\).*/\1/p" "$audit_rules_file")
# Split required access bits string into characters array
# (to check bit's presence for one bit at a time)
for access_bit in $(echo "$required_access_bits" | grep -o .)
do
# For each from the required access bits (e.g. 'w', 'a') check
# if they are already present in current access bits for rule.
# If not, append that bit at the end
if ! grep -q "$access_bit" <<< "$current_access_bits"
then
# Concatenate the existing mask with the missing bit
current_access_bits="$current_access_bits$access_bit"
fi
done
# Propagate the updated rule's access bits (original + the required
# ones) back into the /etc/audit/audit.rules file for that rule
sed -i "s/\($sp*-w$sp\+$esc_path$sp\+-p$sp\+\)\([rxwa]\{1,4\}\)\(.*\)/\1$current_access_bits\3/" "$audit_rules_file"
else
# Rule isn't present yet. Append it at the end of $audit_rules_file file
# with proper key
echo "-w $path -p $required_access_bits -k $key" >> "$audit_rules_file"
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_package_command" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to to install or uninstall packages on RHEL and Fedora systems</ns10:title>
<ns10:description xml:lang="en-US">Function to install or uninstall packages on RHEL and Fedora systems.
Example Call(s):
package_command install aide
package_command remove telnet-server
</ns10:description>
<ns10:value>
function package_command {
# Load function arguments into local variables
local package_operation=$1
local package=$2
# Check sanity of the input
if [ $# -ne "2" ]
then
echo "Usage: package_command 'install/uninstall' 'rpm_package_name"
echo "Aborting."
exit 1
fi
# If dnf is installed, use dnf; otherwise, use yum
if [ -f "/usr/bin/dnf" ] ; then
install_util="/usr/bin/dnf"
else
install_util="/usr/bin/yum"
fi
if [ "$package_operation" != 'remove' ] ; then
# If the rpm is not installed, install the rpm
if ! /bin/rpm -q --quiet $package; then
$install_util -y $package_operation $package
fi
else
# If the rpm is installed, uninstall the rpm
if /bin/rpm -q --quiet $package; then
$install_util -y $package_operation $package
fi
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_service_command" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to enable/disable and start/stop services on RHEL
and Fedora systems</ns10:title>
<ns10:description xml:lang="en-US">Function to enable/disable and start/stop services on RHEL and
Fedora systems.
Example Call(s):
service_command enable bluetooth
service_command disable bluetooth.service
Using xinetd:
service_command disable rsh.socket xinetd=rsh
</ns10:description>
<ns10:value>
function service_command {
# Load function arguments into local variables
local service_state=$1
local service=$2
local xinetd=$(echo $3 | cut -d'=' -f2)
# Check sanity of the input
if [ $# -lt "2" ]
then
echo "Usage: service_command 'enable/disable' 'service_name.service'"
echo
echo "To enable or disable xinetd services add \'xinetd=service_name\'"
echo "as the last argument"
echo "Aborting."
exit 1
fi
# If systemctl is installed, use systemctl command; otherwise, use the service/chkconfig commands
if [ -f "/usr/bin/systemctl" ] ; then
service_util="/usr/bin/systemctl"
else
service_util="/sbin/service"
chkconfig_util="/sbin/chkconfig"
fi
# If disable is not specified in arg1, set variables to enable services.
# Otherwise, variables are to be set to disable services.
if [ "$service_state" != 'disable' ] ; then
service_state="enable"
service_operation="start"
chkconfig_state="on"
else
service_state="disable"
service_operation="stop"
chkconfig_state="off"
fi
# If chkconfig_util is not empty, use chkconfig/service commands.
if ! [ "x$chkconfig_util" = x ] ; then
$service_util $service $service_operation
$chkconfig_util --level 0123456 $service $chkconfig_state
else
$service_util $service_operation $service
$service_util $service_state $service
fi
# Test if local variable xinetd is empty using non-bashism.
# If empty, then xinetd is not being used.
if ! [ "x$xinetd" = x ] ; then
grep -qi disable /etc/xinetd.d/$xinetd && \
if ! [ "$service_operation" != 'disable' ] ; then
sed -i "s/disable.*/disable = no/gI" /etc/xinetd.d/$xinetd
else
sed -i "s/disable.*/disable = yes/gI" /etc/xinetd.d/$xinetd
fi
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_perform_audit_rules_privileged_commands_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to perform remediation for 'audit_rules_privileged_commands' rule</ns10:title>
<ns10:description xml:lang="en-US">Function to perform remediation for 'audit_rules_privileged_commands' rule
Expects two arguments:
audit_tool tool used to load audit rules
One of 'auditctl' or 'augenrules'
min_auid Minimum original ID the user logged in with
'500' for RHEL-6 and before, '1000' for RHEL-7 and after.
Example Call(s):
perform_audit_rules_privileged_commands_remediation "auditctl" "500"
perform_audit_rules_privileged_commands_remediation "augenrules" "1000"
</ns10:description>
<ns10:value>
function perform_audit_rules_privileged_commands_remediation {
#
# Load function arguments into local variables
local tool="$1"
local min_auid="$2"
# Check sanity of the input
if [ $# -ne "2" ]
then
echo "Usage: perform_audit_rules_privileged_commands_remediation 'auditctl | augenrules' '500 | 1000'"
echo "Aborting."
exit 1
fi
declare -a files_to_inspect=()
# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If the audit tool is 'auditctl', then:
# * add '/etc/audit/audit.rules'to the list of files to be inspected,
# * specify '/etc/audit/audit.rules' as the output audit file, where
# missing rules should be inserted
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("/etc/audit/audit.rules")
output_audit_file="/etc/audit/audit.rules"
#
# If the audit tool is 'augenrules', then:
# * add '/etc/audit/rules.d/*.rules' to the list of files to be inspected
# (split by newline),
# * specify /etc/audit/rules.d/privileged.rules' as the output file, where
# missing rules should be inserted
elif [ "$tool" == 'augenrules' ]
then
IFS=$'\n' files_to_inspect=($(find /etc/audit/rules.d -maxdepth 1 -type f -name *.rules -print))
output_audit_file="/etc/audit/rules.d/privileged.rules"
fi
# Obtain the list of SUID/SGID binaries on the particular system (split by newline)
# into privileged_binaries array
IFS=$'\n' privileged_binaries=($(find / -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null))
# Keep list of SUID/SGID binaries that have been already handled within some previous iteration
declare -a sbinaries_to_skip=()
# For each found sbinary in privileged_binaries list
for sbinary in "${privileged_binaries[@]}"
do
# Replace possible slash '/' character in sbinary definition so we could use it in sed expressions below
sbinary_esc=${sbinary//$'/'/$'\/'}
# Check if this sbinary wasn't already handled in some of the previous iterations
# Return match only if whole sbinary definition matched (not in the case just prefix matched!!!)
if [[ $(sed -ne "/${sbinary_esc}$/p" <<< ${sbinaries_to_skip[@]}) ]]
then
# If so, don't process it second time & go to process next sbinary
continue
fi
# Reset the counter of inspected files when starting to check
# presence of existing audit rule for new sbinary
local count_of_inspected_files=0
# For each audit rules file from the list of files to be inspected
for afile in "${files_to_inspect[@]}"
do
# Search current audit rules file's content for match. Match criteria:
# * existing rule is for the same SUID/SGID binary we are currently processing (but
# can contain multiple -F path= elements covering multiple SUID/SGID binaries)
# * existing rule contains all arguments from expected rule form (though can contain
# them in arbitrary order)
base_search=$(sed -e "/-a always,exit/!d" -e "/-F path=${sbinary_esc}$/!d" \
-e "/-F path=[^[:space:]]\+/!d" -e "/-F perm=.*/!d" \
-e "/-F auid>=${min_auid}/!d" -e "/-F auid!=4294967295/!d" \
-e "/-k privileged/!d" $afile)
# Increase the count of inspected files for this sbinary
count_of_inspected_files=$((count_of_inspected_files + 1))
# Define expected rule form for this binary
expected_rule="-a always,exit -F path=${sbinary} -F perm=x -F auid>=${min_auid} -F auid!=4294967295 -k privileged"
# Require execute access type to be set for existing audit rule
exec_access='x'
# Search current audit rules file's content for presence of rule pattern for this sbinary
if [[ $base_search ]]
then
# Current audit rules file already contains rule for this binary =>
# Store the exact form of found rule for this binary for further processing
concrete_rule=$base_search
# Select all other SUID/SGID binaries possibly also present in the found rule
IFS=$'\n' handled_sbinaries=($(grep -o -e "-F path=[^[:space:]]\+" <<< $concrete_rule))
IFS=$' ' handled_sbinaries=(${handled_sbinaries[@]//-F path=/})
# Merge the list of such SUID/SGID binaries found in this iteration with global list ignoring duplicates
sbinaries_to_skip=($(for i in "${sbinaries_to_skip[@]}" "${handled_sbinaries[@]}"; do echo $i; done | sort -du))
# Separate concrete_rule into three sections using hash '#'
# sign as a delimiter around rule's permission section borders
concrete_rule=$(echo $concrete_rule | sed -n "s/\(.*\)\+\(-F perm=[rwax]\+\)\+/\1#\2#/p")
# Split concrete_rule into head, perm, and tail sections using hash '#' delimiter
IFS=$'#' read rule_head rule_perm rule_tail <<< "$concrete_rule"
# Extract already present exact access type [r|w|x|a] from rule's permission section
access_type=${rule_perm//-F perm=/}
# Verify current permission access type(s) for rule contain 'x' (execute) permission
if ! grep -q "$exec_access" <<< "$access_type"
then
# If not, append the 'x' (execute) permission to the existing access type bits
access_type="$access_type$exec_access"
# Reconstruct the permissions section for the rule
new_rule_perm="-F perm=$access_type"
# Update existing rule in current audit rules file with the new permission section
sed -i "s#${rule_head}\(.*\)${rule_tail}#${rule_head}${new_rule_perm}${rule_tail}#" $afile
fi
# If the required audit rule for particular sbinary wasn't found yet, insert it under following conditions:
#
# * in the "auditctl" mode of operation insert particular rule each time
# (because in this mode there's only one file -- /etc/audit/audit.rules to be inspected for presence of this rule),
#
# * in the "augenrules" mode of operation insert particular rule only once and only in case we have already
# searched all of the files from /etc/audit/rules.d/*.rules location (since that audit rule can be defined
# in any of those files and if not, we want it to be inserted only once into /etc/audit/rules.d/privileged.rules file)
#
elif [ "$tool" == "auditctl" ] || [[ "$tool" == "augenrules" && $count_of_inspected_files -eq "${#files_to_inspect[@]}" ]]
then
# Current audit rules file's content doesn't contain expected rule for this
# SUID/SGID binary yet => append it
echo $expected_rule >> $output_audit_file
fi
done
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_populate" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to populate environment variables needed for unit testing</ns10:title>
<ns10:description xml:lang="en-US">The populate function isn't directly used by SSG at the moment but it can
ba used for testing purposes (to verify proper work of the remediation script directly
from the shell).</ns10:description>
<ns10:value>
function populate {
# Code to populate environment variables needed (for unit testing)
if [ -z "${!1}" ]; then
echo "$1 is not defined. Exiting."
exit
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function for the 'adjtimex', 'settimeofday', and 'stime'
audit system calls on Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 6 OS</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
function rhel6_perform_audit_adjtimex_settimeofday_stime_remediation {
# Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 6 OS
#
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
# Create expected audit group and audit rule form for particular system call & architecture
if [ ${ARCH} = "b32" ]
then
# stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
# so append it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\|stime\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
elif [ ${ARCH} = "b64" ]
then
# stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
# therefore don't add it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
fi
# Perform the remediation itself
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_rhel7_fedora_perform_audit_adjtimex_settimeofday_stime_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function for the 'adjtimex', 'settimeofday', and 'stime'
audit system calls on Red Hat Enterprise Linux 7 or Fedora</ns10:title>
<ns10:description xml:lang="en-US">Perform the remediation for the 'adjtimex', 'settimeofday', and
'stime' audit system calls on Red Hat Enterprise Linux 7 or Fedora OSes</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
function rhel7_fedora_perform_audit_adjtimex_settimeofday_stime_remediation {
# Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 7 or Fedora OSes
#
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
# Create expected audit group and audit rule form for particular system call & architecture
if [ ${ARCH} = "b32" ]
then
# stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
# so append it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\|stime\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
elif [ ${ARCH} = "b64" ]
then
# stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
# therefore don't add it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
fi
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_replace_or_append" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting in config file or
add the configuration setting if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting in config file or add
the configuration setting if it does not exist.
Expects four arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
cce: The CCE identifier or '$CCENUM' if no CCE identifier exists
Optional arguments:
format: Optional argument to specify the format of how key/value should be
modified/appended in the configuration file. The default is key = value.
Example Call(s):
With default format of 'key = value':
replace_or_append '/etc/sysctl.conf' '^kernel.randomize_va_space' '2' '$CCENUM'
With custom key/value format:
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' 'disabled' '$CCENUM' '%s=%s'
With a variable:
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' $var_selinux_state '$CCENUM' '%s=%s'
</ns10:description>
<ns10:value>
function replace_or_append {
local config_file=$1
local key=$2
local value=$3
local cce=$4
local format=$5
# Check sanity of the input
if [ $# -lt "3" ]
then
echo "Usage: replace_or_append 'config_file_location' 'key_to_search' 'new_value'"
echo
echo "If symlinks need to be taken into account, add yes/no to the last argument"
echo "to allow to 'follow_symlinks'."
echo "Aborting."
exit 1
fi
# Test if the config_file is a symbolic link. If so, use --follow-symlinks with sed.
# Otherwise, regular sed command will do.
if test -L $config_file; then
sed_command="sed -i --follow-symlinks"
else
sed_command="sed -i"
fi
# Test that the cce arg is not empty or does not equal $CCENUM.
# If $CCENUM exists, it means that there is no CCE assigned.
if ! [ "x$cce" = x ] && [ "$cce" != '$CCENUM' ]; then
cce="CCE-${cce}"
else
cce="CCE"
fi
# Strip any search characters in the key arg so that the key can be replaced without
# adding any search characters to the config file.
stripped_key=$(sed "s/[\^=\$,;+]*//g" <<< $key)
# If there is no print format specified in the last arg, use the default format.
if ! [ "x$format" = x ] ; then
printf -v formatted_output "$format" $stripped_key $value
else
formatted_output="$stripped_key = $value"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -qi $key $config_file` ; then
$sed_command "s/$key.*/$formatted_output/g" $config_file
else
echo -ne "\n# Per $cce: Set $formatted_output in $config_file" >> $config_file
echo -ne "\n$formatted_output" >> $config_file
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_firefox_js_setting" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting(s) in the Firefox
preferences JavaScript file or add the preference if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting(s) in the Firefox
preferences JavaScript file or add the preference if it does not exist.
Expects three arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
Example Call(s):
Without string or variable:
firefox_js_setting "stig_settings.js" "general.config.obscure_value" "0"
With string:
firefox_js_setting "stig_settings.js" "general.config.filename" "\"stig.cfg\""
With a string variable:
firefox_js_setting "stig_settings.js" "general.config.filename" "\"$var_config_file_name\""
</ns10:description>
<ns10:value>
function firefox_js_setting {
local firefox_js=$1
local key=$2
local value=$3
local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"
local firefox_pref="/defaults/pref"
local firefox_preferences="/defaults/preferences"
# Check sanity of input
if [ $# -lt "3" ]
then
echo "Usage: firefox_js_setting 'config_javascript_file' 'key_to_search' 'new_value'"
echo
echo "Aborting."
exit 1
fi
# Check the possible Firefox install directories
for firefox_dir in ${firefox_dirs}; do
# If the Firefox directory exists, then Firefox is installed
if [ -d "${firefox_dir}" ]; then
# Different versions of Firefox have different preferences directories, check for them and set the right one
if [ -d "${firefox_dir}/${firefox_pref}" ] ; then
local firefox_pref_dir="${firefox_dir}/${firefox_pref}"
elif [ -d "${firefox_dir}/${firefox_preferences}" ] ; then
local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
else
mkdir -m 755 -p "${firefox_dir}/${firefox_preferences}"
local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
fi
# Make sure the Firefox .js file exists and has the appropriate permissions
if ! [ -f "${firefox_pref_dir}/${firefox_js}" ] ; then
touch "${firefox_pref_dir}/${firefox_js}"
chmod 644 "${firefox_pref_dir}/${firefox_js}"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -q "^pref(\"${key}\", " "${firefox_pref_dir}/${firefox_js}"` ; then
sed -i "s/pref(\"${key}\".*/pref(\"${key}\", ${value});/g" "${firefox_pref_dir}/${firefox_js}"
else
echo "pref(\"${key}\", ${value});" >> "${firefox_pref_dir}/${firefox_js}"
fi
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_firefox_cfg_setting" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting(s) in the Firefox
preferences configuration (.cfg) file or add the preference if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting(s) in the Firefox
preferences configuration (.cfg) file or add the preference if it does not exist.
Expects three arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
Example Call(s):
Without string or variable:
firefox_cfg_setting "stig.cfg" "extensions.update.enabled" "false"
With string:
firefox_cfg_setting "stig.cfg" "security.default_personal_cert" "\"Ask Every Time\""
With a string variable:
firefox_cfg_setting "stig.cfg" "browser.startup.homepage\" "\"${var_default_home_page}\""
</ns10:description>
<ns10:value>
function firefox_cfg_setting {
local firefox_cfg=$1
local key=$2
local value=$3
local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"
# Check sanity of input
if [ $# -lt "3" ]
then
echo "Usage: firefox_cfg_setting 'config_cfg_file' 'key_to_search' 'new_value'"
echo
echo "Aborting."
exit 1
fi
# Check the possible Firefox install directories
for firefox_dir in ${firefox_dirs}; do
# If the Firefox directory exists, then Firefox is installed
if [ -d "${firefox_dir}" ]; then
# Make sure the Firefox .cfg file exists and has the appropriate permissions
if ! [ -f "${firefox_dir}/${firefox_cfg}" ] ; then
touch "${firefox_dir}/${firefox_cfg}"
chmod 644 "${firefox_dir}/${firefox_cfg}"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -q "^lockPref(\"${key}\", " "${firefox_dir}/${firefox_cfg}"` ; then
sed -i "s/lockPref(\"${key}\".*/lockPref(\"${key}\", ${value});/g" "${firefox_dir}/${firefox_cfg}"
else
echo "lockPref(\"${key}\", ${value});" >> "${firefox_dir}/${firefox_cfg}"
fi
fi
done
}
</ns10:value>
</ns10:Value>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro">
<ns10:title xml:lang="en-US">Introduction</ns10:title>
<ns10:description xml:lang="en-US">
The purpose of this guidance is to provide security configuration
recommendations and baselines for the Red Hat Enterprise Linux 6 operating
system. Recommended settings for the basic operating system are provided,
as well as for many network services that the system can provide to other systems.
The guide is intended for system administrators. Readers are assumed to
possess basic system administration skills for Unix-like systems, as well
as some familiarity with the product's documentation and administration
conventions. Some instructions within this guide are complex.
All directions should be followed completely and with understanding of
their effects in order to avoid serious adverse effects on the system
and its security.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_general-principles">
<ns10:title xml:lang="en-US">General Principles</ns10:title>
<ns10:description xml:lang="en-US">
The following general principles motivate much of the advice in this
guide and should also influence any configuration decisions that are
not explicitly covered.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_principle-encrypt-transmitted-data">
<ns10:title xml:lang="en-US">Encrypt Transmitted Data Whenever Possible</ns10:title>
<ns10:description xml:lang="en-US">
Data transmitted over a network, whether wired or wireless, is susceptible
to passive monitoring. Whenever practical solutions for encrypting
such data exist, they should be applied. Even if data is expected to
be transmitted only over a local network, it should still be encrypted.
Encrypting authentication data, such as passwords, is particularly
important. Networks of Red Hat Enterprise Linux 6 machines can and should be configured
so that no unencrypted authentication data is ever transmitted between
machines.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_principle-minimize-software">
<ns10:title xml:lang="en-US">Minimize Software to Minimize Vulnerability</ns10:title>
<ns10:description xml:lang="en-US">
The simplest way to avoid vulnerabilities in software is to avoid
installing that software. On Red Hat Enterprise Linux 6,
the RPM Package Manager (originally Red Hat
Package Manager, abbreviated RPM)
allows for careful management of
the set of software packages installed on a system. Installed software
contributes to system vulnerability in several ways. Packages that
include setuid programs may provide local attackers a potential path to
privilege escalation. Packages that include network services may give
this opportunity to network-based attackers. Packages that include
programs which are predictably executed by local users (e.g. after
graphical login) may provide opportunities for trojan horses or other
attack code to be run undetected. The number of software packages
installed on a system can almost always be significantly pruned to include
only the software for which there is an environmental or operational need.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_principle-separate-servers">
<ns10:title xml:lang="en-US">Run Different Network Services on Separate Systems</ns10:title>
<ns10:description xml:lang="en-US">
Whenever possible, a server should be dedicated to serving exactly one
network service. This limits the number of other services that can
be compromised in the event that an attacker is able to successfully
exploit a software flaw in one network service.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_principle-use-security-tools">
<ns10:title xml:lang="en-US">Configure Security Tools to Improve System Robustness</ns10:title>
<ns10:description xml:lang="en-US">
Several tools exist which can be effectively used to improve a system's
resistance to and detection of unknown attacks. These tools can improve
robustness against attack at the cost of relatively little configuration
effort. In particular, this guide recommends and discusses the use of
host-based firewalling, SELinux for protection against
vulnerable services, and a logging and auditing infrastructure for
detection of problems.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_principle-least-privilege">
<ns10:title xml:lang="en-US">Least Privilege</ns10:title>
<ns10:description xml:lang="en-US">
Grant the least privilege necessary for user accounts and software to perform tasks.
For example, <html:code>sudo</html:code> can be implemented to limit authorization to super user
accounts on the system only to designated personnel. Another example is to limit
logins on server systems to only those administrators who need to log into them in
order to perform administration tasks. Using SELinux also follows the principle of
least privilege: SELinux policy can confine software to perform only actions on the
system that are specifically allowed. This can be far more restrictive than the
actions permissible by the traditional Unix permissions model.
</ns10:description>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_how-to-use">
<ns10:title xml:lang="en-US">How to Use This Guide</ns10:title>
<ns10:description xml:lang="en-US">
Readers should heed the following points when using the guide.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro-read-sections-completely">
<ns10:title xml:lang="en-US">Read Sections Completely and in Order</ns10:title>
<ns10:description xml:lang="en-US">
Each section may build on information and recommendations discussed in
prior sections. Each section should be read and understood completely;
instructions should never be blindly applied. Relevant discussion may
occur after instructions for an action.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro-test-non-production">
<ns10:title xml:lang="en-US">Test in Non-Production Environment</ns10:title>
<ns10:description xml:lang="en-US">
This guidance should always be tested in a non-production environment
before deployment. This test environment should simulate the setup in
which the system will be deployed as closely as possible.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro-root-shell-assumed">
<ns10:title xml:lang="en-US">Root Shell Environment Assumed</ns10:title>
<ns10:description xml:lang="en-US">
Most of the actions listed in this document are written with the
assumption that they will be executed by the root user running the
<html:code>/bin/bash</html:code> shell. Commands preceded with a hash mark (#)
assume that the administrator will execute the commands as root, i.e.
apply the command via <html:code>sudo</html:code> whenever possible, or use
<html:code>su</html:code> to gain root privileges if <html:code>sudo</html:code> cannot be
used. Commands which can be executed as a non-root user are are preceded
by a dollar sign ($) prompt.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro-formatting-conventions">
<ns10:title xml:lang="en-US">Formatting Conventions</ns10:title>
<ns10:description xml:lang="en-US">
Commands intended for shell execution, as well as configuration file text,
are featured in a <html:code>monospace font</html:code>. <html:i>Italics</html:i> are used
to indicate instances where the system administrator must substitute
the appropriate information into a command or configuration file.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_intro-reboot-required">
<ns10:title xml:lang="en-US">Reboot Required</ns10:title>
<ns10:description xml:lang="en-US">
A system reboot is implicitly required after some actions in order to
complete the reconfiguration of the system. In many cases, the changes
will not take effect until a reboot is performed. In order to ensure
that changes are applied properly and to test functionality, always
reboot the system after applying a set of recommendations from this guide.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
<ns10:title xml:lang="en-US">System Settings</ns10:title>
<ns10:description xml:lang="en-US">Contains rules that check correct system settings.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_entropy">
<ns10:title xml:lang="en-US">Protect Random-Number Entropy Pool</ns10:title>
<ns10:description xml:lang="en-US">
The I/O operations of the Linux kernel block layer due to their inherently
unpredictable execution times have been traditionally considered as a reliable
source to contribute to random-number entropy pool of the Linux kernel. This
has changed with introduction of solid-state storage devices (SSDs) though.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Solid State Drives Do Not Contribute To Random-Number Entropy Pool</ns10:title>
<ns10:description xml:lang="en-US">For each solid-state drive on the system, run:
<html:pre> # echo 0 > /sys/block/DRIVE/queue/add_random</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
In contrast to traditional electromechanical magnetic disks, containing
spinning disks and / or movable read / write heads, the solid-state storage
devices (SSDs) do not contain moving / mechanical components. Therefore the
I/O operation completion times are much more predictable for them.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="kernel_disable_entropy_contribution_for_solid_state_drives" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First obtain the list of block devices present on system into array
#
# Used lsblk options:
# -o NAME Display only block device name
# -a Display all devices (including empty ones) in the list
# -d Don't print device holders or slaves information
# -n Suppress printing of introductory heading line in the list
SYSTEM_BLOCK_DEVICES=($(/bin/lsblk -o NAME -a -d -n))
# For each SSD block device from that list
# (device where /sys/block/DEVICE/queue/rotation == 0)
for BLOCK_DEVICE in "${SYSTEM_BLOCK_DEVICES[@]}"
do
# Verify the block device is SSD
if grep -q "0" /sys/block/${BLOCK_DEVICE}/queue/rotational
then
# If particular SSD is configured to contribute to
# random-number entropy pool, disable it
if grep -q "1" /sys/block/${BLOCK_DEVICE}/queue/add_random
then
echo "0" > /sys/block/${BLOCK_DEVICE}/queue/add_random
fi
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_disable_entropy_contribution_for_solid_state_drives:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_software">
<ns10:title xml:lang="en-US">Installing and Maintaining Software</ns10:title>
<ns10:description xml:lang="en-US">The following sections contain information on
security-relevant choices during the initial operating system
installation process and the setup of software
updates.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disk_partitioning">
<ns10:title xml:lang="en-US">Disk Partitioning</ns10:title>
<ns10:description xml:lang="en-US">To ensure separation and protection of data, there
are top-level system directories which should be placed on their
own physical partition or logical volume. The installer's default
partitioning scheme creates separate logical volumes for
<html:code>/</html:code>, <html:code>/boot</html:code>, and <html:code>swap</html:code>.
<html:ul><html:li>If starting with any of the default layouts, check the box to
"Review and modify partitioning." This allows for the easy creation
of additional logical volumes inside the volume group already
created, though it may require making <html:code>/</html:code>'s logical volume smaller to
create space. In general, using logical volumes is preferable to
using partitions because they can be more easily adjusted
later.</html:li><html:li>If creating a custom layout, create the partitions mentioned in
the previous paragraph (which the installer will require anyway),
as well as separate ones described in the following sections.</html:li></html:ul>
If a system has already been installed, and the default
partitioning scheme was used, it is possible but nontrivial to
modify it to create separate logical volumes for the directories
listed above. The Logical Volume Manager (LVM) makes this possible.
See the LVM HOWTO at <html:a href="http://tldp.org/HOWTO/LVM-HOWTO/">http://tldp.org/HOWTO/LVM-HOWTO/</html:a> for more
detailed information on LVM.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /tmp Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>/tmp</html:code> directory is a world-writable directory used
for temporary file storage. Ensure it has its own partition or
logical volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>/tmp</html:code> partition is used as temporary storage by many programs.
Placing <html:code>/tmp</html:code> in its own partition enables the setting of more
restrictive mount options, which can help protect programs which use it.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_tmp:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_tmp_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>/var</html:code> directory is used by daemons and other system
services to store frequently-changing data. Ensure that <html:code>/var</html:code> has its own partition
or logical volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring that <html:code>/var</html:code> is mounted on its own partition enables the
setting of more restrictive mount options. This helps protect
system services such as daemons or other programs which use it.
It is not uncommon for the <html:code>/var</html:code> directory to contain
world-writable directories installed by other software packages.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var/log Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
System logs are stored in the <html:code>/var/log</html:code> directory.
Ensure that it has its own partition or logical
volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Placing <html:code>/var/log</html:code> in its own partition
enables better separation between log files
and other files in <html:code>/var/</html:code>.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var_log:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_log_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var/log/audit Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
Audit logs are stored in the <html:code>/var/log/audit</html:code> directory. Ensure that it
has its own partition or logical volume at installation time, or migrate it
later using LVM. Make absolutely certain that it is large enough to store all
audit logs that will be created by the auditing daemon.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">137</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">138</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Placing <html:code>/var/log/audit</html:code> in its own partition
enables better separation between audit files
and other files, and helps ensure that
auditing cannot be halted due to the partition running out
of space.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_home" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /home Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
If user home directories will be stored locally, create a separate partition
for <html:code>/home</html:code> at installation time (or migrate it later using LVM). If
<html:code>/home</html:code> will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring that <html:code>/home</html:code> is mounted on its own partition enables the
setting of more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_home:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_home_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Encrypt Partitions</ns10:title>
<ns10:description xml:lang="en-US">
Red Hat Enterprise Linux 6 natively supports partition encryption through the
Linux Unified Key Setup-on-disk-format (LUKS) technology. The easiest way to
encrypt a partition is during installation time.
<html:br /><html:br />
For manual installations, select the <html:code>Encrypt</html:code> checkbox during
partition creation to encrypt the partition. When this
option is selected the system will prompt for a passphrase to use in
decrypting the partition. The passphrase will subsequently need to be entered manually
every time the system boots.
<html:br /><html:br />
For automated/unattended installations, it is possible to use Kickstart by adding
the <html:code>--encrypted</html:code> and <html:code>--passphrase=</html:code> options to the definition of each partition to be
encrypted. For example, the following line would encrypt the root partition:
<html:pre>part / --fstype=ext3 --size=100 --onpart=hda1 --encrypted --passphrase=<html:i>PASSPHRASE</html:i></html:pre>
Any <html:i>PASSPHRASE</html:i> is stored in the Kickstart in plaintext, and the Kickstart must then be protected accordingly.
Omitting the <html:code>--passphrase=</html:code> option from the partition definition will cause the
installer to pause and interactively ask for the passphrase during installation.
<html:br /><html:br />
Detailed information on encrypting partitions using LUKS can be found on
the Red Hat Documentation web site:<html:br />
<html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-Security_Guide-Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-Security_Guide-Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption</html:a>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1019</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1199</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1200</ns10:reference>
<ns10:rationale xml:lang="en-US">
The risk of a system's physical compromise, particularly mobile systems such as
laptops, places its data at risk of compromise. Encrypting this data mitigates
the risk of its loss if the system is lost.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-encrypt_partitions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_updating">
<ns10:title xml:lang="en-US">Updating Software</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>yum</html:code> command line tool is used to install and
update software packages. The system also provides a graphical
software update tool in the <html:b>System</html:b> menu, in the <html:b>Administration</html:b> submenu,
called <html:b>Software Update</html:b>.
<html:br /><html:br />
Red Hat Enterprise Linux systems contain an installed software catalog called
the RPM database, which records metadata of installed packages. Consistently using
<html:code>yum</html:code> or the graphical <html:b>Software Update</html:b> for all software installation
allows for insight into the current inventory of installed software on the system.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Red Hat GPG Key Installed</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the system can cryptographically verify base software
packages come from Red Hat (and to connect to the Red Hat Network to
receive them), the Red Hat GPG key must properly be installed.
To install the Red Hat GPG key, run:
<html:pre>$ sudo rhn_register</html:pre>
If the system is not connected to the Internet or an RHN Satellite,
then install the Red Hat GPG key from trusted media such as
the Red Hat installation CD-ROM or DVD. Assuming the disc is mounted
in <html:code>/media/cdrom</html:code>, use the following command as the root user to import
it into the keyring:
<html:pre>$ sudo rpm --import /media/cdrom/RPM-GPG-KEY</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">351</ns10:reference>
<ns10:rationale xml:lang="en-US">
The Red Hat GPG key is necessary to cryptographically verify packages
are from Red Hat.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_redhat_gpgkey_installed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># The two fingerprints below are retrieved from https://access.redhat.com/security/team/key
readonly REDHAT_RELEASE_2_FINGERPRINT="567E 347A D004 4ADE 55BA 8A5F 199E 2F91 FD43 1D51"
readonly REDHAT_AUXILIARY_FINGERPRINT="43A6 E49C 4A38 F4BE 9ABF 2A53 4568 9C88 2FA6 58E0"
# Location of the key we would like to import (once it's integrity verified)
readonly REDHAT_RELEASE_KEY="/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release"
RPM_GPG_DIR_PERMS=$(stat -c %a "$(dirname "$REDHAT_RELEASE_KEY")")
# Verify /etc/pki/rpm-gpg directory permissions are safe
if [ "${RPM_GPG_DIR_PERMS}" -le "755" ]
then
# If they are safe, try to obtain fingerprints from the key file
# (to ensure there won't be e.g. CRC error)
IFS=$'\n' GPG_OUT=($(gpg --with-fingerprint "${REDHAT_RELEASE_KEY}"))
GPG_RESULT=$?
# No CRC error, safe to proceed
if [ "${GPG_RESULT}" -eq "0" ]
then
for ITEM in "${GPG_OUT[@]}"
do
# Filter just hexadecimal fingerprints from gpg's output from
# processing of a key file
RESULT=$(echo ${ITEM} | sed -n "s/[[:space:]]*Key fingerprint = \(.*\)/\1/p" | tr -s '[:space:]')
# If fingerprint matches Red Hat's release 2 or auxiliary key import the key
if [[ ${RESULT} ]] && ([[ ${RESULT} = "${REDHAT_RELEASE_2_FINGERPRINT}" ]] || \
[[ ${RESULT} = "${REDHAT_AUXILIARY_FINGERPRINT}" ]])
then
rpm --import "${REDHAT_RELEASE_KEY}"
fi
done
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_redhat_gpgkey_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_redhat_gpgkey_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure gpgcheck Enabled In Main Yum Configuration</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>gpgcheck</html:code> option controls whether
RPM packages' signatures are always checked prior to installation.
To configure yum to check package signatures before installing
them, ensure the following line appears in <html:code>/etc/yum.conf</html:code> in
the <html:code>[main]</html:code> section:
<html:pre>gpgcheck=1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">663</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring the validity of packages' cryptographic signatures prior to
installation ensures the authenticity of the software and
protects against malicious tampering.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_gpgcheck_globally_activated" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/gpgcheck=.*/gpgcheck=1/g' /etc/yum.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_gpgcheck_globally_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure gpgcheck Enabled For All Yum Package Repositories</ns10:title>
<ns10:description xml:lang="en-US">To ensure signature checking is not disabled for
any repos, remove any lines from files in <html:code>/etc/yum.repos.d</html:code> of the form:
<html:pre>gpgcheck=0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">663</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring all packages' cryptographic signatures are valid prior to
installation ensures the authenticity of the software and
protects against malicious tampering.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_gpgcheck_never_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/gpgcheck=.*/gpgcheck=1/g' /etc/yum.repos.d/*
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_gpgcheck_never_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_gpgcheck_never_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Software Patches Installed</ns10:title>
<ns10:description xml:lang="en-US">If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
or a yum server, run the following command to install updates:
<html:pre>$ sudo yum update</html:pre>
If the system is not configured to use one of these sources, updates (in the form of RPM packages)
can be manually downloaded from the Red Hat Network and installed using <html:code>rpm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1227</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1233</ns10:reference>
<ns10:rationale xml:lang="en-US">
Installing software updates is a fundamental mitigation against
the exploitation of publicly-known vulnerabilities.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="security_patches_up_to_date" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">yum -y update
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="http://www.redhat.com/security/data/oval/Red_Hat_Enterprise_Linux_6.xml" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_integrity">
<ns10:title xml:lang="en-US">Software Integrity Checking</ns10:title>
<ns10:description xml:lang="en-US">
Both the AIDE (Advanced Intrusion Detection Environment)
software and the RPM package management system provide
mechanisms for verifying the integrity of installed software.
AIDE uses snapshots of file metadata (such as hashes) and compares these
to current system files in order to detect changes.
The RPM package management system can conduct integrity
checks by comparing information in its metadata database with
files installed on the system.
<html:br /><html:br />
Integrity checking cannot <html:i>prevent</html:i> intrusions,
but can detect that they have occurred. Requirements
for software integrity checking may be highly dependent on
the environment in which the system will be used. Snapshot-based
approaches such as AIDE may induce considerable overhead
in the presence of frequent software updates.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_prelink" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Prelinking</ns10:title>
<ns10:description xml:lang="en-US">
The prelinking feature changes binaries in an attempt to decrease their startup
time. In order to disable it, change or add the following line inside the file
<html:code>/etc/sysconfig/prelink</html:code>:
<html:pre>PRELINKING=no</html:pre>
Next, run the following command to return binaries to a normal, non-prelinked state:
<html:pre>$ sudo /usr/sbin/prelink -ua</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Because the prelinking feature changes binaries, it can interfere with the
operation of certain software and/or modes such as AIDE, FIPS, etc.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_prelink" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Disable prelinking altogether
#
if grep -q ^PRELINKING /etc/sysconfig/prelink
then
sed -i 's/PRELINKING.*/PRELINKING=no/g' /etc/sysconfig/prelink
else
echo -e "\n# Set PRELINKING=no per security requirements" >> /etc/sysconfig/prelink
echo "PRELINKING=no" >> /etc/sysconfig/prelink
fi
#
# Undo previous prelink changes to binaries
#
/usr/sbin/prelink -ua
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_prelink:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_aide">
<ns10:title xml:lang="en-US">Verify Integrity with AIDE</ns10:title>
<ns10:description xml:lang="en-US">AIDE conducts integrity checks by comparing information about
files with previously-gathered information. Ideally, the AIDE database is
created immediately after initial system configuration, and then again after any
software update. AIDE is highly configurable, with further configuration
information located in <html:code>/usr/share/doc/aide-<html:i>VERSION</html:i></html:code>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install AIDE</ns10:title>
<ns10:description xml:lang="en-US">
Install the AIDE package with the command:
<html:pre>$ sudo yum install aide</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:rationale xml:lang="en-US">
The AIDE package must be installed if it is to be available for integrity checking.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install aide
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure aide is installed
package:
name="{{item}}"
state=present
with_items:
- aide
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=aide
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_aide_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_aide_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_aide_build_database" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Build and Test AIDE Database</ns10:title>
<ns10:description xml:lang="en-US">Run the following command to generate a new database:
<html:pre>$ sudo /usr/sbin/aide --init</html:pre>
By default, the database will be written to the file <html:code>/var/lib/aide/aide.db.new.gz</html:code>.
Storing the database, the configuration file <html:code>/etc/aide.conf</html:code>, and the binary
<html:code>/usr/sbin/aide</html:code> (or hashes of these files), in a secure location (such as on read-only media) provides additional assurance about their integrity.
The newly-generated database can be installed as follows:
<html:pre>$ sudo cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz</html:pre>
To initiate a manual check, run the following command:
<html:pre>$ sudo /usr/sbin/aide --check</html:pre>
If this check produces any unexpected output, investigate.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">416</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1297</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">
For AIDE to be effective, an initial database of "known-good" information about files
must be captured and it should be able to be verified against the installed files.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="aide_build_database" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">/usr/sbin/aide --init
/bin/cp -p /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-aide_build_database:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-aide_build_database_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Periodic Execution of AIDE</ns10:title>
<ns10:description xml:lang="en-US">
To implement a daily execution of AIDE at 4:05am using cron, add the following line to <html:code>/etc/crontab</html:code>:
<html:pre>05 4 * * * root /usr/sbin/aide --check</html:pre>
AIDE can be executed periodically through other means; this is merely one example.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">416</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1297</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">
By default, AIDE does not install itself for periodic execution. Periodically
running AIDE is necessary to reveal unexpected changes in installed files.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="aide_periodic_cron_checking" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "05 4 * * * root /usr/sbin/aide --check" >> /etc/crontab
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-aide_periodic_cron_checking:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_rpm_verification">
<ns10:title xml:lang="en-US">Verify Integrity with RPM</ns10:title>
<ns10:description xml:lang="en-US">The RPM package management system includes the ability
to verify the integrity of installed packages by comparing the
installed files with information about the files taken from the
package metadata stored in the RPM database. Although an attacker
could corrupt the RPM database (analogous to attacking the AIDE
database as described above), this check can still reveal
modification of important files. To list which files on the system differ from what is expected by the RPM database:
<html:pre>$ rpm -qVa</html:pre>
See the man page for <html:code>rpm</html:code> to see a complete explanation of each column.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify and Correct File Permissions with RPM</ns10:title>
<ns10:description xml:lang="en-US">
The RPM package management system can check file access
permissions of installed software packages, including many that are
important to system security.
After locating a file with incorrect permissions, run the following command to determine which package owns it:
<html:pre>$ rpm -qf <html:i>FILENAME</html:i></html:pre>
Next, run the following command to reset its permissions to
the correct values:
<html:pre>$ sudo rpm --setperms <html:i>PACKAGENAME</html:i></html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">
<html:b>Note: Due to a bug in the <html:code>gdm</html:code> package,
the RPM verify command may continue to fail even after file permissions have
been correctly set on <html:code>/var/log/gdm</html:code>. This is being tracked in Red Hat
Bugzilla #1277603.</html:b>
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1493</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1494</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1495</ns10:reference>
<ns10:rationale xml:lang="en-US">
Permissions on system binaries and configuration files that are too generous
could allow an unauthorized user to gain privileges that they should not have.
The permissions set by the vendor should be maintained. Any deviations from
this baseline should be investigated.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="rpm_verify_permissions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Declare array to hold list of RPM packages we need to correct permissions for
declare -a SETPERMS_RPM_LIST
# Create a list of files on the system having permissions different from what
# is expected by the RPM database
FILES_WITH_INCORRECT_PERMS=($(rpm -Va --nofiledigest | grep '^.M'))
# For each file path from that list:
# * Determine the RPM package the file path is shipped by,
# * Include it into SETPERMS_RPM_LIST array
for FILE_PATH in "${FILES_WITH_INCORRECT_PERMS[@]}"
do
RPM_PACKAGE=$(rpm -qf "$FILE_PATH")
SETPERMS_RPM_LIST=("${SETPERMS_RPM_LIST[@]}" "$RPM_PACKAGE")
done
# Remove duplicate mention of same RPM in $SETPERMS_RPM_LIST (if any)
SETPERMS_RPM_LIST=( $(echo "${SETPERMS_RPM_LIST[@]}" | sort -n | uniq) )
# For each of the RPM packages left in the list -- reset its permissions to the
# correct values
for RPM_PACKAGE in "${SETPERMS_RPM_LIST[@]}"
do
rpm --setperms "${RPM_PACKAGE}"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rpm_verify_permissions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rpm_verify_permissions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify File Hashes with RPM</ns10:title>
<ns10:description xml:lang="en-US">The RPM package management system can check the hashes of
installed software packages, including many that are important to system
security. Run the following command to list which files on the system
have hashes that differ from what is expected by the RPM database:
<html:pre>$ rpm -Va | grep '^..5'</html:pre>
A "c" in the second column indicates that a file is a configuration file, which
may appropriately be expected to change. If the file was not expected to
change, investigate the cause of the change using audit logs or other means.
The package can then be reinstalled to restore the file.
Run the following command to determine which package owns the file:
<html:pre>$ rpm -qf <html:i>FILENAME</html:i></html:pre>
The package can be reinstalled from a yum repository using the command:
<html:pre>$ sudo yum reinstall <html:i>PACKAGENAME</html:i></html:pre>
Alternatively, the package can be reinstalled from trusted media using the command:
<html:pre>$ sudo rpm -Uvh <html:i>PACKAGENAME</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1496</ns10:reference>
<ns10:rationale xml:lang="en-US">
The hashes of important files like system executables should match the
information given by the RPM database. Executables with erroneous hashes could
be a sign of nefarious activity on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rpm_verify_hashes:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rpm_verify_hashes_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_additional_security_software">
<ns10:title xml:lang="en-US">Additional Security Software</ns10:title>
<ns10:description xml:lang="en-US">
Additional security software that is not provided or supported
by Red Hat can be installed to provide complementary or duplicative
security capabilities to those provided by the base platform. Add-on
software may not be appropriate for some specialized systems.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_hids" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install Intrusion Detection Software</ns10:title>
<ns10:description xml:lang="en-US">
The base Red Hat platform already includes a sophisticated auditing system that
can detect intruder activity, as well as SELinux, which provides host-based
intrusion prevention capabilities by confining privileged programs and user
sessions which may become compromised.<html:br />
In DoD environments, supplemental intrusion detection tools, such as, the McAfee
Host-based Security System, are available to integrate with existing infrastructure.
When these supplemental tools interfere with the proper functioning of SELinux, SELinux
takes precedence.
<html:br />
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:rationale xml:lang="en-US">
Host-based intrusion detection tools provide a system-level defense when an
intruder gains access to a system or network.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-install_hids_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_antivirus" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install Virus Scanning Software</ns10:title>
<ns10:description xml:lang="en-US">
Install virus scanning software, which uses signatures to search for the
presence of viruses on the filesystem.
The McAfee VirusScan Enterprise for Linux virus scanning tool is provided for DoD systems.
Ensure virus definition files are no older than 7 days, or their last release.
Configure the virus scanning software to perform scans dynamically on all
accessed files. If this is not possible, configure the
system to scan all altered files on the system on a daily
basis. If the system processes inbound SMTP mail, configure the virus scanner
to scan all received mail.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1239</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1668</ns10:reference>
<ns10:rationale xml:lang="en-US">
Virus scanning software can be used to detect if a system has been compromised by
computer viruses, as well as to limit their spread to other systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-install_antivirus:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-install_antivirus_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_fips">
<ns10:title xml:lang="en-US">Federal Information Processing Standard (FIPS)</ns10:title>
<ns10:description xml:lang="en-US">
The Federal Information Processing Standard (FIPS) is a computer security standard which
is developed by the U.S. Government and industry working groups to validate the quality
of cryptographic modules. The FIPS standard provides four security levels to ensure
adequate coverage of different industries, implementation of cryptographic modules, and
organizational sizes and requirements.
<html:br /><html:br />
FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules
utilize authentication that meets industry and government requirements. For government systems, this allows
Security Levels 1, 2, 3, or 4 for use on Red Hat Enterprise Linux.
<html:br /><html:br />
See <html:b><html:a href="http://csrc.nist.gov/publications/PubsFIPS.html">http://csrc.nist.gov/publications/PubsFIPS.html</html:a></html:b> for more information.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dracut-fips_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the dracut-fips Package</ns10:title>
<ns10:description xml:lang="en-US">
To enable FIPS, the system requires that the <html:code>dracut-fips</html:code>
package be installed.
The <html:code>dracut-fips</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install dracut-fips</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dracut-fips_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dracut-fips_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_grub_enable_fips_mode" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable FIPS Mode in GRUB</ns10:title>
<ns10:description xml:lang="en-US">
To ensure FIPS mode is enabled, rebuild <html:code>initramfs</html:code> by running the following command:
<html:pre>dracut -f</html:pre>
After the <html:code>dracut</html:code> command has been run, add the argument <html:code>fips=1</html:code> to the default
GRUB kernel line for the Linux operating system in
<html:code>/etc/grub.conf</html:code>, in the manner below:
<html:pre>kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet fips=1</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Running <html:pre>dracut -f</html:pre> will overwrite the existing initramfs file.</ns10:warning>
<ns10:warning category="general" xml:lang="en-US">The system needs to be rebooted for these changes to take effect.</ns10:warning>
<ns10:warning category="general" xml:lang="en-US">The ability to enable FIPS does not denote FIPS compliancy or certification.
Red Hat, Inc. and Red Hat Enterprise Linux are respectively FIPS certified and compliant. Community
projects such as CentOS, Scientific Linux, etc. do not necessarily meet FIPS certification and compliancy.
Therefore, non-certified vendors and/or projects do not meet this requirement even if technically feasible.
<html:br /><html:br />
See <html:b><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm</html:a></html:b> for a list of FIPS certified
vendors.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-grub_enable_fips_mode:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-grub_enable_fips_mode_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_certified-vendor">
<ns10:title xml:lang="en-US">Operating System Vendor Support and Certification</ns10:title>
<ns10:description xml:lang="en-US">
The assurance of a vendor to provide operating system support and maintenance
for their product is an important criterion to ensure product stability and
security over the life of the product. A certified product that follows the
necessary standards and government certification requirements guarantees that
known software vulnerabilities will be remediated, and proper guidance for
protecting and securing the operating system will be given.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_installed_OS_is_certified" selected="false" severity="high">
<ns10:title xml:lang="en-US">The Installed Operating System Is Vendor Supported and Certified</ns10:title>
<ns10:description xml:lang="en-US">
The installed operating system must be maintained and certified by a vendor.
Red Hat Enterprise Linux is supported by Red Hat, Inc. As the Red Hat Enterprise
Linux vendor, Red Hat, Inc. is responsible for providing security patches as well
as meeting and maintaining goverment certifications and standards.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
An operating system is considered "supported" if the vendor continues to provide
security patches for the product as well as maintain government certification requirements.
With an unsupported release, it will not be possible to resolve security issue discovered in
the system software as well as meet government certifications.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-installed_OS_is_certified:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome">
<ns10:title xml:lang="en-US">GNOME Desktop Environment</ns10:title>
<ns10:description xml:lang="en-US">
GNOME is a graphical desktop environment bundled with many Linux distributions that
allow users to easily interact with the operating system graphically rather than
textually. The GNOME Graphical Display Manager (GDM) provides login, logout, and user
switching contexts as well as display server management.
<html:br /><html:br />
GNOME is developed by the GNOME Project and is considered the default
Red Hat Graphical environment.
<html:br /><html:br />
For more information on GNOME and the GNOME Project, see <html:b><html:a href="https://www.gnome.org">https://www.gnome.org</html:a></html:b>
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_login_screen">
<ns10:title xml:lang="en-US">Configure GNOME Login Screen</ns10:title>
<ns10:description xml:lang="en-US">In the default GNOME desktop, the login is displayed after system boot
and can display user accounts, allow users to reboot the system, and allow users to
login automatically and/or with a guest account. The login screen should be configured
to prevent such behavior.
<html:br /><html:br />
For more information about enforcing preferences in the GNOME environment using the GConf
configuration system, see <html:b><html:a href="http://projects.gnome.org/gconf">http://projects.gnome.org/gconf</html:a></html:b> and
the man page <html:code>gconftool-2(1)</html:code>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_automatic_login" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable GDM Automatic Login</ns10:title>
<ns10:description xml:lang="en-US">The GNOME Display Manager (GDM) can allow users to automatically login without
user interaction or credentials. User should always be required to authenticate themselves
to the system that they are authorized to use. To disable user ability to automatically
login to the system, set the <html:code>AutomaticLoginEnable</html:code> to <html:code>false</html:code> in the
<html:code>[daemon]</html:code> section in <html:code>/etc/gdm/custom.conf</html:code>. For example:
<html:pre>[daemon]
AutomaticLoginEnable=false</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failure to restrict system access to authenticated users negatively impacts operating
system security.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gnome_gdm_disable_automatic_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_guest_login" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable GDM Guest Login</ns10:title>
<ns10:description xml:lang="en-US">The GNOME Display Manager (GDM) can allow users to login without credentials
which can be useful for public kiosk scenarios. Allowing users to login without credentials
or "guest" account access has inherent security risks and should be disabled. To do disable
timed logins or guest account access, set the <html:code>TimedLoginEnable</html:code> to <html:code>false</html:code> in
the <html:code>[daemon]</html:code> section in <html:code>/etc/gdm/custom.conf</html:code>. For example:
<html:pre>[daemon]
TimedLoginEnable=false</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failure to restrict system access to authenticated users negatively impacts operating
system security.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gnome_gdm_disable_guest_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gnome_gdm_disable_guest_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_disable_user_list" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the User List</ns10:title>
<ns10:description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that displays
all known users. This functionality should be disabled.
<html:br /><html:br />
Run the following command to disable the user list:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/disable_user_list true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-23</ns10:reference>
<ns10:rationale xml:lang="en-US">Leaving the user list enabled is a security risk since it allows anyone
with physical access to the system to quickly enumerate known user accounts
without logging in.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_disable_user_list" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Disable displaying of all known system users in the GNOME Display Manager's
# login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gdm/simple-greeter/disable_user_list true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_disable_user_list:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_restart_shutdown" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable the GNOME Login Restart and Shutdown Buttons</ns10:title>
<ns10:description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that allows
any user, known or unknown, the ability shutdown or restart
the system. This functionality should be disabled by running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/disable_restart_buttons true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
A user who is at the console can reboot the system at the login screen. If restart or shutdown buttons
are pressed at the login screen, this can create the risk of short-term loss of availability of systems
due to reboot.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_restart_shutdown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_screen_locking">
<ns10:title xml:lang="en-US">Configure GNOME Screen Locking</ns10:title>
<ns10:description xml:lang="en-US">In the default GNOME desktop, the screen can be locked
by choosing <html:b>Lock Screen</html:b> from the <html:b>System</html:b> menu.
<html:br /><html:br />
The <html:code>gconftool-2</html:code> program can be used to enforce mandatory
screen locking settings for the default GNOME environment.
The
following sections detail commands to enforce idle activation of the screensaver,
screen locking, a blank-screen screensaver, and an idle
activation time.
<html:br /><html:br />
Because users should be trained to lock the screen when they
step away from the computer, the automatic locking feature is only
meant as a backup. The <html:b>Lock Screen</html:b> icon from the <html:b>System</html:b> menu can
also be dragged to the taskbar in order to facilitate even more
convenient screen-locking.
<html:br /><html:br />
The root account cannot be screen-locked, but this should
have no practical effect as the root account should <html:i>never</html:i> be used
to log into an X Windows environment, and should only be used to
for direct login via console in emergency circumstances.
<html:br /><html:br />
For more information about configuring GNOME screensaver, see
<html:b><html:a href="http://live.gnome.org/GnomeScreensaver">http://live.gnome.org/GnomeScreensaver</html:a></html:b>. For more information about
enforcing preferences in the GNOME environment using the GConf
configuration system, see <html:b><html:a href="http://projects.gnome.org/gconf">http://projects.gnome.org/gconf</html:a></html:b> and
the man page <html:code>gconftool-2(1)</html:code>.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">Inactivity timeout</ns10:title>
<ns10:description xml:lang="en-US">Choose allowed duration of inactive SSH connections, shells, and X sessions</ns10:description>
<ns10:value>900</ns10:value>
<ns10:value selector="5_minutes">300</ns10:value>
<ns10:value selector="10_minutes">600</ns10:value>
<ns10:value selector="15_minutes">900</ns10:value>
<ns10:value selector="30_minutes">1800</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Inactivity Timeout</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the idle time-out value for
inactivity in the GNOME desktop to <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /> minutes:
<html:pre>$ sudo gconftool-2 \
--direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type int \
--set /desktop/gnome/session/idle_delay <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the idle delay controls when the
screensaver will start, and can be combined with
screen locking to prevent access from passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_idle_delay" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
inactivity_timeout_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" />"
# Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the idle time-out value for inactivity in the GNOME desktop to meet the
# requirement
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type int \
--set /desktop/gnome/session/idle_delay ${inactivity_timeout_value}
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_idle_delay:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">GNOME Desktop Screensaver Mandatory Use</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate the screensaver
in the GNOME desktop after a period of inactivity:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gnome-screensaver/idle_activation_enabled true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Enabling idle activation of the screensaver ensures the screensaver will
be activated after the idle delay. Applications requiring continuous,
real-time screen display (such as network management products) require the
login session does not have administrator rights and the display station is located in a
controlled-access area.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_idle_activation_enabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver activation in the GNOME desktop after a period of inactivity
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gnome-screensaver/idle_activation_enabled true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_idle_activation_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Screen Lock Activation After Idle Period</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gnome-screensaver/lock_enabled true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Enabling the activation of the screen lock after an idle period
ensures password entry will be required in order to
access the system, preventing access by passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_lock_enabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver locking activation in the GNOME desktop when the
# screensaver is activated
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gnome-screensaver/lock_enabled true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_lock_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="false" severity="low">
<ns10:title xml:lang="en-US">Implement Blank Screensaver</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the screensaver mode
in the GNOME desktop to a blank screen:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gnome-screensaver/mode blank-only</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">60</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the screensaver mode to blank-only conceals the
contents of the display from passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_mode_blank" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver mode in the GNOME desktop to a blank screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type string \
--set /apps/gnome-screensaver/mode blank-only
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_mode_blank:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_time" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the maximum allowed period of inactivity for an
inactive user in the GNOME desktop to <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /> minutes:
<html:pre>$ sudo gconftool-2 \
--direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type int \
--set /desktop/gnome/session/max_idle_time <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_max_idle_time:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity Action</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set force logout an inactive user when the
maximum allowed inactivity period has expired:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /desktop/gnome/session/max_idle_action "forced-logout"</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_max_idle_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_system_settings">
<ns10:title xml:lang="en-US">GNOME System Settings</ns10:title>
<ns10:description xml:lang="en-US">
GNOME provides configuration and functionality to a graphical desktop environment
that changes grahical configurations or allow a user to perform
actions that users normally would not be able to do in non-graphical mode such as
remote access configuration, power policies, Geo-location, etc.
Configuring such settings in GNOME will prevent accidential graphical configuration
changes by users from taking place.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_ctrlaltdel_reboot" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> will reboot the system if the <html:code>Ctrl-Alt-Del</html:code>
key sequence is pressed.
<html:br />
To configure the system to ignore the <html:code>Ctrl-Alt-Del</html:code> key sequence from the
Graphical User Interface (GUI) instead of rebooting the system, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gnome_settings_daemon/keybindings/power ""</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_ctrlaltdel_reboot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_temperature" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the GNOME Clock Temperature Feature</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/panel/applets/clock/prefs/show_temperature false</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Disabling the temperature feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_clock_temperature:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_weather" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the GNOME Clock Weather Feature</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/panel/applets/clock/prefs/show_weather false</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Disabling the weather feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_clock_weather:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_network_settings">
<ns10:title xml:lang="en-US">GNOME Network Settings</ns10:title>
<ns10:description xml:lang="en-US">
GNOME network settings that apply to the graphical interface.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_create" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Connection Creation in GNOME</ns10:title>
<ns10:description xml:lang="en-US"><html:code>GNOME</html:code> allows users to create ad-hoc wireless connections through the
<html:code>NetworkManager</html:code> applet. Wireless connections should be disabled by
running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-wifi-create true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_create:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_disconnect" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Disconnect Notification in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> disables WIFI notification when disconnecting from a
wireless network. This should be permanently set so that users do not connect to
a wireless network when the system finds one. While useful for mobile devices,
this setting should be disabled for all other systems. To configure the system
to disable the WIFI notication, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-disconnected-notifications true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_disconnect:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_notification" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Connection Notification in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> disables WIFI notification when connecting to a wireless
network. This should be permanently set so that users do not connect to a wireless
network when the system finds one. While useful for mobile devices, this setting
should be disabled for all other systems. To configure the system to disable the
WIFI notication, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-connected-notifications true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_notification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_remote_access_settings">
<ns10:title xml:lang="en-US">GNOME Remote Access Settings</ns10:title>
<ns10:description xml:lang="en-US">
GNOME remote access settings that apply to the graphical interface.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_gnome_media_settings">
<ns10:title xml:lang="en-US">GNOME Media Settings</ns10:title>
<ns10:description xml:lang="en-US">
GNOME media settings that apply to the graphical interface.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable GNOME Automounting</ns10:title>
<ns10:description xml:lang="en-US">The system's default desktop environment, GNOME, will mount
devices and removable media (such as DVDs, CDs and USB flash drives) whenever
they are inserted into the system. Disable automount and autorun within GNOME
by running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nautilus/preferences/media_automount false
$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nautilus/preferences/media_autorun_never true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling automatic mounting in GNOME can prevent
the introduction of malware via removable media.
It will, however, also prevent desktop users from legitimate use
of removable media.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_automount:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable All GNOME Thumbnailers</ns10:title>
<ns10:description xml:lang="en-US">The system's default desktop environment, GNOME, uses
a number of different thumbnailer programs to generate thumbnails
for any new or modified content in an opened folder. The following
command can disable the execution of these thumbnail applications:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /desktop/gnome/thumbnailers/disable_all true</html:pre>
This effectively prevents an attacker from gaining access to a
system through a flaw in GNOME's Nautilus thumbnail creators.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">An attacker with knowledge of a flaw in a GNOME3 thumbnailer application could craft a malicious
file to exploit this flaw. Assuming the attacker could place the malicious file on the local filesystem
(via a web upload for example) and assuming a user browses the same location using Nautilus, the
malicious file would exploit the thumbnailer with the potential for malicious code execution. It
is best to disable these thumbnailer applications unless they are explicitly required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_thumbnailers:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_permissions">
<ns10:title xml:lang="en-US">File Permissions and Masks</ns10:title>
<ns10:description xml:lang="en-US">Traditional Unix security relies heavily on file and
directory permissions to prevent unauthorized users from reading or
modifying files to which they should not have access.
<html:br /><html:br />
Several of the commands in this section search filesystems
for files or directories with certain characteristics, and are
intended to be run on every local partition on a given system.
When the variable <html:i>PART</html:i> appears in one of the commands below,
it means that the command is intended to be run repeatedly, with the
name of each local partition substituted for <html:i>PART</html:i> in turn.
<html:br /><html:br />
The following command prints a list of all xfs partitions on the local
system, which is the default filesystem for Red Hat Enterprise Linux
7 installations:
<html:pre>$ mount -t xfs | awk '{print $3}'</html:pre>
For any systems that use a different
local filesystem type, modify this command as appropriate.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_partitions">
<ns10:title xml:lang="en-US">Restrict Partition Mount Options</ns10:title>
<ns10:description xml:lang="en-US">System partitions can be mounted with certain options
that limit what files on those partitions can do. These options
are set in the <html:code>/etc/fstab</html:code> configuration file, and can be
used to make certain types of malicious behavior more difficult.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_removable_partition" operator="equals" type="string">
<ns10:title xml:lang="en-US">Removable Partition</ns10:title>
<ns10:description xml:lang="en-US">This value is used by the checks mount_option_nodev_removable_partitions, mount_option_nodev_removable_partitions,
and mount_option_nodev_removable_partitions to ensure that the correct mount options are set on partitions mounted from
removable media such as CD-ROMs, USB keys, and floppy drives. This value should be modified to reflect any removable
partitions that are required on the local system.</ns10:description>
<ns10:value selector="dev_cdrom">/dev/cdrom</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to Non-Root Local Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices.
Legitimate character and block devices should exist only in
the <html:code>/dev</html:code> directory on the root partition or within chroot
jails built for system services.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any non-root local partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices. The only legitimate location
for device files is the <html:code>/dev</html:code> directory located on the root partition.
The only exception to this is chroot jails, for which it is not advised
to set <html:code>nodev</html:code> on these filesystems.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_nodev_nonroot_local_partitions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# NOTE: Run-time reconfiguration of partitions' mount options is not possible.
# After performing this remediation be sure to also subsequently reboot the
# system as soon as possible for the remediation to take the effect!
# Shortened ID for frequently used character class
SP="[:space:]"
# Load /etc/fstab's content with LABEL= and UUID= tags expanded to real
# device names into FSTAB_REAL_DEVICES array splitting items by newline
IFS=$'\n' FSTAB_REAL_DEVICES=($(findmnt --fstab --evaluate --noheadings))
for line in ${FSTAB_REAL_DEVICES[@]}
do
# For each line:
# * squeeze multiple space characters into one,
# * split line content info four columns (target, source, fstype, and
# mount options) by space delimiter
IFS=$' ' read TARGET SOURCE FSTYPE MOUNT_OPTIONS <<< "$(echo $line | tr -s ' ')"
# Filter the targets according to the following criteria:
# * don't include record for root partition,
# * include the target only if it has the form of '/word.*' (not to include
# special entries like e.g swap),
# * include the target only if its source has the form of '/dev.*'
# (to process only local partitions)
if [[ ! $TARGET =~ ^\/$ ]] && # Don't include root partition
[[ $TARGET =~ ^\/[A-Za-z0-9_] ]] && # Include if target =~ '/word.*'
[[ $SOURCE =~ ^\/dev ]] # Include if source =~ '/dev.*'
then
# Check the mount options column if it doesn't contain 'nodev' keyword yet
if ! grep -q "nodev" <<< "$MOUNT_OPTIONS"
then
# Check if current mount options is empty string ('') meaning
# particular /etc/fstab row contain just 'defaults' keyword
if [[ ${#MOUNT_OPTIONS} == "0" ]]
then
# If so, add 'defaults' back and append 'nodev' keyword
MOUNT_OPTIONS="defaults,nodev"
else
# Otherwise append just 'nodev' keyword
MOUNT_OPTIONS="$MOUNT_OPTIONS,nodev"
fi
# Escape possible slash ('/') characters in target for use as sed
# expression below
TARGET_ESCAPED=${TARGET//$'/'/$'\/'}
# This target doesn't contain 'nodev' in mount options yet (and meets
# the above filtering criteria). Therefore obtain particular /etc/fstab's
# row into FSTAB_TARGET_ROW variable separating the mount options field with
# hash '#' character
FSTAB_TARGET_ROW=$(sed -n "s/\(.*$TARGET_ESCAPED[$SP]\+$FSTYPE[$SP]\+\)\([^$SP]\+\)/\1#\2#/p" /etc/fstab)
# Split the retrieved value by the hash '#' delimiter to get the
# row's head & tail (i.e. columns other than mount options) which won't
# get modified
IFS=$'#' read TARGET_HEAD TARGET_OPTS TARGET_TAIL <<< "$FSTAB_TARGET_ROW"
# Replace old mount options for particular /etc/fstab's row (for this target
# and fstype) with new mount options
sed -i "s#${TARGET_HEAD}\(.*\)${TARGET_TAIL}#${TARGET_HEAD}${MOUNT_OPTIONS}${TARGET_TAIL}#" /etc/fstab
fi
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_nonroot_local_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices.
Legitimate character and block devices should exist only in
the <html:code>/dev</html:code> directory on the root partition or within chroot
jails built for system services.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. An exception to this is chroot jails, and it is
not advised to set <html:code>nodev</html:code> on partitions which contain their root
filesystems.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_removable_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option prevents the direct
execution of binaries on the mounted filesystem.
Preventing the direct execution of binaries from removable media (such as a USB
key) provides a defense against malicious software that may be present on such
untrusted media.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">87</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from removable media such as USB keys exposes
the system to potential compromise.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_noexec_removable_partitions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_noexec_removable_partitions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option prevents set-user-identifier (SUID)
and set-group-identifier (SGID) permissions from taking effect. These permissions
allow users to execute binaries with the same permissions as the owner and group
of the file respectively. Users should not be allowed to introduce SUID and SGID
files into the system via partitions mounted from removeable media.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Allowing
users to introduce SUID or SGID binaries from partitions mounted off of
removable media would allow them to introduce their own highly-privileged programs.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nosuid_removable_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>nodev</html:code> mount option can be used to prevent device files from
being created in <html:code>/tmp</html:code>.
Legitimate character and block devices should not exist
within temporary directories like <html:code>/tmp</html:code>.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. The only exception to this is chroot jails.</ns10:rationale>
<ns10:fix complexity="low" disruption="high" id="mount_option_tmp_nodev" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
part /tmp -mountoptions="nodev"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_nodev:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option can be used to prevent binaries
from being executed out of <html:code>/tmp</html:code>.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from world-writable directories
such as <html:code>/tmp</html:code> should never be necessary in normal operation and
can expose the system to potential compromise.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_noexec:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option can be used to prevent
execution of setuid programs in <html:code>/tmp</html:code>. The SUID and SGID permissions
should not be required in these world-writable directories.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from temporary storage partitions.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_nosuid:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option can be used to prevent creation
of device files in <html:code>/dev/shm</html:code>.
Legitimate character and block devices should not exist
within temporary directories like <html:code>/dev/shm</html:code>.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. The only exception to this is chroot jails.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_nodev" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'dev' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)dev'
if [ $? -eq 0 ]
then
# 'dev' option found, replace with 'nodev'
DEV_SHM_OPTS=${DEV_SHM_OPTS//dev/nodev}
fi
# at least one 'nodev' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'nodev'
if [ $? -eq 0 ]
then
# 'nodev' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,nodev"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_nodev:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option can be used to prevent binaries
from being executed out of <html:code>/dev/shm</html:code>.
It can be dangerous to allow the execution of binaries
from world-writable temporary storage directories such as <html:code>/dev/shm</html:code>.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from world-writable directories
such as <html:code>/dev/shm</html:code> can expose the system to potential compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_noexec" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'exec' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)exec'
if [ $? -eq 0 ]
then
# 'exec' option found, replace with 'noexec'
DEV_SHM_OPTS=${DEV_SHM_OPTS//exec/noexec}
fi
# at least one 'noexec' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'noexec'
if [ $? -eq 0 ]
then
# 'noexec' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,noexec"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_noexec:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option can be used to prevent execution
of setuid programs in <html:code>/dev/shm</html:code>. The SUID and SGID permissions should not
be required in these world-writable directories.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from temporary storage partitions.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_nosuid" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'suid' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)suid'
if [ $? -eq 0 ]
then
# 'suid' option found, replace with 'nosuid'
DEV_SHM_OPTS=${DEV_SHM_OPTS//suid/nosuid}
fi
# at least one 'nosuid' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'nosuid'
if [ $? -eq 0 ]
then
# 'nosuid' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,nosuid"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_nosuid:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="false" severity="low">
<ns10:title xml:lang="en-US">Bind Mount /var/tmp To /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>/var/tmp</html:code> directory is a world-writable directory.
Bind-mount it to <html:code>/tmp</html:code> in order to consolidate temporary storage into
one location protected by the same techniques as <html:code>/tmp</html:code>. To do so, edit
<html:code>/etc/fstab</html:code> and add the following line:
<html:pre>/tmp /var/tmp none rw,nodev,noexec,nosuid,bind 0 0</html:pre>
See the <html:code>mount(8)</html:code> man page for further explanation of bind mounting.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Having multiple locations for temporary storage is not required. Unless absolutely
necessary to meet requirements, the storage location <html:code>/var/tmp</html:code> should be bind mounted to
<html:code>/tmp</html:code> and thus share the same protections.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_var_tmp_bind" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Delete particular /etc/fstab's row if /var/tmp is already configured to
# represent a mount point (for some device or filesystem other than /tmp)
if grep -q -P '.*\/var\/tmp.*' /etc/fstab
then
sed -i '/.*\/var\/tmp.*/d' /etc/fstab
fi
# Bind-mount /var/tmp to /tmp via /etc/fstab (preserving the /etc/fstab form)
printf "%-24s%-24s%-8s%-32s%-3s\n" "/tmp" "/var/tmp" "none" "rw,nodev,noexec,nosuid,bind" "0 0" >> /etc/fstab
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_var_tmp_bind:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_mounting">
<ns10:title xml:lang="en-US">Restrict Dynamic Mounting and Unmounting of
Filesystems</ns10:title>
<ns10:description xml:lang="en-US">Linux includes a number of facilities for the automated addition
and removal of filesystems on a running system. These facilities may be
necessary in many environments, but this capability also carries some risk -- whether direct
risk from allowing users to introduce arbitrary filesystems,
or risk that software flaws in the automated mount facility itself could
allow an attacker to compromise the system.
<html:br /><html:br />
This command can be used to list the types of filesystems that are
available to the currently executing kernel:
<html:pre>$ find /lib/modules/`uname -r`/kernel/fs -type f -name '*.ko'</html:pre>
If these filesystems are not required then they can be explicitly disabled
in a configuratio file in <html:code>/etc/modprobe.d</html:code>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Modprobe Loading of USB Storage Driver</ns10:title>
<ns10:description xml:lang="en-US">
To prevent USB storage devices from being used, configure the kernel module loading system
to prevent automatic loading of the USB storage driver.
To configure the system to prevent the <html:code>usb-storage</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install usb-storage /bin/true</html:pre>
This will prevent the <html:code>modprobe</html:code> program from loading the <html:code>usb-storage</html:code>
module, but will not prevent an administrator (or another program) from using the
<html:code>insmod</html:code> program to load the module manually.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">USB storage devices such as thumb drives can be used to introduce
malicious software.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_usb-storage_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install usb-storage /bin/true" > /etc/modprobe.d/usb-storage.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_usb-storage_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'usb-storage' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- usb-storage
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_usb-storage_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_usb-storage_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Kernel Support for USB via Bootloader Configuration</ns10:title>
<ns10:description xml:lang="en-US">
All USB support can be disabled by adding the <html:code>nousb</html:code>
argument to the kernel's boot loader configuration. To do so,
append "nousb" to the kernel line in <html:code>/etc/grub.conf</html:code> as shown:
<html:pre>kernel /vmlinuz-<html:i>VERSION</html:i> ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet nousb</html:pre>
<html:i><html:b>WARNING:</html:b> Disabling all kernel support for USB will cause problems for
systems with USB-based keyboards, mice, or printers. This configuration is
infeasible for systems which require USB devices, which is common.</html:i></ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the USB subsystem within the Linux kernel at system boot will
protect against potentially malicious USB devices, although it is only practical
in specialized systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_nousb_argument:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_disable_usb_boot" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Booting from USB Devices in Boot Firmware</ns10:title>
<ns10:description xml:lang="en-US">Configure the system boot firmware (historically called BIOS on PC
systems) to disallow booting from USB drives.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:rationale xml:lang="en-US">Booting a system from a USB device would allow an attacker to
circumvent any security measures provided by the operating system. Attackers
could mount partitions and modify the configuration of the OS.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_assign_password" selected="false" severity="low">
<ns10:title xml:lang="en-US">Assign Password to Prevent Changes to Boot Firmware Configuration</ns10:title>
<ns10:description xml:lang="en-US">Assign a password to the system boot firmware (historically called BIOS on PC
systems) to require a password for any configuration changes.
</ns10:description>
<ns10:rationale xml:lang="en-US">Assigning a password to the system boot firmware prevents anyone
with physical access from configuring the system to boot
from local media and circumvent the operating system's access controls.
For systems in physically secure locations, such as
a data center or Sensitive Compartmented Information Facility (SCIF), this risk must be weighed
against the risk of administrative personnel being unable to conduct recovery operations in
a timely fashion.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable the Automounter</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>autofs</html:code> daemon mounts and unmounts filesystems, such as user
home directories shared via NFS, on demand. In addition, autofs can be used to handle
removable media, and the default configuration provides the cdrom device as <html:code>/misc/cd</html:code>.
However, this method of providing access to removable media is not common, so autofs
can almost always be disabled if NFS is not in use. Even if NFS is required, it may be
possible to configure filesystem mounts statically by editing <html:code>/etc/fstab</html:code>
rather than relying on the automounter.
<html:br /><html:br />
The <html:code>autofs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig autofs off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the automounter permits the administrator to
statically control filesystem mounting through <html:code>/etc/fstab</html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_autofs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable autofs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_autofs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service autofs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- autofs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_autofs_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of cramfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>cramfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install cramfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_cramfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install cramfs /bin/true" > /etc/modprobe.d/cramfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_cramfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'cramfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- cramfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_cramfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of freevxfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>freevxfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install freevxfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_freevxfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install freevxfs /bin/true" > /etc/modprobe.d/freevxfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_freevxfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'freevxfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- freevxfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_freevxfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of jffs2</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>jffs2</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install jffs2 /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_jffs2_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install jffs2 /bin/true" > /etc/modprobe.d/jffs2.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_jffs2_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'jffs2' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- jffs2
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_jffs2_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of hfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>hfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install hfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install hfs /bin/true" > /etc/modprobe.d/hfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'hfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- hfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_hfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of hfsplus</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>hfsplus</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install hfsplus /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfsplus_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install hfsplus /bin/true" > /etc/modprobe.d/hfsplus.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfsplus_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'hfsplus' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- hfsplus
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_hfsplus_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of squashfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>squashfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install squashfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_squashfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install squashfs /bin/true" > /etc/modprobe.d/squashfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_squashfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'squashfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- squashfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_squashfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of udf</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>udf</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install udf /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_udf_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install udf /bin/true" > /etc/modprobe.d/udf.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_udf_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'udf' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- udf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_udf_disabled:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_files">
<ns10:title xml:lang="en-US">Verify Permissions on Important Files and
Directories</ns10:title>
<ns10:description xml:lang="en-US">Permissions for many files on a system must be set
restrictively to ensure sensitive information is properly protected.
This section discusses important
permission restrictions which can be verified
to ensure that no harmful discrepancies have
arisen.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_permissions_important_account_files">
<ns10:title xml:lang="en-US">Verify Permissions on Files with Local Account Information and Credentials</ns10:title>
<ns10:description xml:lang="en-US">The default restrictive permissions for files which act as
important security databases such as <html:code>passwd</html:code>, <html:code>shadow</html:code>,
<html:code>group</html:code>, and <html:code>gshadow</html:code> files must be maintained. Many utilities
need read access to the <html:code>passwd</html:code> file in order to function properly, but
read access to the <html:code>shadow</html:code> file allows malicious attacks against system
passwords, and should never be enabled.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/shadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="userowner_shadow_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-userowner_shadow_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-userowner_shadow_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/shadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file stores password hashes. Protection of this file is
critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="groupowner_shadow_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-groupowner_shadow_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-groupowner_shadow_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0000 /etc/shadow</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_shadow" reboot="false" strategy="configure" system="urn:xccdf:fix:script:sh">chmod 0000 /etc/shadow
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_shadow" reboot="false" strategy="configure" system="urn:xccdf:fix:script:ansible">- name: Ensure permission 0000 on /etc/shadow
file:
path="{{item}}"
mode=0000
with_items:
- /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_shadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/group </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/group </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 644 /etc/group</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 644 /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/gshadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/gshadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0000 /etc/gshadow</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 0000 /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/passwd </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/passwd </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0644 /etc/passwd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">If the <html:code>/etc/passwd</html:code> file is writable by a group-owner or the
world the risk of its compromise is increased. The file contains the list of
accounts on the system and associated information, and protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 0644 /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_permissions_within_important_dirs">
<ns10:title xml:lang="en-US">Verify File Permissions Within Some Important Directories</ns10:title>
<ns10:description xml:lang="en-US">Some directories contain files whose confidentiality or integrity
is notably important and may also be susceptible to misconfiguration over time, particularly if
unpackaged software is installed. As such,
an argument exists to verify that files' permissions within these directories remain
configured correctly and restrictively.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that Shared Library Files Have Restrictive Permissions</ns10:title>
<ns10:description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre>/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are
stored in <html:code>/lib/modules</html:code>. All files in these directories
should not be group-writable or world-writable. If any file in these
directories is found to be group-writable or world-writable, correct
its permission with the following command:
<html:pre>$ sudo chmod go-w <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Restrictive permissions are necessary to protect the integrity of the system.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_library_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">DIRS="/lib /lib64 /usr/lib /usr/lib64"
for dirPath in $DIRS; do
find $dirPath -perm /022 -type f -exec chmod go-w '{}' \;
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_library_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that Shared Library Files Have Root Ownership</ns10:title>
<ns10:description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre>/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are also
stored in <html:code>/lib/modules</html:code>. All files in these directories should be
owned by the <html:code>root</html:code> user. If the directory, or any file in these
directories, is found to be owned by a user other than root correct its
ownership with the following command:
<html:pre>$ sudo chown root <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Proper ownership is necessary to protect the integrity of the system.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_library_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">for LIBDIR in /usr/lib /usr/lib64 /lib /lib64
do
if [ -d $LIBDIR ]
then
find -L $LIBDIR \! -user root -exec chown root {} \;
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_library_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that System Executables Have Restrictive Permissions</ns10:title>
<ns10:description xml:lang="en-US">
System executables are stored in the following directories by default:
<html:pre>/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should not be group-writable or world-writable.
If any file <html:i>FILE</html:i> in these directories is found
to be group-writable or world-writable, correct its permission with the
following command:
<html:pre>$ sudo chmod go-w <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">System binaries are executed by privileged users, as well as system services,
and restrictive permissions are necessary to ensure execution of these programs
cannot be co-opted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_binary_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">DIRS="/bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin /usr/libexec"
for dirPath in $DIRS; do
find "$dirPath" -perm /022 -exec chmod go-w '{}' \;
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_binary_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that System Executables Have Root Ownership</ns10:title>
<ns10:description xml:lang="en-US">
System executables are stored in the following directories by default:
<html:pre>/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should be owned by the <html:code>root</html:code> user.
If any file <html:i>FILE</html:i> in these directories is found
to be owned by a user other than root, correct its ownership with the
following command:
<html:pre>$ sudo chown root <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">System binaries are executed by privileged users as well as system services,
and restrictive permissions are necessary to ensure that their
execution of these programs cannot be co-opted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_binary_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">find /bin/ \
/usr/bin/ \
/usr/local/bin/ \
/sbin/ \
/usr/sbin/ \
/usr/local/sbin/ \
/usr/libexec \
\! -user root -execdir chown root {} \;
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_binary_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify that All World-Writable Directories Have Sticky Bits Set</ns10:title>
<ns10:description xml:lang="en-US">When the so-called 'sticky bit' is set on a directory,
only the owner of a given file may remove that file from the
directory. Without the sticky bit, any user with write access to a
directory may remove any file in the directory. Setting the sticky
bit prevents users from removing each other's files. In cases where
there is no reason for a directory to be world-writable, a better
solution is to remove that permission rather than to set the sticky
bit. However, if a directory is used by a particular application,
consult that application's documentation instead of blindly
changing modes.
<html:br />
To set the sticky bit on a world-writable directory <html:i>DIR</html:i>, run the
following command:
<html:pre>$ sudo chmod +t <html:i>DIR</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure.
<html:br /><html:br />
The only authorized public directories are those temporary directories supplied with the system,
or those designed to be temporary file repositories. The setting is normally reserved for directories
used by the system, by users for temporary file storage (such as <html:code>/tmp</html:code>), and for directories
requiring global read/write access.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure No World-Writable Files Exist</ns10:title>
<ns10:description xml:lang="en-US">It is generally a good idea to remove global (other) write
access to a file when it is discovered. However, check with
documentation for specific applications before making changes.
Also, monitor for recurring world-writable files, as these may be
symptoms of a misconfigured application or user
account.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Data in world-writable files can be modified by any
user on the system. In almost all circumstances, files can be
configured using a combination of user and group permissions to
support whatever legitimate access is needed without the risk
caused by world-writable files.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_world_writable:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All SGID Executables Are Authorized</ns10:title>
<ns10:description xml:lang="en-US">The SGID (set group id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SGID files.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Executable files with the SGID permission run with the privileges of
the owner of the file. SGID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_sgid:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All SUID Executables Are Authorized</ns10:title>
<ns10:description xml:lang="en-US">The SUID (set user id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SUID files.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Executable files with the SUID permission run with the privileges of
the owner of the file. SUID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_suid:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Files Are Owned by a User</ns10:title>
<ns10:description xml:lang="en-US">If any files are not owned by a user, then the
cause of their lack of ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate user.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">224</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_files_unowned_by_user:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Files Are Owned by a Group</ns10:title>
<ns10:description xml:lang="en-US">If any files are not owned by a group, then the
cause of their lack of group-ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate group.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">224</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_ungroupowned:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All World-Writable Directories Are Owned by a System Account</ns10:title>
<ns10:description xml:lang="en-US">All directories in local partitions which are
world-writable should be owned by root or another
system account. If any world-writable directories are not
owned by a system account, this should be investigated.
Following this, the files should be deleted or assigned to an
appropriate group.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Allowing a user account to own a world-writable directory is
undesirable because it allows the owner of that directory to remove
or replace any files that may be placed in the directory by other
users.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_world_writable_system_owned:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-dir_perms_world_writable_system_owned_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_restrictions">
<ns10:title xml:lang="en-US">Restrict Programs from Dangerous Execution Patterns</ns10:title>
<ns10:description xml:lang="en-US">The recommendations in this section are designed to
ensure that the system's features to protect against potentially
dangerous program execution are activated.
These protections are applied at the system initialization or
kernel level, and defend against certain types of badly-configured
or compromised programs.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_daemon_umask">
<ns10:title xml:lang="en-US">Daemon Umask</ns10:title>
<ns10:description xml:lang="en-US">The umask is a per-process setting which limits
the default permissions for creation of new files and directories.
The system includes initialization scripts which set the default umask
for system daemons.
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_umask_for_daemons" operator="equals" type="string">
<ns10:title xml:lang="en-US">daemon umask</ns10:title>
<ns10:description xml:lang="en-US">Enter umask for daemons</ns10:description>
<ns10:value>022</ns10:value>
<ns10:value selector="022">022</ns10:value>
<ns10:value selector="027">027</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Daemon Umask</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/init.d/functions</html:code> includes initialization
parameters for most or all daemons started at boot time. The default umask of
022 prevents creation of group- or world-writable files. To set the default
umask for daemons, edit the following line, inserting 022 or 027 for
<html:i>umask</html:i> appropriately:
<html:pre>umask <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" use="legacy" /></html:i></html:pre>
Setting the umask to too restrictive a setting can cause serious errors at
runtime. Many daemons on the system already individually restrict themselves to
a umask of 077 in their own init scripts.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask influences the permissions assigned to files created by a
process at run time. An unnecessarily permissive umask could result in files
being created with insecure permissions.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="umask_for_daemons" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_umask_for_daemons="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" use="legacy" />"
grep -q ^umask /etc/init.d/functions && \
sed -i "s/umask.*/umask $var_umask_for_daemons/g" /etc/init.d/functions
if ! [ $? -eq 0 ]; then
echo "umask $var_umask_for_daemons" >> /etc/init.d/functions
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_umask_for_daemons:var:1" value-id="xccdf_org.ssgproject.content_value_var_umask_for_daemons" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-umask_for_daemons:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-umask_for_daemons_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_coredumps">
<ns10:title xml:lang="en-US">Disable Core Dumps</ns10:title>
<ns10:description xml:lang="en-US">A core dump file is the memory image of an executable
program when it was terminated by the operating system due to
errant behavior. In most cases, only software developers
legitimately need to access these files. The core dump files may
also contain sensitive information, or unnecessarily occupy large
amounts of disk space.
<html:br /><html:br />
Once a hard limit is set in <html:code>/etc/security/limits.conf</html:code>, a
user cannot increase that limit within his or her own session. If access
to core dumps is required, consider restricting them to only
certain users or groups. See the <html:code>limits.conf</html:code> man page for more
information.
<html:br /><html:br />
The core dumps of setuid programs are further protected. The
<html:code>sysctl</html:code> variable <html:code>fs.suid_dumpable</html:code> controls whether
the kernel allows core dumps from these programs at all. The default
value of 0 is recommended.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Core Dumps for All Users</ns10:title>
<ns10:description xml:lang="en-US">To disable core dumps for all users, add the following line to
<html:code>/etc/security/limits.conf</html:code>:
<html:pre>* hard core 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:rationale xml:lang="en-US">A core dump includes a memory image taken at the time the operating system
terminates an application. The memory image could contain sensitive data and is generally useful
only for developers trying to debug problems.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_users_coredumps" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "* hard core 0" >> /etc/security/limits.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_users_coredumps:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_users_coredumps_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Core Dumps for SUID programs</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>fs.suid_dumpable</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w fs.suid_dumpable=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">fs.suid_dumpable = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:rationale xml:lang="en-US">The core dump of a setuid program is more likely to contain
sensitive data, as the program itself runs with greater privileges than the
user who initiated execution of the program. Disabling the ability for any
setuid program to write a core file decreases the risk of unauthorized access
of such data.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_fs_suid_dumpable" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for fs.suid_dumpable
#
/sbin/sysctl -q -n -w fs.suid_dumpable=0
#
# If fs.suid_dumpable present in /etc/sysctl.conf, change value to "0"
# else, add "fs.suid_dumpable = 0" to /etc/sysctl.conf
#
if grep --silent ^fs.suid_dumpable /etc/sysctl.conf ; then
sed -i 's/^fs.suid_dumpable.*/fs.suid_dumpable = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set fs.suid_dumpable to 0 per security requirements" >> /etc/sysctl.conf
echo "fs.suid_dumpable = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_fs_suid_dumpable:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_enable_execshield_settings">
<ns10:title xml:lang="en-US">Enable ExecShield</ns10:title>
<ns10:description xml:lang="en-US">ExecShield describes kernel features that provide
protection against exploitation of memory corruption errors such as buffer
overflows. These features include random placement of the stack and other
memory regions, prevention of execution in memory that should only hold data,
and special handling of text buffers. These protections are enabled by default and
controlled through <html:code>sysctl</html:code> variables <html:code>kernel.exec-shield</html:code> and
<html:code>kernel.randomize_va_space</html:code>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable ExecShield</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.exec-shield</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.exec-shield=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.exec-shield = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-39</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2530</ns10:reference>
<ns10:rationale xml:lang="en-US">ExecShield uses the segmentation feature on all x86 systems
to prevent execution in memory higher than a certain address. It
writes an address as a limit in the code segment descriptor, to
control where code can be executed, on a per-process basis. When
the kernel places a process's memory regions such as the stack and
heap higher than this address, the hardware prevents execution in that
address range.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_exec_shield" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.exec-shield
#
/sbin/sysctl -q -n -w kernel.exec-shield=1
#
# If kernel.exec-shield present in /etc/sysctl.conf, change value to "1"
# else, add "kernel.exec-shield = 1" to /etc/sysctl.conf
#
if grep --silent ^kernel.exec-shield /etc/sysctl.conf ; then
sed -i 's/^kernel.exec-shield.*/kernel.exec-shield = 1/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.exec-shield to 1 per security requirements" >> /etc/sysctl.conf
echo "kernel.exec-shield = 1" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_exec_shield:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_exec_shield_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Randomized Layout of Virtual Address Space</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.randomize_va_space</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.randomize_va_space=2</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.randomize_va_space = 2</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-30(2)</ns10:reference>
<ns10:rationale xml:lang="en-US"> Address space layout randomization (ASLR) makes it more difficult
for an attacker to predict the location of attack code they have introduced
into a process's address space during an attempt at exploitation. Additionally, ASLR
makes it more difficult for an attacker to know the location of existing code
in order to re-purpose it using return oriented programming (ROP) techniques.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_randomize_va_space" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.randomize_va_space
#
/sbin/sysctl -q -n -w kernel.randomize_va_space=2
#
# If kernel.randomize_va_space present in /etc/sysctl.conf, change value to "2"
# else, add "kernel.randomize_va_space = 2" to /etc/sysctl.conf
#
if grep --silent ^kernel.randomize_va_space /etc/sysctl.conf ; then
sed -i 's/^kernel.randomize_va_space.*/kernel.randomize_va_space = 2/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.randomize_va_space to 2 per security requirements" >> /etc/sysctl.conf
echo "kernel.randomize_va_space = 2" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_randomize_va_space:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_enable_nx">
<ns10:title xml:lang="en-US">Enable Execute Disable (XD) or No Execute (NX) Support on
x86 Systems</ns10:title>
<ns10:description xml:lang="en-US">Recent processors in the x86 family support the
ability to prevent code execution on a per memory page basis.
Generically and on AMD processors, this ability is called No
Execute (NX), while on Intel processors it is called Execute
Disable (XD). This ability can help prevent exploitation of buffer
overflow vulnerabilities and should be activated whenever possible.
Extra steps must be taken to ensure that this protection is
enabled, particularly on 32-bit x86 systems. Other processors, such
as Itanium and POWER, have included such support since inception
and the standard kernel for those platforms supports the
feature.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_PAE_kernel_on_x86-32" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install PAE Kernel on Supported 32-bit x86 Systems</ns10:title>
<ns10:description xml:lang="en-US">Systems that are using the 64-bit x86 kernel package
do not need to install the kernel-PAE package because the 64-bit
x86 kernel already includes this support. However, if the system is
32-bit and also supports the PAE and NX features as
determined in the previous section, the kernel-PAE package should
be installed to enable XD or NX support:
<html:pre>$ sudo yum install kernel-PAE</html:pre>
The installation process should also have configured the
bootloader to load the new kernel at boot. Verify this at reboot
and modify <html:code>/etc/grub.conf</html:code> if necessary.</ns10:description>
<ns10:warning category="hardware" xml:lang="en-US">The kernel-PAE package should not be
installed on older systems that do not support the XD or NX bit, as
this may prevent them from booting.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:rationale xml:lang="en-US">On 32-bit systems that support the XD or NX bit, the vendor-supplied
PAE kernel is required to enable either Execute Disable (XD) or No Execute (NX) support.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_enable_execution_restrictions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable NX or XD Support in the BIOS</ns10:title>
<ns10:description xml:lang="en-US">Reboot the system and enter the BIOS or Setup configuration menu.
Navigate the BIOS configuration menu and make sure that the option is enabled. The setting may be located
under a Security section. Look for Execute Disable (XD) on Intel-based systems and No Execute (NX)
on AMD-based systems.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:rationale xml:lang="en-US">Computers with the ability to prevent this type of code execution frequently put an option in the BIOS that will
allow users to turn the feature on or off at will.</ns10:rationale>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_dmesg_restrict" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Access to Kernel Message Buffer</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.dmesg_restrict</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.dmesg_restrict=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.dmesg_restrict = 1</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unprivileged access to the kernel syslog can expose sensitive kernel
address information.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_dmesg_restrict" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.dmesg_restrict
#
/sbin/sysctl -q -n -w kernel.dmesg_restrict=1
#
# If kernel.dmesg_restrict present in /etc/sysctl.conf, change value to "1"
# else, add "kernel.dmesg_restrict = 1" to /etc/sysctl.conf
#
if grep --silent ^kernel.dmesg_restrict /etc/sysctl.conf ; then
sed -i 's/^kernel.dmesg_restrict.*/kernel.dmesg_restrict = 1/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.dmesg_restrict to 1 per security requirements" >> /etc/sysctl.conf
echo "kernel.dmesg_restrict = 1" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_dmesg_restrict:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_dmesg_restrict_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_selinux">
<ns10:title xml:lang="en-US">SELinux</ns10:title>
<ns10:description xml:lang="en-US">SELinux is a feature of the Linux kernel which can be
used to guard against misconfigured or compromised programs.
SELinux enforces the idea that programs should be limited in what
files they can access and what actions they can take.
<html:br /><html:br />
The default SELinux policy, as configured on Red Hat Enterprise Linux 6, has been
sufficiently developed and debugged that it should be usable on
almost any Red Hat machine with minimal configuration and a small
amount of system administrator training. This policy prevents
system services - including most of the common network-visible
services such as mail servers, FTP servers, and DNS servers - from
accessing files which those services have no valid reason to
access. This action alone prevents a huge amount of possible damage
from network attacks against services, from trojaned software, and
so forth.
<html:br /><html:br />
This guide recommends that SELinux be enabled using the
default (targeted) policy on every Red Hat system, unless that
system has unusual requirements which make a stronger policy
appropriate.
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_selinux_state" operator="equals" type="string">
<ns10:title xml:lang="en-US">SELinux state</ns10:title>
<ns10:description xml:lang="en-US">enforcing - SELinux security policy is enforced.
<html:br />permissive - SELinux prints warnings instead of enforcing.
<html:br />disabled - SELinux is fully disabled.</ns10:description>
<ns10:value>enforcing</ns10:value>
<ns10:value selector="enforcing">enforcing</ns10:value>
<ns10:value selector="permissive">permissive</ns10:value>
<ns10:value selector="disabled">disabled</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_selinux_policy_name" operator="equals" type="string">
<ns10:title xml:lang="en-US">SELinux policy</ns10:title>
<ns10:description xml:lang="en-US">Type of policy in use. Possible values are:
<html:br />targeted - Only targeted network daemons are protected.
<html:br />strict - Full SELinux protection.
<html:br />mls - Multiple levels of security</ns10:description>
<ns10:value>targeted</ns10:value>
<ns10:value selector="targeted">targeted</ns10:value>
<ns10:value selector="mls">mls</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure SELinux Not Disabled in /etc/grub.conf</ns10:title>
<ns10:description xml:lang="en-US">SELinux can be disabled at boot time by an argument in
<html:code>/etc/grub.conf</html:code>.
Remove any instances of <html:code>selinux=0</html:code> from the kernel arguments in that
file to prevent SELinux from being disabled at boot.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling a major host protection feature, such as SELinux, at boot time prevents
it from confining system services at boot time. Further, it increases
the chances that it will remain off during system operation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="enable_selinux_bootloader" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i --follow-symlinks "s/selinux=0//gI" /etc/grub.conf
sed -i --follow-symlinks "s/enforcing=0//gI" /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-enable_selinux_bootloader:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-enable_selinux_bootloader_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_state" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure SELinux State is Enforcing</ns10:title>
<ns10:description xml:lang="en-US">The SELinux state should be set to <html:code><ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" /></html:code> at
system boot time. In the file <html:code>/etc/selinux/config</html:code>, add or correct the
following line to configure the system to boot into enforcing mode:
<html:pre>SELINUX=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">26</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the SELinux state to enforcing ensures SELinux is able to confine
potentially compromised processes to the security policy, which is designed to
prevent them from causing damage to the system or further elevating their
privileges.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="selinux_state" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_selinux_state="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" />"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' $var_selinux_state 'CCE-26969-6' '%s=%s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_selinux_state:var:1" value-id="xccdf_org.ssgproject.content_value_var_selinux_state" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_state:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_state_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure SELinux Policy</ns10:title>
<ns10:description xml:lang="en-US">The SELinux <html:code>targeted</html:code> policy is appropriate for
general-purpose desktops and servers, as well as systems in many other roles.
To configure the system to use this policy, add or correct the following line
in <html:code>/etc/selinux/config</html:code>:
<html:pre>SELINUXTYPE=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" /></html:pre>
Other policies, such as <html:code>mls</html:code>, provide additional security labeling
and greater confinement but are not compatible with many general-purpose
use cases.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the SELinux policy to <html:code>targeted</html:code> or a more specialized policy
ensures the system will confine processes that are likely to be
targeted for exploitation, such as network or system services.
Note: During the development or debugging of SELinux modules, it is common to
temporarily place non-production systems in <html:code>permissive</html:code> mode. In such
temporary cases, SELinux policies should be developed, and once work
is completed, the system should be reconfigured to
<html:code><ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" /></html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="selinux_policytype" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_selinux_policy_name="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" />"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/sysconfig/selinux' '^SELINUXTYPE=' $var_selinux_policy_name 'CCE-26875-5' '%s=%s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_selinux_policy_name:var:1" value-id="xccdf_org.ssgproject.content_value_var_selinux_policy_name" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_policytype:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_policytype_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_restorecond_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable the SELinux Context Restoration Service (restorecond)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>restorecond</html:code> service utilizes <html:code>inotify</html:code> to look
for the creation of new files listed in the
<html:code>/etc/selinux/restorecond.conf</html:code> configuration file. When a file is
created, <html:code>restorecond</html:code> ensures the file receives the proper SELinux
security context.
The <html:code>restorecond</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 restorecond on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>restorecond</html:code> service helps ensure that the default SELinux
file context is applied to files. This allows automatic correction
of file contexts created by some programs.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_restorecond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable restorecond
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_restorecond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service restorecond
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- restorecond
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_restorecond_enabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_setroubleshoot_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall setroubleshoot Package</ns10:title>
<ns10:description xml:lang="en-US">The SETroubleshoot service notifies desktop users of SELinux
denials. The service provides information around configuration errors,
unauthorized intrusions, and other potential errors.
The <html:code>setroubleshoot</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase setroubleshoot</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">The SETroubleshoot service is an unnecessary daemon to
have running on a server</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_setroubleshoot_removed:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_mcstrans_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall mcstrans Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>mcstransd</html:code> daemon provides category label information
to client processes requesting information. The label translations are defined
in <html:code>/etc/selinux/targeted/setrans.conf</html:code>.
The <html:code>mcstrans</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase mcstrans</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Since this service is not used very often, disable it to reduce the
amount of potentially vulnerable code running on the system.
NOTE: This rule was added in support of the CIS RHEL6 v1.2.0 benchmark. Please
note that Red Hat does not feel this rule is security relevant.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_mcstrans_removed:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure No Daemons are Unconfined by SELinux</ns10:title>
<ns10:description xml:lang="en-US">
Daemons for which the SELinux policy does not contain rules will inherit the
context of the parent process. Because daemons are launched during
startup and descend from the <html:code>init</html:code> process, they inherit the <html:code>initrc_t</html:code> context.
<html:br />
<html:br />
To check for unconfined daemons, run the following command:
<html:pre>$ sudo ps -eZ | egrep "initrc" | egrep -vw "tr|ps|egrep|bash|awk" | tr ':' ' ' | awk '{ print $NF }'</html:pre>
It should produce no output in a well-configured system.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Daemons which run with the <html:code>initrc_t</html:code> context may cause AVC denials,
or allow privileges that the daemon does not require.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_confinement_of_daemons:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure No Device Files are Unknown to SELinux</ns10:title>
<ns10:description xml:lang="en-US">Device files, which are used for communication with important
system resources, should be labeled with proper SELinux types. If any device
files carry the SELinux type <html:code>device_t</html:code>, report the bug so that policy can be corrected. Supply information about what the device is and what programs use it.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
If a device file carries the SELinux type <html:code>device_t</html:code>, then SELinux
cannot properly restrict access to the device file.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_all_devicefiles_labeled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_all_devicefiles_labeled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts">
<ns10:title xml:lang="en-US">Account and Access Control</ns10:title>
<ns10:description xml:lang="en-US">In traditional Unix security, if an attacker gains
shell access to a certain login account, they can perform any action
or access any file to which that account has access. Therefore,
making it more difficult for unauthorized people to gain shell
access to accounts, particularly to privileged accounts, is a
necessary part of securing a system. This section introduces
mechanisms for restricting access to accounts under
Red Hat Enterprise Linux 6.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts-restrictions">
<ns10:title xml:lang="en-US">Protect Accounts by Restricting Password-Based Login</ns10:title>
<ns10:description xml:lang="en-US">Conventionally, Unix shell accounts are accessed by
providing a username and password to a login program, which tests
these values for correctness using the <html:code>/etc/passwd</html:code> and
<html:code>/etc/shadow</html:code> files. Password-based login is vulnerable to
guessing of weak passwords, and to sniffing and man-in-the-middle
attacks against passwords entered over a network or at an insecure
console. Therefore, mechanisms for accessing accounts by entering
usernames and passwords should be restricted to those which are
operationally necessary.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_root_logins">
<ns10:title xml:lang="en-US">Restrict Root Logins</ns10:title>
<ns10:description xml:lang="en-US">
Direct root logins should be allowed only for emergency use.
In normal situations, the administrator should access the system
via a unique unprivileged account, and then use <html:code>su</html:code> or <html:code>sudo</html:code> to execute
privileged commands. Discouraging administrators from accessing the
root account directly ensures an audit trail in organizations with
multiple administrators. Locking down the channels through which
root can connect directly also reduces opportunities for
password-guessing against the root account. The <html:code>login</html:code> program
uses the file <html:code>/etc/securetty</html:code> to determine which interfaces
should allow root logins.
The virtual devices <html:code>/dev/console</html:code>
and <html:code>/dev/tty*</html:code> represent the system consoles (accessible via
the Ctrl-Alt-F1 through Ctrl-Alt-F6 keyboard sequences on a default
installation). The default securetty file also contains <html:code>/dev/vc/*</html:code>.
These are likely to be deprecated in most environments, but may be retained
for compatibility. Root should also be prohibited from connecting
via network protocols. Other sections of this document
include guidance describing how to prevent root from logging in via SSH.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Direct root Logins Not Allowed</ns10:title>
<ns10:description xml:lang="en-US">To further limit access to the <html:code>root</html:code> account, administrators
can disable root logins at the console by editing the <html:code>/etc/securetty</html:code> file.
This file lists all devices the root user is allowed to login to. If the file does
not exist at all, the root user can login through any communication device on the
system, whether via the console or via a raw network interface. This is dangerous
as user can login to his machine as root via Telnet, which sends the password in
plain text over the network. By default, Red Hat Enteprise Linux's
<html:code>/etc/securetty</html:code> file only allows the root user to login at the console
physically attached to the machine. To prevent root from logging in, remove the
contents of this file. To prevent direct root logins, remove the contents of this
file by typing the following command:
<html:pre>
$ sudo echo > /etc/securetty
</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling direct root logins ensures proper accountability and multifactor
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_direct_root_logins" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo > /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_direct_root_logins:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Restrict Virtual Console Root Logins</ns10:title>
<ns10:description xml:lang="en-US">
To restrict root logins through the (deprecated) virtual console devices,
ensure lines of this form do not appear in <html:code>/etc/securetty</html:code>:
<html:pre>vc/1
vc/2
vc/3
vc/4</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing direct root login to virtual console devices
helps ensure accountability for actions taken on the system
using the root account.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="securetty_root_login_console_only" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i '/^vc\//d' /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-securetty_root_login_console_only:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Serial Port Root Logins</ns10:title>
<ns10:description xml:lang="en-US">To restrict root logins on serial ports,
ensure lines of this form do not appear in <html:code>/etc/securetty</html:code>:
<html:pre>ttyS0
ttyS1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing direct root login to serial port interfaces
helps ensure accountability for actions taken on the systems
using the root account.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="restrict_serial_port_logins" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i '/ttyS/d' /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-restrict_serial_port_logins:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_root_webbrowsing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Web Browser Use for Administrative Accounts</ns10:title>
<ns10:description xml:lang="en-US">
Enforce policy requiring administrative accounts use web browsers only for
local service administration.
</ns10:description>
<ns10:rationale xml:lang="en-US">
If a browser vulnerability is exploited while running with administrative privileges,
the entire system could be compromised. Specific exceptions for local service
administration should be documented in site-defined policy.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_root_webbrowsing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure that System Accounts Do Not Run a Shell Upon Login</ns10:title>
<ns10:description xml:lang="en-US">
Some accounts are not associated with a human user of the system, and exist to
perform some administrative function. Should an attacker be able to log into
these accounts, they should not be granted access to a shell.
<html:br /><html:br />
The login shell for each local account is stored in the last field of each line
in <html:code>/etc/passwd</html:code>. System accounts are those user accounts with a user ID
less than UID_MIN, where value of the UID_MIN directive is set in
/etc/login.defs configuration file. In the default configuration UID_MIN is set
to 500, thus system accounts are those user accounts with a user ID less than
500. The user ID is stored in the third field. If any system account
<html:i>SYSACCT</html:i> (other than root) has a login shell, disable it with the
command: <html:pre>$ sudo usermod -s /sbin/nologin <html:i>SYSACCT</html:i></html:pre>
</ns10:description>
<ns10:warning category="functionality" xml:lang="en-US">
Do not perform the steps in this section on the root account. Doing so might
cause the system to become inaccessible.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">178</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring shells are not given to system accounts upon login makes it more
difficult for attackers to make use of system accounts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_shelllogin_for_systemaccounts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_shelllogin_for_systemaccounts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Only Root Has UID 0</ns10:title>
<ns10:description xml:lang="en-US">
If any account other than root has a UID of 0,
this misconfiguration should be investigated and the
accounts other than root should be removed or have their UID changed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
An account has root authority if it has a UID of 0. Multiple accounts
with a UID of 0 afford more opportunity for potential intruders to
guess a password for a privileged account. Proper configuration of
sudo is recommended to afford multiple system administrators
access to root privileges in an accountable manner.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_no_uid_except_zero" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">awk -F: '$3 == 0 && $1 != "root" { print $1 }' /etc/passwd | xargs passwd -l
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_no_uid_except_zero:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_root_path_default" selected="false" severity="low">
<ns10:title xml:lang="en-US">Root Path Must Be Vendor Default</ns10:title>
<ns10:description xml:lang="en-US">
Assuming root shell is bash, edit the following files:
<html:pre>~/.profile</html:pre>
<html:pre>~/.bashrc</html:pre>
Change any <html:code>PATH</html:code> variables to the vendor default for root and remove any
empty <html:code>PATH</html:code> entries or references to relative paths.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:rationale xml:lang="en-US">
The root account's executable search path must be the vendor default, and must
contain only absolute paths.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-root_path_default_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_password_storage">
<ns10:title xml:lang="en-US">Verify Proper Storage and Existence of Password
Hashes</ns10:title>
<ns10:description xml:lang="en-US">
By default, password hashes for local accounts are stored
in the second field (colon-separated) in
<html:code>/etc/shadow</html:code>. This file should be readable only by
processes running with root credentials, preventing users from
casually accessing others' password hashes and attempting
to crack them.
However, it remains possible to misconfigure the system
and store password hashes
in world-readable files such as <html:code>/etc/passwd</html:code>, or
to even store passwords themselves in plaintext on the system.
Using system-provided tools for password change/creation
should allow administrators to avoid such misconfiguration.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="false" severity="high">
<ns10:title xml:lang="en-US">Prevent Log In to Accounts With Empty Password</ns10:title>
<ns10:description xml:lang="en-US">If an account is configured for password authentication
but does not have an assigned password, it may be possible to log
onto the account without authentication. Remove any instances of the <html:code>nullok</html:code>
option in <html:code>/etc/pam.d/system-auth</html:code> to
prevent logins with empty passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:rationale xml:lang="en-US">
If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational
environments.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_empty_passwords" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed --follow-symlinks -i 's/\<nullok\>//g' /etc/pam.d/system-auth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_empty_passwords:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_empty_passwords_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify All Account Password Hashes are Shadowed</ns10:title>
<ns10:description xml:lang="en-US">
If any password hashes are stored in <html:code>/etc/passwd</html:code> (in the second field,
instead of an <html:code>x</html:code>), the cause of this misconfiguration should be
investigated. The account should have its password reset and the hash should be
properly stored, or the account should be deleted entirely.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">201</ns10:reference>
<ns10:rationale xml:lang="en-US">
The hashes for all user account passwords should be stored in
the file <html:code>/etc/shadow</html:code> and never in <html:code>/etc/passwd</html:code>,
which is readable by all users.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_all_shadowed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="false" severity="low">
<ns10:title xml:lang="en-US">All GIDs referenced in /etc/passwd must be defined in /etc/group</ns10:title>
<ns10:description xml:lang="en-US">
Add a group to the system for each GID referenced without a corresponding group.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Inconsistency in GIDs between <html:code>/etc/passwd</html:code> and <html:code>/etc/group</html:code> could lead to a user having unintended rights.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gid_passwd_group_same:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify No netrc Files Exist</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>.netrc</html:code> files contain login information
used to auto-login into FTP servers and reside in the user's home
directory. These files may contain unencrypted passwords to
remote FTP servers making them susceptible to access by unauthorized
users and should not be used. Any <html:code>.netrc</html:code> files should be removed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">196</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unencrypted passwords for remote FTP servers may be stored in <html:code>.netrc</html:code>
files. DoD policy requires passwords be encrypted in storage and not used
in access scripts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_netrc_files:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_netrc_files_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_password_expiration">
<ns10:title xml:lang="en-US">Set Password Expiration Parameters</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/login.defs</html:code> controls several
password-related settings. Programs such as <html:code>passwd</html:code>,
<html:code>su</html:code>, and
<html:code>login</html:code> consult <html:code>/etc/login.defs</html:code> to determine
behavior with regard to password aging, expiration warnings,
and length. See the man page <html:code>login.defs(5)</html:code> for more information.
<html:br /><html:br />
Users should be forced to change their passwords, in order to
decrease the utility of compromised passwords. However, the need to
change passwords often should be balanced against the risk that
users will reuse or write down passwords if forced to change them
too often. Forcing password changes every 90-360 days, depending on
the environment, is recommended. Set the appropriate value as
<html:code>PASS_MAX_DAYS</html:code> and apply it to existing accounts with the
<html:code>-M</html:code> flag.
<html:br /><html:br />
The <html:code>PASS_MIN_DAYS</html:code> (<html:code>-m</html:code>) setting prevents password
changes for 7 days after the first change, to discourage password
cycling. If you use this setting, train users to contact an administrator
for an emergency password change in case a new password becomes
compromised. The <html:code>PASS_WARN_AGE</html:code> (<html:code>-W</html:code>) setting gives
users 7 days of warnings at login time that their passwords are about to expire.
<html:br /><html:br />
For example, for each existing human user <html:i>USER</html:i>, expiration parameters
could be adjusted to a 180 day maximum password age, 7 day minimum password
age, and 7 day warning period with the following command:
<html:pre>$ sudo chage -M 180 -m 7 -W 7 USER</html:pre>
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" type="number">
<ns10:title xml:lang="en-US">minimum password length</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters in password</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only check new passwords</ns10:warning>
<ns10:value>14</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="8">8</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="12">12</ns10:value>
<ns10:value selector="14">14</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" type="number">
<ns10:title xml:lang="en-US">maximum password age</ns10:title>
<ns10:description xml:lang="en-US">Maximum age of password in days</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>60</ns10:value>
<ns10:value selector="60">60</ns10:value>
<ns10:value selector="90">90</ns10:value>
<ns10:value selector="120">120</ns10:value>
<ns10:value selector="180">180</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" type="number">
<ns10:title xml:lang="en-US">minimum password age</ns10:title>
<ns10:description xml:lang="en-US">Minimum age of password in days</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>7</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" type="number">
<ns10:title xml:lang="en-US">warning days before password expires</ns10:title>
<ns10:description xml:lang="en-US">The number of days' warning given before a password expires.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>7</ns10:value>
<ns10:value selector="0">0</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="14">14</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Minimum Length in login.defs</ns10:title>
<ns10:description xml:lang="en-US">To specify password length requirements for new accounts,
edit the file <html:code>/etc/login.defs</html:code> and add or correct the following
lines:
<html:pre>PASS_MIN_LEN <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy" /></html:pre>
<html:br /><html:br />
As of the DISA Red Hat 6 STIG - Ver 1, Rel 13 (28-OCT-2016), the DoD requirement is now <html:code>15</html:code>.
The FISMA requirement is <html:code>12</html:code>.
If a program consults <html:code>/etc/login.defs</html:code> and also another PAM module
(such as <html:code>pam_cracklib</html:code>) during a password change operation,
then the most restrictive must be satisfied. See PAM section
for more information about enforcing password quality requirements.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">205</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum password length makes password
cracking attacks more difficult by ensuring a larger
search space. However, any security benefit from an onerous requirement
must be carefully weighed against usability problems, support costs, or counterproductive
behavior that may result.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_minlen_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_password_minlen_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy" />"
grep -q ^PASS_MIN_LEN /etc/login.defs && \
sed -i "s/PASS_MIN_LEN.*/PASS_MIN_LEN $var_accounts_password_minlen_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MIN_LEN $var_accounts_password_minlen_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_password_minlen_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_minlen_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Minimum Age</ns10:title>
<ns10:description xml:lang="en-US">To specify password minimum age for new accounts,
edit the file <html:code>/etc/login.defs</html:code>
and add or correct the following line:
<html:pre>PASS_MIN_DAYS <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy" /></html:i></html:pre>
A value of 1 day is considered for sufficient for many
environments.
The DoD requirement is 1.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">198</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the minimum password age protects against
users cycling back to a favorite password
after satisfying the password reuse requirement.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_minimum_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_minimum_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy" />"
grep -q ^PASS_MIN_DAYS /etc/login.defs && \
sed -i "s/PASS_MIN_DAYS.*/PASS_MIN_DAYS $var_accounts_minimum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MIN_DAYS $var_accounts_minimum_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_minimum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_minimum_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Maximum Age</ns10:title>
<ns10:description xml:lang="en-US">To specify password maximum age for new accounts,
edit the file <html:code>/etc/login.defs</html:code>
and add or correct the following line:
<html:pre>PASS_MAX_DAYS <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy" /></html:i></html:pre>
A value of 180 days is sufficient for many environments.
The DoD requirement is 60.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(g)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">180</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">199</ns10:reference>
<ns10:reference href="">76</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password maximum age ensures users are required to
periodically change their passwords. This could possibly decrease
the utility of a stolen password. Requiring shorter password lifetimes
increases the risk of users writing down the password in a convenient
location subject to physical compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_maximum_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_maximum_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy" />"
grep -q ^PASS_MAX_DAYS /etc/login.defs && \
sed -i "s/PASS_MAX_DAYS.*/PASS_MAX_DAYS $var_accounts_maximum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MAX_DAYS $var_accounts_maximum_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_maximum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_maximum_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Warning Age</ns10:title>
<ns10:description xml:lang="en-US">To specify how many days prior to password
expiration that a warning will be issued to users,
edit the file <html:code>/etc/login.defs</html:code> and add or correct
the following line:
<html:pre>PASS_WARN_AGE <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy" /></html:i></html:pre>
The DoD requirement is 7.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password warning age enables users to
make the change at a practical time.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_warn_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_password_warn_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy" />"
grep -q ^PASS_WARN_AGE /etc/login.defs && \
sed -i "s/PASS_WARN_AGE.*/PASS_WARN_AGE $var_accounts_password_warn_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_WARN_AGE $var_accounts_password_warn_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_warn_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_account_expiration">
<ns10:title xml:lang="en-US">Set Account Expiration Parameters</ns10:title>
<ns10:description xml:lang="en-US">Accounts can be configured to be automatically disabled
after a certain time period,
meaning that they will require administrator interaction to become usable again.
Expiration of accounts after inactivity can be set for all accounts by default
and also on a per-account basis, such as for accounts that are known to be temporary.
To configure automatic expiration of an account following
the expiration of its password (that is, after the password has expired and not been changed),
run the following command, substituting <html:code><html:i>NUM_DAYS</html:i></html:code> and <html:code><html:i>USER</html:i></html:code> appropriately:
<html:pre>$ sudo chage -I <html:i>NUM_DAYS USER</html:i></html:pre>
Accounts, such as temporary accounts, can also be configured to expire on an explicitly-set date with the
<html:code>-E</html:code> option.
The file <html:code>/etc/default/useradd</html:code> controls
default settings for all newly-created accounts created with the system's
normal command line utilities.
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" type="number">
<ns10:title xml:lang="en-US">number of days after a password expires until the account is permanently disabled</ns10:title>
<ns10:description xml:lang="en-US">The number of days to wait after a password expires, until the account will be permanently disabled.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>35</ns10:value>
<ns10:value selector="30">30</ns10:value>
<ns10:value selector="35">35</ns10:value>
<ns10:value selector="40">40</ns10:value>
<ns10:value selector="60">60</ns10:value>
<ns10:value selector="90">90</ns10:value>
<ns10:value selector="180">180</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Account Expiration Following Inactivity</ns10:title>
<ns10:description xml:lang="en-US">To specify the number of days after a password expires (which
signifies inactivity) until an account is permanently disabled, add or correct
the following lines in <html:code>/etc/default/useradd</html:code>, substituting
<html:code><html:i>NUM_DAYS</html:i></html:code> appropriately:
<html:pre>INACTIVE=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" use="legacy" /></html:i></html:pre>
A value of 35 is recommended.
If a password is currently on the
verge of expiration, then 35 days remain until the account is automatically
disabled. However, if the password will not expire for another 60 days, then 95
days could elapse until the account would be automatically disabled. See the
<html:code>useradd</html:code> man page for more information. Determining the inactivity
timeout must be done with careful consideration of the length of a "normal"
period of inactivity for users in the particular environment. Setting
the timeout too low incurs support costs and also has the potential to impact
availability of the system to legitimate users.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">16</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">17</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">795</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling inactive accounts ensures that accounts which may not
have been responsibly removed are not available to attackers
who may have compromised their credentials.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="account_disable_post_pw_expiration" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_account_disable_post_pw_expiration="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" use="legacy" />"
grep -q ^INACTIVE /etc/default/useradd && \
sed -i "s/INACTIVE.*/INACTIVE=$var_account_disable_post_pw_expiration/g" /etc/default/useradd
if ! [ $? -eq 0 ]; then
echo "INACTIVE=$var_account_disable_post_pw_expiration" >> /etc/default/useradd
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_account_disable_post_pw_expiration:var:1" value-id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-account_disable_post_pw_expiration:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_unique_name" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Accounts on the System Have Unique Names</ns10:title>
<ns10:description xml:lang="en-US">
Change usernames, or delete accounts, so each has a unique name.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unique usernames allow for accountability on the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-account_unique_name:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_unique_name_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="false" severity="low">
<ns10:title xml:lang="en-US">Assign Expiration Date to Temporary Accounts</ns10:title>
<ns10:description xml:lang="en-US">
In the event temporary or emergency accounts are required, configure the system
to terminate them after a documented time period. For every temporary and
emergency account, run the following command to set an expiration date on it,
substituting <html:code><html:i>USER</html:i></html:code> and <html:code><html:i>YYYY-MM-DD</html:i></html:code> appropriately:
<html:pre>$ sudo chage -E <html:i>YYYY-MM-DD USER</html:i></html:pre>
<html:code><html:i>YYYY-MM-DD</html:i></html:code> indicates the documented expiration date for the account.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">16</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1682</ns10:reference>
<ns10:rationale xml:lang="en-US">
When temporary and emergency accounts are created, there is a risk they may
remain in place and active after the need for them no longer exists. Account
expiration greatly reduces the risk of accounts being misused or hijacked.
<html:br />
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts-pam">
<ns10:title xml:lang="en-US">Protect Accounts by Configuring PAM</ns10:title>
<ns10:description xml:lang="en-US">PAM, or Pluggable Authentication Modules, is a system
which implements modular authentication for Linux programs. PAM provides
a flexible and configurable architecture for authentication, and it should be configured
to minimize exposure to unnecessary risk. This section contains
guidance on how to accomplish that.
<html:br /><html:br />
PAM is implemented as a set of shared objects which are
loaded and invoked whenever an application wishes to authenticate a
user. Typically, the application must be running as root in order
to take advantage of PAM, because PAM's modules often need to be able
to access sensitive stores of account information, such as /etc/shadow.
Traditional privileged network listeners
(e.g. sshd) or SUID programs (e.g. sudo) already meet this
requirement. An SUID root application, userhelper, is provided so
that programs which are not SUID or privileged themselves can still
take advantage of PAM.
<html:br /><html:br />
PAM looks in the directory <html:code>/etc/pam.d</html:code> for
application-specific configuration information. For instance, if
the program login attempts to authenticate a user, then PAM's
libraries follow the instructions in the file <html:code>/etc/pam.d/login</html:code>
to determine what actions should be taken.
<html:br /><html:br />
One very important file in <html:code>/etc/pam.d</html:code> is
<html:code>/etc/pam.d/system-auth</html:code>. This file, which is included by
many other PAM configuration files, defines 'default' system authentication
measures. Modifying this file is a good way to make far-reaching
authentication changes, for instance when implementing a
centralized authentication service.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Be careful when making changes to PAM's
configuration files. The syntax for these files is complex, and
modifications can have unexpected consequences. The default
configurations shipped with applications should be sufficient for
most users.</ns10:warning>
<ns10:warning category="general" xml:lang="en-US">Running <html:code>authconfig</html:code> or
<html:code>system-config-authentication</html:code> will re-write the PAM configuration
files, destroying any manually made changes and replacing them with
a series of system defaults. One reference to the configuration
file syntax can be found at
<html:a href="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-configuration-file.html">http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-configuration-file.html</html:a>.</ns10:warning>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" operator="equals" type="number">
<ns10:title xml:lang="en-US">remember</ns10:title>
<ns10:description xml:lang="en-US">The last n passwords for each user are saved in
<html:code>/etc/security/opasswd</html:code> in order to force password change history and
keep the user from alternating between the same password too
frequently.</ns10:description>
<ns10:value>5</ns10:value>
<ns10:value selector="0">0</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="24">24</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Last Login/Access Notification</ns10:title>
<ns10:description xml:lang="en-US">To configure the system to notify users of last login/access
using <html:code>pam_lastlog</html:code>, add the following line immediately after <html:code>session required pam_limits.so</html:code>:
<html:pre>session required pam_lastlog.so showfailed</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Users need to be aware of activity that occurs regarding
their account. Providing users with information regarding the number
of unsuccessful attempts that were made to login to their account
allows the user to determine if any unauthorized activity has occurred
and gives them an opportunity to notify administrators.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="display_login_attempts" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i --follow-symlinks '/pam_limits.so/a session\t required\t pam_lastlog.so showfailed' /etc/pam.d/system-auth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-display_login_attempts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-display_login_attempts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_password_quality">
<ns10:title xml:lang="en-US">Set Password Quality Requirements</ns10:title>
<ns10:description xml:lang="en-US">The default <html:code>pam_cracklib</html:code> PAM module provides strength
checking for passwords. It performs a number of checks, such as
making sure passwords are not similar to dictionary words, are of
at least a certain length, are not the previous password reversed,
and are not simply a change of case from the previous password. It
can also require passwords to be in certain character classes.
<html:br /><html:br />
The man page <html:code>pam_cracklib(8)</html:code> provides information on the
capabilities and configuration of each.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_password_quality_pamcracklib">
<ns10:title xml:lang="en-US">Set Password Quality Requirements, if using
pam_cracklib</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>pam_cracklib</html:code> PAM module can be configured to meet
requirements for a variety of policies.
<html:br /><html:br />
For example, to configure <html:code>pam_cracklib</html:code> to require at least one uppercase
character, lowercase character, digit, and other (special)
character, locate the following line in <html:code>/etc/pam.d/system-auth</html:code>:
<html:pre>password requisite pam_cracklib.so try_first_pass retry=3</html:pre>
and then alter it to read:
<html:pre>password required pam_cracklib.so try_first_pass retry=3 maxrepeat=3 minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 difok=4</html:pre>
If no such line exists, add one as the first line of the password section in <html:code>/etc/pam.d/system-auth</html:code>.
The arguments can be modified to ensure compliance with
your organization's security policy. Discussion of each parameter follows.
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that the password quality
requirements are not enforced for the root account for some
reason.</ns10:warning>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_retry" operator="equals" type="number">
<ns10:title xml:lang="en-US">retry</ns10:title>
<ns10:description xml:lang="en-US">Number of retry attempts before erroring out</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" operator="equals" type="number">
<ns10:title xml:lang="en-US">maxrepeat</ns10:title>
<ns10:description xml:lang="en-US">Maximum Number of Consecutive Repeating Characters in a Password</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_minlen" operator="equals" type="number">
<ns10:title xml:lang="en-US">minlen</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters in password</ns10:description>
<ns10:value>14</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="8">8</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="12">12</ns10:value>
<ns10:value selector="14">14</ns10:value>
<ns10:value selector="15">15</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">dcredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of digits in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">ocredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of other (special characters) in
password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">lcredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of lower case in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">ucredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of upper case in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_difok" operator="equals" type="number">
<ns10:title xml:lang="en-US">difok</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters not present in old
password</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Keep this high for short
passwords</ns10:warning>
<ns10:value>4</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="5">5</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_minclass" operator="equals" type="number">
<ns10:title xml:lang="en-US">minclass</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of categories of characters that must exist in a password</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="4">4</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_deny</ns10:title>
<ns10:description xml:lang="en-US">Number of failed login attempts before account lockout</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="10">10</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_unlock_time</ns10:title>
<ns10:description xml:lang="en-US">Seconds before automatic unlocking after excessive failed logins</ns10:description>
<ns10:value>604800</ns10:value>
<ns10:value selector="900">900</ns10:value>
<ns10:value selector="1800">1800</ns10:value>
<ns10:value selector="3600">3600</ns10:value>
<ns10:value selector="86400">86400</ns10:value>
<ns10:value selector="604800">604800</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_interval</ns10:title>
<ns10:description xml:lang="en-US">Interval for counting failed login attempts before account lockout</ns10:description>
<ns10:value>900</ns10:value>
<ns10:value selector="900">900</ns10:value>
<ns10:value selector="1800">1800</ns10:value>
<ns10:value selector="3600">3600</ns10:value>
<ns10:value selector="86400">86400</ns10:value>
<ns10:value selector="100000000">100000000</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Retry Prompts Permitted Per-Session</ns10:title>
<ns10:description xml:lang="en-US">To configure the number of retry prompts that are permitted per-session:
<html:br /><html:br />
Edit the <html:code>pam_cracklib.so</html:code> statement in <html:code>/etc/pam.d/system-auth</html:code> to
show <html:code>retry=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" use="legacy" /></html:code>, or a lower value if site policy is more restrictive.
<html:br /><html:br />
The DoD requirement is a maximum of 3 prompts per session.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password retry prompts that are permitted on a per-session basis to a low value
requires some software, such as SSH, to re-connect. This can slow down and
draw additional attention to some types of password-guessing attacks. Note that this
is different from account lockout, which is provided by the pam_faillock module.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_retry:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_retry" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_retry:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_retry_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password to Maximum of Three Consecutive Repeating Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>maxrepeat</html:code> parameter controls requirements for
consecutive repeating characters. When set to a positive number, it will reject passwords
which contain more than that number of consecutive characters. Add <html:code>maxrepeat=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /></html:code>
after pam_cracklib.so to prevent a run of (<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /> + 1) or more identical characters:<html:br />
<html:pre>password required pam_cracklib.so maxrepeat=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_maxrepeat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_maxrepeat="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" />"
if grep -q "maxrepeat=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(maxrepeat *= *\).*/\1$var_password_pam_maxrepeat/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ maxrepeat=$var_password_pam_maxrepeat/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_maxrepeat:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_maxrepeat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_maxrepeat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Digit Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>dcredit</html:code> parameter controls requirements for
usage of digits in a password. When set to a negative number, any password will be required to
contain that many digits. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each digit.
Add <html:code>dcredit=-1</html:code> after pam_cracklib.so to require use of a digit in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">194</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring digits makes password guessing attacks more difficult by ensuring a larger
search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_dcredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_dcredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" use="legacy" />"
if grep -q "dcredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(dcredit *= *\).*/\1$var_password_pam_dcredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ dcredit=$var_password_pam_dcredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_dcredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_dcredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_dcredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_minlen" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Minimum Length</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>minlen</html:code> parameter controls requirements for
minimum characters required in a password. Add <html:code>minlen=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy" /></html:code>
after pam_pwquality to set minimum password length requirements.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">205</ns10:reference>
<ns10:rationale xml:lang="en-US">
Password length is one factor of several that helps to determine
strength and how long it takes to crack a password. Use of more characters in
a password helps to exponentially increase the time and/or resources
required to compromise the password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_minlen" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_minlen="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy" />"
if grep -q "minlen=" /etc/pam.d/system-auth
then
sed -i --follow-symlinks "s/\(minlen *= *\).*/\1$var_password_pam_minlen/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ minlen=$var_password_pam_minlen/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_minlen:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_minlen" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_minlen:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_minlen_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Uppercase Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>ucredit=</html:code> parameter controls requirements for
usage of uppercase letters in a password. When set to a negative number, any password will be required to
contain that many uppercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each uppercase character.
Add <html:code>ucredit=-1</html:code> after pam_cracklib.so to require use of an upper case character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">192</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of uppercase characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_ucredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_ucredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" use="legacy" />"
if grep -q "ucredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(ucredit *= *\).*/\1$var_password_pam_ucredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ ucredit=$var_password_pam_ucredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_ucredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_ucredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_ucredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Special Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>ocredit=</html:code> parameter controls requirements for
usage of special (or ``other'') characters in a password. When set to a negative number, any password will be required to
contain that many special characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each special character.
Add <html:code>ocredit=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" use="legacy" /></html:code> after pam_cracklib.so to require use of a special character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1619</ns10:reference>
<ns10:reference href="">266</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of special characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_ocredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_ocredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" use="legacy" />"
if grep -q "ocredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(ocredit *= *\).*/\1$var_password_pam_ocredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ ocredit=$var_password_pam_ocredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_ocredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_ocredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_ocredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Lowercase Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>lcredit=</html:code> parameter controls requirements for
usage of lowercase letters in a password. When set to a negative number, any password will be required to
contain that many lowercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each lowercase character.
Add <html:code>lcredit=-1</html:code> after pam_cracklib.so to require use of a lowercase character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">193</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of lowercase characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_lcredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_lcredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" use="legacy" />"
if grep -q "lcredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(lcredit *= *\).*/\1$var_password_pam_lcredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ lcredit=$var_password_pam_lcredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_lcredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_lcredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_lcredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Different Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>difok</html:code> parameter controls requirements for
usage of different characters during a password change.
Add <html:code>difok=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy" /></html:i></html:code> after pam_cracklib.so to require differing
characters when changing passwords. The DoD requirement is <html:code>4</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">195</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of different characters during password changes ensures that
newly changed passwords should not resemble previously compromised ones.
Note that passwords which are changed on compromised systems will still be compromised, however.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_difok" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_difok="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy" />"
if grep -q "difok=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(difok *= *\).*/\1$var_password_pam_difok/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ difok=$var_password_pam_difok/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_difok:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_difok" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_difok:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_difok_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_minclass" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Different Categories</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>minclass</html:code> parameter controls requirements for
usage of different character classes, or types, of character that must exist in a password
before it is considered valid. For example, setting this value to three (3) requires that
any password must have characters from at least three different categories in order to be
approved. The default value is zero (0), meaning there are no required classes. There are
four categories available:
<html:pre>
* Upper-case characters
* Lower-case characters
* Digits
* Special characters (for example, punctuation)
</html:pre>
Add <html:code>minclass=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" /></html:i></html:code> after pam_cracklib.so entry into the
<html:code>/etc/pam.d/system-auth</html:code> file in order to require <ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" /> differing categories of
characters when changing passwords.
For example to require at least three character classes to be used in password, use <html:code>minclass=3</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of character categories makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_minclass" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_minclass="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" />"
grep -q minclass /etc/pam.d/system-auth
if [ $? = "0" ]; then
sed --follow-symlinks -i "/pam_cracklib.so/s/minclass=[0-$var_password_pam_minclass]/minclass=$var_password_pam_minclass/" /etc/pam.d/system-auth
else
sed --follow-symlinks -i "/pam_cracklib.so/s/pam_cracklib.so /pam_cracklib.so minclass=$var_password_pam_minclass /" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_minclass:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_minclass" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_minclass:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_minclass_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_locking_out_password_attempts">
<ns10:title xml:lang="en-US">Set Lockouts for Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>pam_faillock</html:code> PAM module provides the capability to
lock out user accounts after a number of failed login attempts. Its
documentation is available in
<html:code>/usr/share/doc/pam-VERSION/txts/README.pam_faillock</html:code>.
<html:br /><html:br />
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Locking out user accounts presents the
risk of a denial-of-service attack. The lockout policy
must weigh whether the risk of such a
denial-of-service attack outweighs the benefits of thwarting
password guessing attacks.</ns10:warning>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Deny For Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to lock out accounts after a number of incorrect login
attempts using <html:code>pam_faillock.so</html:code>, modify the content of both
<html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">44</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts
prevents direct password guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_deny" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_deny="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, deny directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*deny=" $pamFile; then
# both pam_faillock.so & deny present, just correct deny directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(deny *= *\).*/\1\2$var_accounts_passwords_pam_faillock_deny/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(deny *= *\).*/\1\2$var_accounts_passwords_pam_faillock_deny/" $pamFile
# pam_faillock.so present, but deny directive not yet
else
# append correct deny value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ deny=$var_accounts_passwords_pam_faillock_deny/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ deny=$var_accounts_passwords_pam_faillock_deny/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'deny' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent deny=$var_accounts_passwords_pam_faillock_deny" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail deny=$var_accounts_passwords_pam_faillock_deny" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_deny:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_deny_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Lockout Time For Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to lock out accounts after a number of incorrect login
attempts and require an administrator to unlock the account using <html:code>pam_faillock.so</html:code>,
modify the content of both <html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">47</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts
prevents direct password guessing attacks. Ensuring that an administrator is
involved in unlocking locked accounts draws appropriate attention to such
situations.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_unlock_time" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_unlock_time="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, unlock_time directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*unlock_time=" $pamFile; then
# both pam_faillock.so & unlock_time present, just correct unlock_time directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(unlock_time *= *\).*/\1\2$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(unlock_time *= *\).*/\1\2$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
# pam_faillock.so present, but unlock_time directive not yet
else
# append correct unlock_time value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ unlock_time=$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ unlock_time=$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'unlock_time' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent unlock_time=$var_accounts_passwords_pam_faillock_unlock_time" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail unlock_time=$var_accounts_passwords_pam_faillock_unlock_time" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_unlock_time:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Interval For Counting Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
Utilizing <html:code>pam_faillock.so</html:code>, the <html:code>fail_interval</html:code> directive configures the system to lock out accounts after a number of incorrect login
attempts. Modify the content of both <html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1452</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts within a
specific period of time prevents direct password guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_interval" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_fail_interval="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, 'fail_interval' directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*fail_interval=" $pamFile; then
# both pam_faillock.so & 'fail_interval' present, just correct 'fail_interval' directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(fail_interval *= *\).*/\1\2$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(fail_interval *= *\).*/\1\2$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
# pam_faillock.so present, but 'fail_interval' directive not yet
else
# append correct 'fail_interval' value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ fail_interval=$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ fail_interval=$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'fail_interval' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent fail_interval=$var_accounts_passwords_pam_faillock_fail_interval" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail fail_interval=$var_accounts_passwords_pam_faillock_fail_interval" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_interval:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_interval_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Limit Password Reuse</ns10:title>
<ns10:description xml:lang="en-US">Do not allow users to reuse recent passwords. This can be
accomplished by using the <html:code>remember</html:code> option for the <html:code>pam_unix</html:code>
or <html:code>pam_pwhistory</html:code> PAM modules. In the file
<html:code>/etc/pam.d/system-auth</html:code>, append <html:code>remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:code>
to the line which refers to the <html:code>pam_unix.so</html:code> or
<html:code>pam_pwhistory.so</html:code>module, as shown below:
<html:ul><html:li>for the <html:code>pam_unix.so</html:code> case:
<html:pre>password sufficient pam_unix.so <html:i>existing_options</html:i> remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:pre>
</html:li><html:li>for the <html:code>pam_pwhistory.so</html:code> case:
<html:pre>password requisite pam_pwhistory.so <html:i>existing_options</html:i> remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:pre>
</html:li></html:ul>
The DoD STIG requirement is 5 passwords.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">200</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing re-use of previous passwords helps ensure that a compromised password is not re-used by a user.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_unix_remember" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_unix_remember="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" />"
if grep -q "remember=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(^password.*sufficient.*pam_unix.so.*\)\(\(remember *= *\)[^ $]*\)/\1remember=$var_password_pam_unix_remember/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/^password[[:space:]]\+sufficient[[:space:]]\+pam_unix.so/ s/$/ remember=$var_password_pam_unix_remember/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_unix_remember:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_unix_remember:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_set_password_hashing_algorithm">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm</ns10:title>
<ns10:description xml:lang="en-US">The system's default algorithm for storing password hashes in
<html:code>/etc/shadow</html:code> is SHA-512. This can be configured in several
locations.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/pam.d/system-auth</html:code>, the <html:code>password</html:code> section of
the file controls which PAM modules execute during a password change.
Set the <html:code>pam_unix.so</html:code> module in the
<html:code>password</html:code> section to include the argument <html:code>sha512</html:code>, as shown below:
<html:pre>password sufficient pam_unix.so sha512 <html:i>other arguments...</html:i></html:pre>
This will help ensure when local users change their passwords, hashes for the new
passwords will be generated using the SHA-512 algorithm.
This is the default.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_password_hashing_algorithm_systemauth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/login.defs</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/login.defs</html:code>, add or correct the following line to ensure
the system will use SHA-512 as the hashing algorithm:
<html:pre>ENCRYPT_METHOD SHA512</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_password_hashing_algorithm_logindefs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">if grep --silent ^ENCRYPT_METHOD /etc/login.defs ; then
sed -i 's/^ENCRYPT_METHOD.*/ENCRYPT_METHOD SHA512/g' /etc/login.defs
else
echo "" >> /etc/login.defs
echo "ENCRYPT_METHOD SHA512" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/libuser.conf</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/libuser.conf</html:code>, add or correct the following line in its
<html:code>[defaults]</html:code> section to ensure the system will use the SHA-512
algorithm for password hashing:
<html:pre>crypt_style = sha512</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_libuserconf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_libuserconf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts-session">
<ns10:title xml:lang="en-US">Secure Session Configuration Files for Login Accounts</ns10:title>
<ns10:description xml:lang="en-US">When a user logs into a Unix account, the system
configures the user's session by reading a number of files. Many of
these files are located in the user's home directory, and may have
weak permissions as a result of user error or misconfiguration. If
an attacker can modify or even read certain types of account
configuration information, they can often gain full access to the
affected user's account. Therefore, it is important to test and
correct configuration file permissions for interactive accounts,
particularly those of privileged users such as root or system
administrators.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" operator="equals" type="number">
<ns10:title xml:lang="en-US">Maximum concurrent login sessions</ns10:title>
<ns10:description xml:lang="en-US">Maximum number of concurrent sessions by a user</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="15">15</ns10:value>
<ns10:value selector="20">20</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_tmout" operator="equals" type="number">
<ns10:title xml:lang="en-US">Account Inactivity Timeout (minutes)</ns10:title>
<ns10:description xml:lang="en-US">In an interactive shell, the value is interpreted as the
number of seconds to wait for input after issueing the primary prompt.
Bash terminates after waiting for that number of seconds if input does
not arrive.</ns10:description>
<ns10:value>600</ns10:value>
<ns10:value selector="5_min">300</ns10:value>
<ns10:value selector="10_min">600</ns10:value>
<ns10:value selector="15_min">900</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Interactive Session Timeout</ns10:title>
<ns10:description xml:lang="en-US">
Terminating an idle session within a short time period reduces
the window of opportunity for unauthorized personnel to take control of a
management session enabled on the console or console port that has been
left unattended.
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_tmout:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_tmout" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_tmout:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_tmout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit the Number of Concurrent Login Sessions Allowed Per User</ns10:title>
<ns10:description xml:lang="en-US">
Limiting the number of allowed users and sessions per user can limit risks related to Denial of
Service attacks. This addresses concurrent sessions for a single account and does not address
concurrent sessions by a single user via multiple accounts. The DoD requirement is 10. To set the number of concurrent
sessions per user add the following line in <html:code>/etc/security/limits.conf</html:code>:
<html:pre>* hard maxlogins <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-10</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">54</ns10:reference>
<ns10:rationale xml:lang="en-US">Limiting simultaneous user logins can insulate the system from denial of service
problems caused by excessive logins. Automated login processes operating improperly or
maliciously may result in an exceptional number of simultaneous login sessions.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_max_concurrent_login_sessions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_max_concurrent_login_sessions="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy" />"
if grep -q '^[^#]*\<maxlogins\>' /etc/security/limits.d/*.conf; then
sed -i "/^[^#]*\<maxlogins\>/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.d/*.conf
elif grep -q '^[^#]*\<maxlogins\>' /etc/security/limits.conf; then
sed -i "/^[^#]*\<maxlogins\>/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.conf
else
echo "* hard maxlogins $var_accounts_max_concurrent_login_sessions" >> /etc/security/limits.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_max_concurrent_login_sessions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_root_paths">
<ns10:title xml:lang="en-US">Ensure that No Dangerous Directories Exist in Root's Path</ns10:title>
<ns10:description xml:lang="en-US">The active path of the root account can be obtained by
starting a new root shell and running:
<html:pre>$ sudo echo $PATH</html:pre>
This will produce a colon-separated list of
directories in the path.
<html:br /><html:br />
Certain path elements could be considered dangerous, as they could lead
to root executing unknown or
untrusted programs, which could contain malicious
code.
Since root may sometimes work inside
untrusted directories, the <html:code>.</html:code> character, which represents the
current directory, should never be in the root path, nor should any
directory which can be written to by an unprivileged or
semi-privileged (system) user.
<html:br /><html:br />
It is a good practice for administrators to always execute
privileged commands by typing the full path to the
command.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_root_path_no_dot" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that Root's Path Does Not Include Relative Paths or Null Directories</ns10:title>
<ns10:description xml:lang="en-US">
Ensure that none of the directories in root's path is equal to a single
<html:code>.</html:code> character, or
that it contains any instances that lead to relative path traversal, such as
<html:code>..</html:code> or beginning a path without the slash (<html:code>/</html:code>) character.
Also ensure that there are no "empty" elements in the path, such as in these examples:
<html:pre>PATH=:/bin
PATH=/bin:
PATH=/bin::/sbin</html:pre>
These empty elements have the same effect as a single <html:code>.</html:code> character.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Including these entries increases the risk that root could
execute code from an untrusted location.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-root_path_no_dot:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that Root's Path Does Not Include World or Group-Writable Directories</ns10:title>
<ns10:description xml:lang="en-US">
For each element in root's path, run:
<html:pre>$ sudo ls -ld <html:i>DIR</html:i></html:pre>
and ensure that write permissions are disabled for group and
other.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Such entries increase the risk that root could
execute code provided by unprivileged users,
and potentially malicious code.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_root_path_dirs_no_write:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that User Home Directories are not Group-Writable or World-Readable</ns10:title>
<ns10:description xml:lang="en-US">For each human user of the system, view the
permissions of the user's home directory:
<html:pre>$ sudo ls -ld /home/<html:i>USER</html:i></html:pre>
Ensure that the directory is not group-writable and that it
is not world-readable. If necessary, repair the permissions:
<html:pre>$ sudo chmod g-w /home/<html:i>USER</html:i>
$ sudo chmod o-rwx /home/<html:i>USER</html:i></html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This action may involve
modifying user home directories. Notify your user community, and
solicit input if appropriate, before making this type of
change.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:rationale xml:lang="en-US">
User home directories contain many configuration files which
affect the behavior of a user's account. No user should ever have
write permission to another user's home directory. Group shared
directories can be configured in sub-directories or elsewhere in the
filesystem if they are needed. Typically, user home directories
should not be world-readable, as it would disclose file names
to other users. If a subset of users need read access
to one another's home directories, this can be provided using
groups or ACLs.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_home_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_user_umask">
<ns10:title xml:lang="en-US">Ensure that Users Have Sensible Umask Values</ns10:title>
<ns10:description xml:lang="en-US">
The umask setting controls the default permissions
for the creation of new files.
With a default <html:code>umask</html:code> setting of 077, files and directories
created by users will not be readable by any other user on the
system. Users who wish to make specific files group- or
world-readable can accomplish this by using the chmod command.
Additionally, users can make all their files readable to their
group by default by setting a <html:code>umask</html:code> of 027 in their shell
configuration files. If default per-user groups exist (that is, if
every user has a default group whose name is the same as that
user's username and whose only member is the user), then it may
even be safe for users to select a <html:code>umask</html:code> of 007, making it very
easy to intentionally share files with groups of which the user is
a member.
<html:br /><html:br />
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" operator="equals" type="string">
<ns10:title xml:lang="en-US">Sensible umask</ns10:title>
<ns10:description xml:lang="en-US">Enter default user umask</ns10:description>
<ns10:value>027</ns10:value>
<ns10:value selector="007">007</ns10:value>
<ns10:value selector="022">022</ns10:value>
<ns10:value selector="027">027</ns10:value>
<ns10:value selector="077">077</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Bash Umask is Set Correctly</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask for users of the Bash shell is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/bashrc</html:code> to read
as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_bashrc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/bashrc && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/bashrc
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/bashrc
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_bashrc:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_bashrc_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default C Shell Umask is Set Correctly</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask for users of the C shell is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/csh.cshrc</html:code> to read as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_csh_cshrc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/csh.cshrc && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/csh.cshrc
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/csh.cshrc
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_csh_cshrc:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_csh_cshrc_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Umask is Set Correctly in /etc/profile</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask controlled by <html:code>/etc/profile</html:code> is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/profile</html:code> to read as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_profile" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/profile && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/profile
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/profile
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_profile:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Umask is Set Correctly in login.defs</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask controlled by <html:code>/etc/login.defs</html:code> is set properly,
add or correct the <html:code>UMASK</html:code> setting in <html:code>/etc/login.defs</html:code> to read as follows:
<html:pre>UMASK <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read and
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q UMASK /etc/login.defs && \
sed -i "s/UMASK.*/UMASK $var_accounts_user_umask/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "UMASK $var_accounts_user_umask" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts-physical">
<ns10:title xml:lang="en-US">Protect Physical Console Access</ns10:title>
<ns10:description xml:lang="en-US">It is impossible to fully protect a system from an
attacker with physical access, so securing the space in which the
system is located should be considered a necessary step. However,
there are some steps which, if taken, make it more difficult for an
attacker to quickly or undetectably modify a system from its
console.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_bootloader">
<ns10:title xml:lang="en-US">Set Boot Loader Password</ns10:title>
<ns10:description xml:lang="en-US">During the boot process, the boot loader is
responsible for starting the execution of the kernel and passing
options to it. The boot loader allows for the selection of
different kernels - possibly on different partitions or media.
The default Red Hat Enterprise Linux boot loader for x86 systems is called GRUB.
Options it can pass to the kernel include <html:i>single-user mode</html:i>, which
provides root access without any authentication, and the ability to
disable SELinux. To prevent local users from modifying the boot
parameters and endangering security, protect the boot loader configuration
with a password and ensure its configuration file's permissions
are set properly.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /etc/grub.conf User Ownership</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/grub.conf</html:code> should
be owned by the <html:code>root</html:code> user to prevent destruction
or modification of the file.
To properly set the owner of <html:code>/etc/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/grub.conf </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
Only root should be able to modify important boot parameters.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_user_owner_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_user_owner_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_user_owner_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /etc/grub.conf Group Ownership</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/grub.conf</html:code> should
be group-owned by the <html:code>root</html:code> group to prevent
destruction or modification of the file.
To properly set the group owner of <html:code>/etc/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/grub.conf </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>root</html:code> group is a highly-privileged group. Furthermore, the group-owner of this
file should not have any access privileges anyway.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_group_owner_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_group_owner_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_group_owner_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /boot/grub/grub.conf Permissions</ns10:title>
<ns10:description xml:lang="en-US">File permissions for <html:code>/boot/grub/grub.conf</html:code> should be set to 600, which
is the default.
To properly set the permissions of <html:code>/boot/grub/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 600 /boot/grub/grub.conf</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
Proper permissions ensure that only the root user can modify important boot
parameters.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 600 /boot/grub/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_password" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Boot Loader Password</ns10:title>
<ns10:description xml:lang="en-US">The grub boot loader should have password protection
enabled to protect boot-time settings.
To do so, select a password and then generate a hash from it by running the following command:
<html:pre>$ grub-crypt --sha-512</html:pre>
When prompted to enter a password, insert the following line into <html:code>/etc/grub.conf</html:code>
immediately after the header comments. (Use the output from <html:code>grub-crypt</html:code> as the
value of <html:b>password-hash</html:b>):
<html:pre>password --encrypted <html:b>password-hash</html:b></html:pre>
NOTE: To meet FISMA Moderate, the bootloader password MUST differ from the root password.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(e) AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
Password protection on the boot loader configuration ensures
users with physical access cannot trivially alter
important bootloader settings. These include which kernel to use,
and whether to enter single-user mode.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_password:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-bootloader_password_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Require Authentication for Single User Mode</ns10:title>
<ns10:description xml:lang="en-US">Single-user mode is intended as a system recovery
method, providing a single user root access to the system by
providing a boot option at startup. By default, no authentication
is performed if single-user mode is selected.
<html:br /><html:br />
To require entry of the root password even if the system is
started in single-user mode, add or correct the following line in the
file <html:code>/etc/sysconfig/init</html:code>:
<html:pre>SINGLE=/sbin/sulogin</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
This prevents attackers with physical access from trivially bypassing security
on the machine and gaining root access. Such accesses are further prevented
by configuring the bootloader password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="require_singleuser_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^SINGLE /etc/sysconfig/init && \
sed -i "s/SINGLE.*/SINGLE=\/sbin\/sulogin/g" /etc/sysconfig/init
if ! [ $? -eq 0 ]; then
echo "SINGLE=/sbin/sulogin" >> /etc/sysconfig/init
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-require_singleuser_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-require_singleuser_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Activation</ns10:title>
<ns10:description xml:lang="en-US">
By default, the system includes the following line in
<html:code>/etc/init/control-alt-delete.conf</html:code>
to reboot the system when the Ctrl-Alt-Del key sequence is pressed:
<html:pre>exec /sbin/shutdown -r now "Control-Alt-Delete pressed"</html:pre>
<html:br />
To configure the system to log a message instead of
rebooting the system, alter that line to read as follows:
<html:pre>exec /usr/bin/logger -p security.info "Control-Alt-Delete pressed"</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Disabling the <html:code>Ctrl-Alt-Del</html:code> key sequence
in <html:code>/etc/init/control-alt-delete.conf</html:code> DOES NOT disable the <html:code>Ctrl-Alt-Del</html:code>
key sequence if running in <html:code>runlevel 6</html:code> (e.g. in GNOME, KDE, etc.)! The
<html:code>Ctrl-Alt-Del</html:code> key sequence will only be disabled if running in
the non-graphical <html:code>runlevel 3</html:code>.
</ns10:warning>
<ns10:rationale xml:lang="en-US">
A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.
In the GNOME graphical environment, risk of unintentional reboot from the
Ctrl-Alt-Del sequence is reduced because the user will be
prompted before any action is taken.
NOTE: When updating the <html:code>initscripts</html:code> package on a Red Hat Enterprise
Linux 6 system, custom changes to <html:code>/etc/init/control-alt-delete.conf</html:code>
may be overwritten. Refer to <html:b><html:a href="https://access.redhat.com/site/solutions/70464">https://access.redhat.com/site/solutions/70464</html:a></html:b>
for additional information.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_ctrlaltdel_reboot" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># If system does not contain control-alt-delete.override,
if [ ! -f /etc/init/control-alt-delete.override ]; then
# but does have control-alt-delete.conf file,
if [ -f /etc/init/control-alt-delete.conf ]; then
# then copy .conf to .override to maintain persistency
cp /etc/init/control-alt-delete.conf /etc/init/control-alt-delete.override
fi
fi
sed -i 's,^exec.*$,exec /usr/bin/logger -p authpriv.notice -t init "Ctrl-Alt-Del was pressed and ignored",' /etc/init/control-alt-delete.override
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_ctrlaltdel_reboot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Interactive Boot</ns10:title>
<ns10:description xml:lang="en-US">
To disable the ability for users to perform interactive startups, perform both
of the following:
<html:ol><html:li>Edit the file <html:code>/etc/sysconfig/init</html:code>. Add or correct the line:
<html:pre>PROMPT=no</html:pre></html:li><html:li>Inspect the kernel boot arguments (which follow the word <html:code>kernel</html:code>)
in <html:code>/etc/grub.conf</html:code> and ensure the <html:code>confirm</html:code> argument is <html:b>not</html:b>
present.</html:li></html:ol>
Both the <html:code>PROMPT</html:code> option of the <html:code>/etc/sysconfig/init</html:code> file and
the <html:code>confirm</html:code> kernel boot argument of the <html:code>/etc/grub.conf</html:code> file
allow the console user to perform an interactive system startup, in which it is
possible to select the set of services which are started on boot.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-2</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using interactive boot, the console user could disable auditing, firewalls, or
other services, weakening system security.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_interactive_boot" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Ensure value of PROMPT key in /etc/sysconfig/init is set to 'no'
grep -q ^PROMPT /etc/sysconfig/init && \
sed -i "s/PROMPT.*/PROMPT=no/g" /etc/sysconfig/init
if ! [ $? -eq 0 ]; then
echo "PROMPT=no" >> /etc/sysconfig/init
fi
# Ensure 'confirm' kernel boot argument is not present in some of
# kernel lines in /etc/grub.conf
sed -i --follow-symlinks "s/confirm//gI" /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_interactive_boot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_interactive_boot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_screen_locking">
<ns10:title xml:lang="en-US">Configure Screen Locking</ns10:title>
<ns10:description xml:lang="en-US">When a user must temporarily leave an account
logged-in, screen locking should be employed to prevent passersby
from abusing the account. User education and training is
particularly important for screen locking to be effective, and policies
can be implemented to reinforce this.
<html:br /><html:br />
Automatic screen locking is only meant as a safeguard for
those cases where a user forgot to lock the screen.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_console_screen_locking">
<ns10:title xml:lang="en-US">Configure Console Screen Locking</ns10:title>
<ns10:description xml:lang="en-US">
A console screen locking mechanism is provided in the
<html:code>screen</html:code> package, which is not installed by default.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install the screen Package</ns10:title>
<ns10:description xml:lang="en-US">
To enable console screen locking, install the <html:code>screen</html:code> package:
<html:pre>$ sudo yum install screen</html:pre>
Instruct users to begin new terminal sessions with the following command:
<html:pre>$ screen</html:pre>
The console can now be locked with the following key combination:
<html:pre>ctrl+a x</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">58</ns10:reference>
<ns10:rationale xml:lang="en-US">
Installing <html:code>screen</html:code> ensures a console locking capability is available
for users who may need to suspend console logins.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install screen
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure screen is installed
package:
name="{{item}}"
state=present
with_items:
- screen
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_screen
class install_screen {
package { 'screen':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=screen
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_screen_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_screen_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_smart_card_login">
<ns10:title xml:lang="en-US">Hardware Tokens for Authentication</ns10:title>
<ns10:description xml:lang="en-US">
The use of hardware tokens such as smart cards for system login
provides stronger, two-factor authentication than using a username and password.
In Red Hat Enterprise Linux servers and workstations, hardware token login
is not enabled by default and must be enabled in the system settings.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Smart Card Login</ns10:title>
<ns10:description xml:lang="en-US">
To enable smart card authentication, consult the documentation at:
<html:ul><html:li><html:b><html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/enabling-smart-card-login.html">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/enabling-smart-card-login.html</html:a></html:b></html:li></html:ul>
For guidance on enabling SSH to authenticate against a Common Access Card (CAC), consult documentation at:
<html:ul><html:li><html:b><html:a href="https://access.redhat.com/solutions/82273">https://access.redhat.com/solutions/82273</html:a></html:b></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">767</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">768</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">771</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">772</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">884</ns10:reference>
<ns10:rationale xml:lang="en-US">Smart card login provides two-factor authentication stronger than
that provided by a username and password combination. Smart cards leverage PKI
(public key infrastructure) in order to provide and verify credentials.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="smartcard_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Install required packages
yum -y install esc
yum -y install pam_pkcs11
# Enable pcscd service
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable pcscd
# Configure the expected /etc/pam.d/system-auth{,-ac} settings directly
#
# The code below will configure system authentication in the way smart card
# logins will be enabled, but also user login(s) via other method to be allowed
#
# NOTE: In contrast to Red Hat Enterprise Linux 7 version of this remediation
# script (based on the testing) it does NOT seem to be possible to use
# the 'authconfig' command to perform the remediation for us. Because:
#
# * calling '/usr/sbin/authconfig --enablesmartcard --update'
# does not update all the necessary files, while
#
# * calling '/usr/sbin/authconfig --enablesmartcard --updateall'
# discards the necessary changes on /etc/pam_pkcs11/pam_pkcs11.conf
# performed subsequently below
#
# Therefore we configure /etc/pam.d/system-auth{,-ac} settings directly.
#
# Define system-auth config location
SYSTEM_AUTH_CONF="/etc/pam.d/system-auth"
# Define expected 'pam_env.so' row in $SYSTEM_AUTH_CONF
PAM_ENV_SO="auth.*required.*pam_env.so"
# Define 'pam_succeed_if.so' row to be appended past $PAM_ENV_SO row into $SYSTEM_AUTH_CONF
SYSTEM_AUTH_PAM_SUCCEED="\
auth \[success=1 default=ignore\] pam_succeed_if.so service notin \
login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver quiet use_uid"
# Define 'pam_pkcs11.so' row to be appended past $SYSTEM_AUTH_PAM_SUCCEED
# row into SYSTEM_AUTH_CONF file
SYSTEM_AUTH_PAM_PKCS11="\
auth \[success=done authinfo_unavail=ignore ignore=ignore default=die\] \
pam_pkcs11.so card_only"
# Define smartcard-auth config location
SMARTCARD_AUTH_CONF="/etc/pam.d/smartcard-auth"
# Define 'pam_pkcs11.so' auth section to be appended past $PAM_ENV_SO into $SMARTCARD_AUTH_CONF
SMARTCARD_AUTH_SECTION="\
auth [success=done ignore=ignore default=die] pam_pkcs11.so wait_for_card card_only"
# Define expected 'pam_permit.so' row in $SMARTCARD_AUTH_CONF
PAM_PERMIT_SO="account.*required.*pam_permit.so"
# Define 'pam_pkcs11.so' password section
SMARTCARD_PASSWORD_SECTION="\
password required pam_pkcs11.so"
# First Correct the SYSTEM_AUTH_CONF configuration
if ! grep -q 'pam_pkcs11.so' "$SYSTEM_AUTH_CONF"
then
# Append (expected) pam_succeed_if.so row past the pam_env.so into SYSTEM_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_ENV_SO"'/a '"$SYSTEM_AUTH_PAM_SUCCEED" "$SYSTEM_AUTH_CONF"
# Append (expected) pam_pkcs11.so row past the pam_succeed_if.so into SYSTEM_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$SYSTEM_AUTH_PAM_SUCCEED"'/a '"$SYSTEM_AUTH_PAM_PKCS11" "$SYSTEM_AUTH_CONF"
fi
# Then also correct the SMARTCARD_AUTH_CONF
if ! grep -q 'pam_pkcs11.so' "$SMARTCARD_AUTH_CONF"
then
# Append (expected) SMARTCARD_AUTH_SECTION row past the pam_env.so into SMARTCARD_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_ENV_SO"'/a '"$SMARTCARD_AUTH_SECTION" "$SMARTCARD_AUTH_CONF"
# Append (expected) SMARTCARD_PASSWORD_SECTION row past the pam_permit.so into SMARTCARD_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_PERMIT_SO"'/a '"$SMARTCARD_PASSWORD_SECTION" "$SMARTCARD_AUTH_CONF"
fi
# Perform /etc/pam_pkcs11/pam_pkcs11.conf settings below
# Define selected constants for later reuse
SP="[:space:]"
PAM_PKCS11_CONF="/etc/pam_pkcs11/pam_pkcs11.conf"
# Ensure OCSP is turned on in $PAM_PKCS11_CONF
# 1) First replace any occurrence of 'none' value of 'cert_policy' key setting with the correct configuration
# On Red Hat Enterprise Linux 6 a space isn't required between 'cert_policy' key and value assignment !!!
sed -i "s/^[$SP]*cert_policy=none;/ cert_policy=ca, ocsp_on, signature;/g" "$PAM_PKCS11_CONF"
# 2) Then append 'ocsp_on' value setting to each 'cert_policy' key in $PAM_PKCS11_CONF configuration line,
# which does not contain it yet
# On Red Hat Enterprise Linux 6 a space isn't required between 'cert_policy' key and value assignment !!!
sed -i "/ocsp_on/! s/^[$SP]*cert_policy=\(.*\);/ cert_policy=\1, ocsp_on;/" "$PAM_PKCS11_CONF"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-smartcard_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-smartcard_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_accounts-banners">
<ns10:title xml:lang="en-US">Warning Banners for System Accesses</ns10:title>
<ns10:description xml:lang="en-US">Each system should expose as little information about
itself as possible.
<html:br /><html:br />
System banners, which are typically displayed just before a
login prompt, give out information about the service or the host's
operating system. This might include the distribution name and the
system kernel version, and the particular version of a network
service. This information can assist intruders in gaining access to
the system as it can reveal whether the system is running
vulnerable software. Most network services can be configured to
limit what information is displayed.
<html:br /><html:br />
Many organizations implement security policies that require a
system banner provide notice of the system's ownership, provide
warning to unauthorized users, and remind authorized users of their
consent to monitoring.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_login_banner_text" operator="equals" type="string">
<ns10:title xml:lang="en-US">Login Banner Verbiage</ns10:title>
<ns10:description xml:lang="en-US">Enter an appropriate login banner for your organization. Please note that new lines must
be expressed by the '\n' character and special characters like parentheses and quotation marks must be escaped with '\'.</ns10:description>
<ns10:value selector="usgcb_default">--[\s\n]+WARNING[\s\n]+--[\s\n]*This[\s\n]+system[\s\n]+is[\s\n]+for[\s\n]+the[\s\n]+use[\s\n]+of[\s\n]+authorized[\s\n]+users[\s\n]+only.[\s\n]+Individuals[\s\n]*using[\s\n]+this[\s\n]+computer[\s\n]+system[\s\n]+without[\s\n]+authority[\s\n]+or[\s\n]+in[\s\n]+excess[\s\n]+of[\s\n]+their[\s\n]*authority[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+having[\s\n]+all[\s\n]+their[\s\n]+activities[\s\n]+on[\s\n]+this[\s\n]+system[\s\n]*monitored[\s\n]+and[\s\n]+recorded[\s\n]+by[\s\n]+system[\s\n]+personnel.[\s\n]+Anyone[\s\n]+using[\s\n]+this[\s\n]*system[\s\n]+expressly[\s\n]+consents[\s\n]+to[\s\n]+such[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+advised[\s\n]+that[\s\n]*if[\s\n]+such[\s\n]+monitoring[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+criminal[\s\n]+activity[\s\n]*system[\s\n]+personal[\s\n]+may[\s\n]+provide[\s\n]+the[\s\n]+evidence[\s\n]+of[\s\n]+such[\s\n]+monitoring[\s\n]+to[\s\n]+law[\s\n]*enforcement[\s\n]+officials.</ns10:value>
<ns10:value selector="dod_default">You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:[\s\n]*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.[\s\n]*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.[\s\n]*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.[\s\n]*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests[\s\n]+--[\s\n]+not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.[\s\n]*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.</ns10:value>
<ns10:value selector="dss_odaa_default">[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.[\s\n]+This[\s\n]+is[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+and[\s\n]+related[\s\n]+equipment[\s\n]+are[\s\n]+intended[\s\n]+for[\s\n]+the[\s\n]+communication,[\s\n]+transmission,[\s\n]+processing,[\s\n]+and[\s\n]+storage[\s\n]+of[\s\n]+official[\s\n]+U.S.[\s\n]+Government[\s\n]+or[\s\n]+other[\s\n]+authorized[\s\n]+information[\s\n]+only.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times[\s\n]+to[\s\n]+ensure[\s\n]+proper[\s\n]+functioning[\s\n]+of[\s\n]+equipment[\s\n]+and[\s\n]+systems[\s\n]+including[\s\n]+security[\s\n]+devices[\s\n]+and[\s\n]+systems,[\s\n]+to[\s\n]+prevent[\s\n]+unauthorized[\s\n]+use[\s\n]+and[\s\n]+violations[\s\n]+of[\s\n]+statutes[\s\n]+and[\s\n]+security[\s\n]+regulations,[\s\n]+to[\s\n]+deter[\s\n]+criminal[\s\n]+activity,[\s\n]+and[\s\n]+for[\s\n]+other[\s\n]+similar[\s\n]+purposes.[\s\n]+Any[\s\n]+user[\s\n]+of[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+should[\s\n]+be[\s\n]+aware[\s\n]+that[\s\n]+any[\s\n]+information[\s\n]+placed[\s\n]+in[\s\n]+the[\s\n]+system[\s\n]+is[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+not[\s\n]+subject[\s\n]+to[\s\n]+any[\s\n]+expectation[\s\n]+of[\s\n]+privacy.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+violation[\s\n]+of[\s\n]+criminal[\s\n]+statutes,[\s\n]+this[\s\n]+evidence[\s\n]+and[\s\n]+any[\s\n]+other[\s\n]+related[\s\n]+information,[\s\n]+including[\s\n]+identification[\s\n]+information[\s\n]+about[\s\n]+the[\s\n]+user,[\s\n]+may[\s\n]+be[\s\n]+provided[\s\n]+to[\s\n]+law[\s\n]+enforcement[\s\n]+officials.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+reveals[\s\n]+violations[\s\n]+of[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+unauthorized[\s\n]+use,[\s\n]+employees[\s\n]+who[\s\n]+violate[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+make[\s\n]+unauthorized[\s\n]+use[\s\n]+of[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+appropriate[\s\n]+disciplinary[\s\n]+action.[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.</ns10:value>
<ns10:value selector="dod_short">I\'ve[\s\n]+read[\s\n]+\&[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreem\'t.</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Modify the System Login Banner</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system login banner:
<html:br /><html:br />
Edit <html:code>/etc/issue</html:code>. Replace the default text with a message
compliant with the local site policy or a legal disclaimer.
The DoD required text is either:
<html:br /><html:br />
<html:code>You are accessing a U.S. Government (USG) Information System (IS) that is
provided for USG-authorized use only. By using this IS (which includes any
device attached to this IS), you consent to the following conditions:
<html:br />-The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations.
<html:br />-At any time, the USG may inspect and seize data stored on this IS.
<html:br />-Communications using, or data stored on, this IS are not private, are subject
to routine monitoring, interception, and search, and may be disclosed or used
for any USG-authorized purpose.
<html:br />-This IS includes security measures (e.g., authentication and access controls)
to protect USG interests -- not for your personal benefit or privacy.
<html:br />-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative
searching or monitoring of the content of privileged communications, or work
product, related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details.</html:code>
<html:br /><html:br />
OR:
<html:br /><html:br />
<html:code>Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.
<html:br />This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended
for the communication, transmission, processing, and storage of official U.S. Government or other authorized
information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper
functioning of equipment and systems including security devices and systems, to prevent unauthorized use and
violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of
a DoD interest computer system should be aware that any information placed in the system is subject to
monitoring and is not subject to any expectation of privacy.
<html:br />If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal
statutes, this evidence and any other related information, including identification information about the user, may
be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals
violations of security regulations or unauthorized use, employees who violate security regulations or make
unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action.
<html:br />Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.</html:code>
<html:br /><html:br />
OR:
<html:br /><html:br />
<html:code>I've read & consent to terms in IS user agreem't.</html:code>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1384</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1385</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1387</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1388</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="banner_etc_issue" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
login_banner_text="<ns10:sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy" />"
# There was a regular-expression matching various banners, needs to be expanded
expanded=$(echo "$login_banner_text" | sed 's/\[\\s\\n\][+*]/ /g;s/\\//g;s/[^-]- /\n\n-/g')
formatted=$(echo "$expanded" | fold -sw 80)
cat <<EOF >/etc/issue
$formatted
EOF
printf "\n" >> /etc/issue
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-banner_etc_issue:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-banner_etc_issue_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_gui_login_banner">
<ns10:title xml:lang="en-US">Implement a GUI Warning Banner</ns10:title>
<ns10:description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen provided
by the GNOME Display Manager (GDM). The warning banner should be
displayed in this graphical environment for these users.
The following sections describe how to configure the GDM login
banner.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable GUI Warning Banner</ns10:title>
<ns10:description xml:lang="en-US">
To enable displaying a login warning banner in the GNOME
Display Manager's login screen, run the following command:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/banner_message_enable true</html:pre>
To display a banner, this setting must be enabled and then
banner text must also be set.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">50</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_enable_warning_gui_banner" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Enable displaying of a login warning banner in the GNOME Display Manager's
# login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gdm/simple-greeter/banner_message_enable true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_enable_warning_gui_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GUI Warning Banner Text</ns10:title>
<ns10:description xml:lang="en-US">
To set the text shown by the GNOME Display Manager
in the login screen, run the following command:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gdm/simple-greeter/banner_message_text \
"Text of the warning banner here"</html:pre>
When entering a warning banner that spans several lines, remember
to begin and end the string with <html:code>"</html:code>. This command writes
directly either to the <html:code>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</html:code>
if it exists or to the file <html:code>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</html:code>.
Either of these files can later be edited directly if necessary.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1384</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1385</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1387</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1388</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_set_login_banner_text" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
login_banner_text="<ns10:sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy" />"
# Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Expand the login_banner_text value - there was a regular-expression
# matching various banners, needs to be expanded
banner_expanded=$(echo "$login_banner_text" | sed 's/\[\\s\\n\][*+]/ /g;s/\\//g;')
# Set the text shown by the GNOME Display Manager in the login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type string \
--set /apps/gdm/simple-greeter/banner_message_text "${banner_expanded}"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_set_login_banner_text:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network">
<ns10:title xml:lang="en-US">Network Configuration and Firewalls</ns10:title>
<ns10:description xml:lang="en-US">Most machines must be connected to a network of some
sort, and this brings with it the substantial risk of network
attack. This section discusses the security impact of decisions
about networking which must be made when configuring a system.
<html:br /><html:br />
This section also discusses firewalls, network access
controls, and other network security frameworks, which allow
system-level rules to be written that can limit an attackers' ability
to connect to your system. These rules can specify that network
traffic should be allowed or denied from certain IP addresses,
hosts, and networks. The rules can also specify which of the
system's network services are available to particular hosts or
networks.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_network_disable_unused_interfaces">
<ns10:title xml:lang="en-US">Disable Unused Interfaces</ns10:title>
<ns10:description xml:lang="en-US">Network interfaces expand the attack surface of the
system. Unused interfaces are not monitored or controlled, and
should be disabled.
<html:br /><html:br />
If the system does not require network communications but still
needs to use the loopback interface, remove all files of the form
<html:code>ifcfg-<html:i>interface</html:i></html:code> except for <html:code>ifcfg-lo</html:code> from
<html:code>/etc/sysconfig/network-scripts</html:code>:
<html:pre>$ sudo rm /etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:pre>
If the system is a standalone machine with no need for network access or even
communication over the loopback device, then disable this service.
The <html:code>network</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig network off</html:pre>
</ns10:description>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Zeroconf Networking</ns10:title>
<ns10:description xml:lang="en-US">Zeroconf networking allows the system to assign itself an IP
address and engage in IP communication without a statically-assigned address or
even a DHCP server. Automatic address assignment via Zeroconf (or DHCP) is not
recommended. To disable Zeroconf automatic route assignment in the 169.254.0.0
subnet, add or correct the following line in <html:code>/etc/sysconfig/network</html:code>:
<html:pre>NOZEROCONF=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Zeroconf addresses are in the network 169.254.0.0. The networking
scripts add entries to the system's routing table for these addresses. Zeroconf
address assignment commonly occurs when the system is configured to use DHCP
but fails to receive an address assignment from the DHCP server.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="network_disable_zeroconf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "NOZEROCONF=yes" >> /etc/sysconfig/network
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_disable_zeroconf:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure System is Not Acting as a Network Sniffer</ns10:title>
<ns10:description xml:lang="en-US">The system should not be acting as a network sniffer, which can
capture all traffic on the network to which it is connected. Run the following
to determine if any interface is running in promiscuous mode:
<html:pre>$ ip link | grep PROMISC</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-3</ns10:reference>
<ns10:rationale xml:lang="en-US">If any results are returned, then a sniffing process (such as tcpdump
or Wireshark) is likely to be using the interface and this should be
investigated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_sniffer_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-kernel">
<ns10:title xml:lang="en-US">Kernel Parameters Which Affect Networking</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>sysctl</html:code> utility is used to set
parameters which affect the operation of the Linux kernel. Kernel parameters
which affect networking and have security implications are described here.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_network_host_parameters">
<ns10:title xml:lang="en-US">Network Parameters for Hosts Only</ns10:title>
<ns10:description xml:lang="en-US">If the system is not going to be used as a router, then setting certain
kernel parameters ensure that the host will not perform routing
of network traffic.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects by Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.send_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.send_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.send_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Sending ICMP redirects permits the system to instruct other systems
to update their routing information. The ability to send ICMP redirects is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_send_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.conf.default.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.send_redirects=0
#
# If net.ipv4.conf.default.send_redirects present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.conf.default.send_redirects = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.send_redirects /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.conf.default.send_redirects.*/net.ipv4.conf.default.send_redirects = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.send_redirects to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.send_redirects = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.send_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.send_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.send_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Sending ICMP redirects permits the system to instruct other systems
to update their routing information. The ability to send ICMP redirects is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_send_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.conf.all.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.send_redirects=0
#
# If net.ipv4.conf.all.send_redirects present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.conf.all.send_redirects = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.send_redirects /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.conf.all.send_redirects.*/net.ipv4.conf.all.send_redirects = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.send_redirects to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for IP Forwarding</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.ip_forward</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.ip_forward=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.ip_forward = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">IP forwarding permits the kernel to forward packets from one network
interface to another. The ability to forward packets between two networks is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_ip_forward" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.ip_forward
#
/sbin/sysctl -q -n -w net.ipv4.ip_forward=0
#
# If net.ipv4.ip_forward present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.ip_forward = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.ip_forward /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.ip_forward.*/net.ipv4.ip_forward = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.ip_forward to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.ip_forward = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network_host_and_router_parameters">
<ns10:title xml:lang="en-US">Network Related Kernel Runtime Parameters for Hosts and Routers</ns10:title>
<ns10:description xml:lang="en-US">Certain kernel parameters should be set for systems which are
acting as either hosts or routers to improve the system's ability defend
against certain types of IPv4 protocol attacks.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Disable ICMP Redirect Acceptance</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.secure_redirects</ns10:title>
<ns10:description xml:lang="en-US">Enable to prevent hijacking of routing path by only
allowing redirects from gateways known in routing
table.</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.log_martians</ns10:title>
<ns10:description xml:lang="en-US">Disable so you don't Log Spoofed Packets, Source
Routed Packets, Redirect Packets</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Disable IP source routing?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Disable ICMP Redirect Acceptance?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.secure_redirects</ns10:title>
<ns10:description xml:lang="en-US">Log packets with impossible addresses to kernel
log?</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.icmp_echo_ignore_broadcasts</ns10:title>
<ns10:description xml:lang="en-US">Ignore all ICMP ECHO and TIMESTAMP requests sent to it
via broadcast/multicast</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.icmp_ignore_bogus_error_responses</ns10:title>
<ns10:description xml:lang="en-US">Enable to prevent unnecessary logging</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.tcp_syncookies</ns10:title>
<ns10:description xml:lang="en-US">Enable to turn on TCP SYN Cookie
Protection</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.rp_filter</ns10:title>
<ns10:description xml:lang="en-US">Enable to enforce sanity checking, also called ingress
filtering or egress filtering. The point is to drop a packet if the
source and destination IP addresses in the IP header do not make
sense when considered in light of the physical interface on which
it arrived.</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.rp_filter</ns10:title>
<ns10:description xml:lang="en-US">Enables source route verification</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_accept_source_route" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_accept_source_route_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_source_route=$sysctl_net_ipv4_conf_all_accept_source_route_value
#
# If net.ipv4.conf.all.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.accept_source_route = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.accept_source_route /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.accept_source_route.*/net.ipv4.conf.all.accept_source_route = $sysctl_net_ipv4_conf_all_accept_source_route_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.accept_source_route to $sysctl_net_ipv4_conf_all_accept_source_route_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_source_route = $sysctl_net_ipv4_conf_all_accept_source_route_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1503</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting ICMP redirects has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_redirects=$sysctl_net_ipv4_conf_all_accept_redirects_value
#
# If net.ipv4.conf.all.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.accept_redirects.*/net.ipv4.conf.all.accept_redirects = $sysctl_net_ipv4_conf_all_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.accept_redirects to $sysctl_net_ipv4_conf_all_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_redirects = $sysctl_net_ipv4_conf_all_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Secure Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.secure_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.secure_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.secure_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1503</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting "secure" ICMP redirects (from those gateways listed as
default gateways) has few legitimate uses. It should be disabled unless it is
absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_secure_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_secure_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.secure_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.secure_redirects=$sysctl_net_ipv4_conf_all_secure_redirects_value
#
# If net.ipv4.conf.all.secure_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.secure_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.secure_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.secure_redirects.*/net.ipv4.conf.all.secure_redirects = $sysctl_net_ipv4_conf_all_secure_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.secure_redirects to $sysctl_net_ipv4_conf_all_secure_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.secure_redirects = $sysctl_net_ipv4_conf_all_secure_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Log Martian Packets</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.log_martians</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.log_martians=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.log_martians = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of "martian" packets (which have impossible addresses)
as well as spoofed packets, source-routed packets, and redirects could be a
sign of nefarious network activity. Logging these packets enables this activity
to be detected.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_log_martians" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_log_martians_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.log_martians
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.log_martians=$sysctl_net_ipv4_conf_all_log_martians_value
#
# If net.ipv4.conf.all.log_martians present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.log_martians = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.log_martians /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.log_martians.*/net.ipv4.conf.all.log_martians = $sysctl_net_ipv4_conf_all_log_martians_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.log_martians to $sysctl_net_ipv4_conf_all_log_martians_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.log_martians = $sysctl_net_ipv4_conf_all_log_martians_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_log_martians:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_accept_source_route" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_accept_source_route_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_source_route=$sysctl_net_ipv4_conf_default_accept_source_route_value
#
# If net.ipv4.conf.default.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.accept_source_route = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.accept_source_route /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.accept_source_route.*/net.ipv4.conf.default.accept_source_route = $sysctl_net_ipv4_conf_default_accept_source_route_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.accept_source_route to $sysctl_net_ipv4_conf_default_accept_source_route_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.accept_source_route = $sysctl_net_ipv4_conf_default_accept_source_route_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">This feature of the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_redirects=$sysctl_net_ipv4_conf_default_accept_redirects_value
#
# If net.ipv4.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.accept_redirects.*/net.ipv4.conf.default.accept_redirects = $sysctl_net_ipv4_conf_default_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.accept_redirects to $sysctl_net_ipv4_conf_default_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.accept_redirects = $sysctl_net_ipv4_conf_default_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Secure Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.secure_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.secure_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.secure_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting "secure" ICMP redirects (from those gateways listed as
default gateways) has few legitimate uses. It should be disabled unless it is
absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_secure_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_secure_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.secure_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.secure_redirects=$sysctl_net_ipv4_conf_default_secure_redirects_value
#
# If net.ipv4.conf.default.secure_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.secure_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.secure_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.secure_redirects.*/net.ipv4.conf.default.secure_redirects = $sysctl_net_ipv4_conf_default_secure_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.secure_redirects to $sysctl_net_ipv4_conf_default_secure_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.secure_redirects = $sysctl_net_ipv4_conf_default_secure_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.icmp_echo_ignore_broadcasts</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.icmp_echo_ignore_broadcasts = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Ignoring ICMP echo requests (pings) sent to broadcast or multicast
addresses makes the system slightly more difficult to enumerate on the network.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" use="legacy" />"
#
# Set runtime for net.ipv4.icmp_echo_ignore_broadcasts
#
/sbin/sysctl -q -n -w net.ipv4.icmp_echo_ignore_broadcasts=$sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value
#
# If net.ipv4.icmp_echo_ignore_broadcasts present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.icmp_echo_ignore_broadcasts = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.icmp_echo_ignore_broadcasts /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.icmp_echo_ignore_broadcasts.*/net.ipv4.icmp_echo_ignore_broadcasts = $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.icmp_echo_ignore_broadcasts to $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.icmp_echo_ignore_broadcasts = $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Ignore Bogus ICMP Error Responses</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.icmp_ignore_bogus_error_responses</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.icmp_ignore_bogus_error_responses = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Ignoring bogus ICMP error responses reduces
log size, although some activity would not be logged.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" use="legacy" />"
#
# Set runtime for net.ipv4.icmp_ignore_bogus_error_responses
#
/sbin/sysctl -q -n -w net.ipv4.icmp_ignore_bogus_error_responses=$sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value
#
# If net.ipv4.icmp_ignore_bogus_error_responses present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.icmp_ignore_bogus_error_responses = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.icmp_ignore_bogus_error_responses /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.icmp_ignore_bogus_error_responses.*/net.ipv4.icmp_ignore_bogus_error_responses = $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.icmp_ignore_bogus_error_responses to $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.icmp_ignore_bogus_error_responses = $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use TCP Syncookies</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.tcp_syncookies</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.tcp_syncookies=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.tcp_syncookies = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1095</ns10:reference>
<ns10:rationale xml:lang="en-US"> A TCP SYN flood attack can cause a denial of service by filling a
system's TCP connection table with connections in the SYN_RCVD state.
Syncookies can be used to track a connection when a subsequent ACK is received,
verifying the initiator is attempting a valid connection and is not a flood
source. This feature is activated when a flood condition is detected, and
enables the system to continue servicing valid connection requests.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_tcp_syncookies" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_tcp_syncookies_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" use="legacy" />"
#
# Set runtime for net.ipv4.tcp_syncookies
#
/sbin/sysctl -q -n -w net.ipv4.tcp_syncookies=$sysctl_net_ipv4_tcp_syncookies_value
#
# If net.ipv4.tcp_syncookies present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.tcp_syncookies = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.tcp_syncookies /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.tcp_syncookies.*/net.ipv4.tcp_syncookies = $sysctl_net_ipv4_tcp_syncookies_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.tcp_syncookies to $sysctl_net_ipv4_tcp_syncookies_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.tcp_syncookies = $sysctl_net_ipv4_tcp_syncookies_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use Reverse Path Filtering for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.rp_filter</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.rp_filter=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.rp_filter = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling reverse path filtering drops packets with source addresses
that should not have been able to be received on the interface they were
received on. It should not be used on systems which are routers for
complicated networks, but is helpful for end hosts and routers serving small
networks.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_rp_filter" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_rp_filter_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.rp_filter
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.rp_filter=$sysctl_net_ipv4_conf_all_rp_filter_value
#
# If net.ipv4.conf.all.rp_filter present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.rp_filter = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.rp_filter /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.rp_filter.*/net.ipv4.conf.all.rp_filter = $sysctl_net_ipv4_conf_all_rp_filter_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.rp_filter to $sysctl_net_ipv4_conf_all_rp_filter_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.rp_filter = $sysctl_net_ipv4_conf_all_rp_filter_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use Reverse Path Filtering by Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.rp_filter</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.rp_filter=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.rp_filter = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling reverse path filtering drops packets with source addresses
that should not have been able to be received on the interface they were
received on. It should not be used on systems which are routers for
complicated networks, but is helpful for end hosts and routers serving small
networks.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_rp_filter" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_rp_filter_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.rp_filter
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.rp_filter=$sysctl_net_ipv4_conf_default_rp_filter_value
#
# If net.ipv4.conf.default.rp_filter present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.rp_filter = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.rp_filter /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.rp_filter.*/net.ipv4.conf.default.rp_filter = $sysctl_net_ipv4_conf_default_rp_filter_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.rp_filter to $sysctl_net_ipv4_conf_default_rp_filter_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.rp_filter = $sysctl_net_ipv4_conf_default_rp_filter_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-wireless">
<ns10:title xml:lang="en-US">Wireless Networking</ns10:title>
<ns10:description xml:lang="en-US">Wireless networking, such as 802.11
(WiFi) and Bluetooth, can present a security risk to sensitive or
classified systems and networks. Wireless networking hardware is
much more likely to be included in laptop or portable systems than
in desktops or servers.
<html:br /><html:br />
Removal of hardware provides the greatest assurance that the wireless
capability remains disabled. Acquisition policies often include provisions to
prevent the purchase of equipment that will be used in sensitive spaces and
includes wireless capabilities. If it is impractical to remove the wireless
hardware, and policy permits the device to enter sensitive spaces as long
as wireless is disabled, efforts should instead focus on disabling wireless capability
via software.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_wireless_software">
<ns10:title xml:lang="en-US">Disable Wireless Through Software Configuration</ns10:title>
<ns10:description xml:lang="en-US">If it is impossible to remove the wireless hardware
from the device in question, disable as much of it as possible
through software. The following methods can disable software
support for wireless networking, but note that these methods do not
prevent malicious software or careless users from re-activating the
devices.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable WiFi or Bluetooth in BIOS</ns10:title>
<ns10:description xml:lang="en-US">Some systems that include built-in wireless support offer the
ability to disable the device through the BIOS. This is system-specific;
consult your hardware manual or explore the BIOS setup during
boot.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling wireless support in the BIOS prevents easy
activation of the wireless interface, generally requiring administrators
to reboot the system first.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deactivate Wireless Network Interfaces</ns10:title>
<ns10:description xml:lang="en-US">Deactivating wireless network interfaces should prevent
normal usage of the wireless capability.
<html:br /><html:br />
First, identify the interfaces available with the command:
<html:pre>$ ifconfig -a</html:pre>
Additionally, the following command may be used to
determine whether wireless support is included for a
particular interface, though this may not always be a clear
indicator:
<html:pre>$ iwconfig</html:pre>
After identifying any wireless interfaces (which may have
names like <html:code>wlan0</html:code>, <html:code>ath0</html:code>, <html:code>wifi0</html:code>, <html:code>em1</html:code> or
<html:code>eth0</html:code>), deactivate the interface with the command:
<html:pre>$ sudo ifdown <html:i>interface</html:i></html:pre>
These changes will only last until the next reboot. To
disable the interface for future boots, remove the appropriate
interface file from <html:code>/etc/sysconfig/network-scripts</html:code>:
<html:pre>$ sudo rm /etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">Wireless networking allows attackers within physical proximity to
launch network-based attacks against systems, including those against local LAN
protocols which were not designed with security in mind.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-wireless_disable_interfaces:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Bluetooth Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>bluetooth</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig bluetooth off</html:pre>
<html:pre>$ sudo service bluetooth stop</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the <html:code>bluetooth</html:code> service prevents the system from attempting
connections to Bluetooth devices, which entails some security risk.
Nevertheless, variation in this risk decision may be expected due to the
utility of Bluetooth connectivity and its limited range.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_bluetooth_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable bluetooth
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_bluetooth_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service bluetooth
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- bluetooth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_bluetooth_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_bluetooth_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Bluetooth Kernel Modules</ns10:title>
<ns10:description xml:lang="en-US">The kernel's module loading system can be configured to prevent
loading of the Bluetooth module. Add the following to
the appropriate <html:code>/etc/modprobe.d</html:code> configuration file
to prevent the loading of the Bluetooth module:
<html:pre>install bluetooth /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">If Bluetooth functionality must be disabled, preventing the kernel
from loading the kernel module provides an additional safeguard against its
activation.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_bluetooth_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">if grep --silent "^install bluetooth" /etc/modprobe.d/bluetooth.conf ; then
sed -i 's/^install bluetooth.*/install bluetooth /bin/true/g' /etc/modprobe.d/bluetooth.conf
else
echo -e "\n# Disable per security requirements" >> /etc/modprobe.d/bluetooth.conf
echo "install bluetooth /bin/true" >> /etc/modprobe.d/bluetooth.conf
fi
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_bluetooth_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'bluetooth' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- bluetooth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_bluetooth_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_bluetooth_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-ipv6">
<ns10:title xml:lang="en-US">IPv6</ns10:title>
<ns10:description xml:lang="en-US">The system includes support for Internet Protocol
version 6. A major and often-mentioned improvement over IPv4 is its
enormous increase in the number of available addresses. Another
important feature is its support for automatic configuration of
many network settings.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_ipv6">
<ns10:title xml:lang="en-US">Disable Support for IPv6 Unless Needed</ns10:title>
<ns10:description xml:lang="en-US">
Despite configuration that suggests support for IPv6 has
been disabled, link-local IPv6 address auto-configuration occurs
even when only an IPv4 address is assigned. The only way to
effectively prevent execution of the IPv6 networking stack is to
instruct the system not to activate the IPv6 kernel module.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable IPv6 Networking Support Automatic Loading</ns10:title>
<ns10:description xml:lang="en-US">To prevent the IPv6 kernel module (<html:code>ipv6</html:code>) from binding to the
IPv6 networking stack, add the following line to
<html:code>/etc/modprobe.d/disabled.conf</html:code> (or another file in
<html:code>/etc/modprobe.d</html:code>):
<html:pre>options ipv6 disable=1</html:pre>
This permits the IPv6 module to be loaded (and thus satisfy other modules that
depend on it), while disabling support for the IPv6 protocol.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">
Any unnecessary network stacks - including IPv6 - should be disabled, to reduce
the vulnerability to exploitation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="kernel_module_ipv6_option_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Prevent the IPv6 kernel module (ipv6) from loading the IPv6 networking stack
echo "options ipv6 disable=1" > /etc/modprobe.d/ipv6.conf
# Since according to: https://access.redhat.com/solutions/72733
# "ipv6 disable=1" options doesn't always disable the IPv6 networking stack from
# loading, instruct also sysctl configuration to disable IPv6 according to:
# https://access.redhat.com/solutions/8709#rhel6disable
declare -a IPV6_SETTINGS=("net.ipv6.conf.all.disable_ipv6" "net.ipv6.conf.default.disable_ipv6")
for setting in ${IPV6_SETTINGS[@]}
do
# Set runtime =1 for setting
/sbin/sysctl -q -n -w "$setting=1"
# If setting is present in /etc/sysctl.conf, change value to "1"
# else, add "$setting = 1" to /etc/sysctl.conf
if grep -q ^"$setting" /etc/sysctl.conf ; then
sed -i "s/^$setting.*/$setting = 1/g" /etc/sysctl.conf
else
echo "" >> /etc/sysctl.conf
echo "# Set $setting = 1 per security requirements" >> /etc/sysctl.conf
echo "$setting = 1" >> /etc/sysctl.conf
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_disable_interfaces" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Interface Usage of IPv6</ns10:title>
<ns10:description xml:lang="en-US">To disable interface usage of IPv6, add or correct the following lines in <html:code>/etc/sysconfig/network</html:code>:
<html:pre>NETWORKING_IPV6=no
IPV6INIT=no</html:pre>
</ns10:description>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Support for RPC IPv6</ns10:title>
<ns10:description xml:lang="en-US">RPC services for NFSv4 try to load transport modules for
<html:code>udp6</html:code> and <html:code>tcp6</html:code> by default, even if IPv6 has been disabled in
<html:code>/etc/modprobe.d</html:code>. To prevent RPC services such as <html:code>rpc.mountd</html:code>
from attempting to start IPv6 network listeners, remove or comment out the
following two lines in <html:code>/etc/netconfig</html:code>:
<html:pre>udp6 tpi_clts v inet6 udp - -
tcp6 tpi_cots_ord v inet6 tcp - -</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:fix complexity="low" disruption="low" id="network_ipv6_disable_rpc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Drop 'tcp6' and 'udp6' entries from /etc/netconfig to prevent RPC
# services for NFSv4 from attempting to start IPv6 network listeners
declare -a IPV6_RPC_ENTRIES=("tcp6" "udp6")
for rpc_entry in ${IPV6_RPC_ENTRIES[@]}
do
sed -i "/^$rpc_entry[[:space:]]\+tpi\_.*inet6.*/d" /etc/netconfig
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_disable_rpc:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_configuring_ipv6">
<ns10:title xml:lang="en-US">Configure IPv6 Settings if Necessary</ns10:title>
<ns10:description xml:lang="en-US">A major feature of IPv6 is the extent to which systems
implementing it can automatically configure their networking
devices using information from the network. From a security
perspective, manually configuring important configuration
information is preferable to accepting it from the network
in an unauthenticated fashion.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_ipv6_autoconfig">
<ns10:title xml:lang="en-US">Disable Automatic Configuration</ns10:title>
<ns10:description xml:lang="en-US">Disable the system's acceptance of router
advertisements and redirects by adding or correcting the following
line in <html:code>/etc/sysconfig/network</html:code> (note that this does not disable
sending router solicitations):
<html:pre>IPV6_AUTOCONF=no</html:pre>
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysconfig_network_IPV6_AUTOCONF_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">IPV6_AUTOCONF</ns10:title>
<ns10:description xml:lang="en-US">Toggle global IPv6 auto-configuration (only, if global
forwarding is disabled)</ns10:description>
<ns10:value>no</ns10:value>
<ns10:value selector="enabled">yes</ns10:value>
<ns10:value selector="disabled">no</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_ra</ns10:title>
<ns10:description xml:lang="en-US">Accept default router advertisements by default?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_ra_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_ra</ns10:title>
<ns10:description xml:lang="en-US">Accept all router advertisements?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Toggle ICMP Redirect Acceptance By Default</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Toggle ICMP Redirect Acceptance</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_forwarding_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.forwarding</ns10:title>
<ns10:description xml:lang="en-US">Toggle IPv6 Forwarding</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router, which can
be used to bypass network security measures. This requirement applies only to the
forwarding of source-routerd traffic, such as when IPv6 forwarding is enabled and
the system is functioning as a router.
Accepting source-routed packets in the IPv6 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Router Advertisements</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_ra</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_ra=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_ra = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit router advertisement message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_ra_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Router Advertisements</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_ra</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_ra=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_ra = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit router advertisement message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv6_conf_default_accept_ra" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv6_conf_default_accept_ra_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" use="legacy" />"
#
# Set runtime for net.ipv6.conf.default.accept_ra
#
/sbin/sysctl -q -n -w net.ipv6.conf.default.accept_ra=$sysctl_net_ipv6_conf_default_accept_ra_value
#
# If net.ipv6.conf.default.accept_ra present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv6.conf.default.accept_ra = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv6.conf.default.accept_ra /etc/sysctl.conf ; then
sed -i "s/^net.ipv6.conf.default.accept_ra.*/net.ipv6.conf.default.accept_ra = $sysctl_net_ipv6_conf_default_accept_ra_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv6.conf.default.accept_ra to $sysctl_net_ipv6_conf_default_accept_ra_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv6.conf.default.accept_ra = $sysctl_net_ipv6_conf_default_accept_ra_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.2</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit ICMP redirect message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.2</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit ICMP redirect message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv6_conf_default_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv6_conf_default_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv6.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv6.conf.default.accept_redirects=$sysctl_net_ipv6_conf_default_accept_redirects_value
#
# If net.ipv6.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv6.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv6.conf.default.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv6.conf.default.accept_redirects.*/net.ipv6.conf.default.accept_redirects = $sysctl_net_ipv6_conf_default_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv6.conf.default.accept_redirects to $sysctl_net_ipv6_conf_default_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv6.conf.default.accept_redirects = $sysctl_net_ipv6_conf_default_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for Interfaces By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router, which can
be used to bypass network security measures. This requirement applies only to the
forwarding of source-routerd traffic, such as when IPv6 forwarding is enabled and
the system is functioning as a router.
Accepting source-routed packets in the IPv6 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_forwarding" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for IPv6 Forwarding</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.forwarding</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.forwarding=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.forwarding = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">IP forwarding permits the kernel to forward packets from one network
interface to another. The ability to forward packets between two networks is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_forwarding_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_forwarding:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_static_address" selected="false" severity="low">
<ns10:title xml:lang="en-US">Manually Assign Global IPv6 Address</ns10:title>
<ns10:description xml:lang="en-US">To manually assign an IP address for an interface, edit the
file <html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>. Add or correct the
following line (substituting the correct IPv6 address):
<html:pre>IPV6ADDR=2001:0DB8::ABCD/64</html:pre>
Manually assigning an IP address is preferable to accepting one from routers or
from the network otherwise. The example address here is an IPv6 address
reserved for documentation purposes, as defined by RFC3849.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_static_address:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_privacy_extensions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Privacy Extensions for Address</ns10:title>
<ns10:description xml:lang="en-US">To introduce randomness into the automatic generation of IPv6
addresses, add or correct the following line in
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>:
<html:pre>IPV6_PRIVACY=rfc3041</html:pre>
Automatically-generated IPv6 addresses are based on the underlying hardware
(e.g. Ethernet) address, and so it becomes possible to track a piece of
hardware over its lifetime using its traffic. If it is important for a system's
IP address to not trivially reveal its hardware address, this setting should be
applied.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_privacy_extensions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_default_gateway" selected="false" severity="low">
<ns10:title xml:lang="en-US">Manually Assign IPv6 Router Address</ns10:title>
<ns10:description xml:lang="en-US">Edit the file
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>, and add or correct
the following line (substituting your gateway IP as appropriate):
<html:pre>IPV6_DEFAULTGW=2001:0DB8::0001</html:pre>
Router addresses should be manually set and not accepted via any
auto-configuration or router advertisement.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_default_gateway:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_network_ipv6_limit_requests">
<ns10:title xml:lang="en-US">Limit Network-Transmitted Configuration if Using Static IPv6 Addresses</ns10:title>
<ns10:description xml:lang="en-US">To limit the configuration information requested from other
systems and accepted from the network on a system that uses
statically-configured IPv6 addresses, add the following lines to
<html:code>/etc/sysctl.conf</html:code>:
<html:pre>net.ipv6.conf.default.router_solicitations = 0
net.ipv6.conf.default.accept_ra_rtr_pref = 0
net.ipv6.conf.default.accept_ra_pinfo = 0
net.ipv6.conf.default.accept_ra_defrtr = 0
net.ipv6.conf.default.autoconf = 0
net.ipv6.conf.default.dad_transmits = 0
net.ipv6.conf.default.max_addresses = 1</html:pre>
The <html:code>router_solicitations</html:code> setting determines how many router
solicitations are sent when bringing up the interface. If addresses are
statically assigned, there is no need to send any solicitations.
<html:br /><html:br />
The <html:code>accept_ra_pinfo</html:code> setting controls whether the system will accept
prefix info from the router.
<html:br /><html:br />
The <html:code>accept_ra_defrtr</html:code> setting controls whether the system will accept
Hop Limit settings from a router advertisement. Setting it to 0 prevents a
router from changing your default IPv6 Hop Limit for outgoing packets.
<html:br /><html:br />
The <html:code>autoconf</html:code> setting controls whether router advertisements can cause
the system to assign a global unicast address to an interface.
<html:br /><html:br />
The <html:code>dad_transmits</html:code> setting determines how many neighbor solicitations
to send out per address (global and link-local) when bringing up an interface
to ensure the desired address is unique on the network.
<html:br /><html:br />
The <html:code>max_addresses</html:code> setting determines how many global unicast IPv6
addresses can be assigned to each interface. The default is 16, but it should
be set to exactly the number of statically configured global addresses
required.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-iptables">
<ns10:title xml:lang="en-US">iptables and ip6tables</ns10:title>
<ns10:description xml:lang="en-US">A host-based firewall called <html:code>netfilter</html:code> is included as
part of the Linux kernel distributed with the system. It is
activated by default. This firewall is controlled by the program
<html:code>iptables</html:code>, and the entire capability is frequently referred to by
this name. An analogous program called <html:code>ip6tables</html:code> handles filtering
for IPv6.
<html:br /><html:br />
Unlike TCP Wrappers, which depends on the network server
program to support and respect the rules written, <html:code>netfilter</html:code>
filtering occurs at the kernel level, before a program can even
process the data from the network packet. As such, any program on
the system is affected by the rules written.
<html:br /><html:br />
This section provides basic information about strengthening
the <html:code>iptables</html:code> and <html:code>ip6tables</html:code> configurations included with the system.
For more complete information that may allow the construction of a
sophisticated ruleset tailored to your environment, please consult
the references at the end of this section.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_iptables_activation">
<ns10:title xml:lang="en-US">Inspect and Activate Default Rules</ns10:title>
<ns10:description xml:lang="en-US">View the currently-enforced <html:code>iptables</html:code> rules by running
the command:
<html:pre>$ sudo iptables -nL --line-numbers</html:pre>
The command is analogous for <html:code>ip6tables</html:code>.
<html:br /><html:br />
If the firewall does not appear to be active (i.e., no rules
appear), activate it and ensure that it starts at boot by issuing
the following commands (and analogously for <html:code>ip6tables</html:code>):
<html:pre>$ sudo service iptables restart</html:pre>
The default iptables rules are:
<html:pre>Chain INPUT (policy ACCEPT)
num target prot opt source destination
1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
3 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
4 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
5 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT)
num target prot opt source destination
1 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
num target prot opt source destination</html:pre>
The <html:code>ip6tables</html:code> default rules are essentially the same.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify ip6tables Enabled if Using IPv6</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ip6tables</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 ip6tables on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1118</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1117</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1098</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1100</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1097</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>ip6tables</html:code> service provides the system's host-based firewalling
capability for IPv6 and ICMPv6.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ip6tables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable ip6tables
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ip6tables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service ip6tables
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- ip6tables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ip6tables_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default ip6tables Policy for Incoming Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code>/etc/sysconfig/ip6tables</html:code>:
<html:pre>:INPUT DROP [0:0]</html:pre>
If changes were required, reload the ip6tables rules:
<html:pre>$ sudo service ip6tables reload</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>ip6tables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_ip6tables_default_rule" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:INPUT ACCEPT.*/:INPUT DROP [0:0]/g' /etc/sysconfig/ip6tables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_ip6tables_default_rule:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify iptables Enabled</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>iptables</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 iptables on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1118</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1117</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1098</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1100</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1097</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>iptables</html:code> service provides the system's host-based firewalling
capability for IPv4 and ICMP.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_iptables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable iptables
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_iptables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service iptables
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_iptables_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ruleset_modifications">
<ns10:title xml:lang="en-US">Strengthen the Default Ruleset</ns10:title>
<ns10:description xml:lang="en-US">The default rules can be strengthened. The system
scripts that activate the firewall rules expect them to be defined
in the configuration files <html:code>iptables</html:code> and <html:code>ip6tables</html:code> in the directory
<html:code>/etc/sysconfig</html:code>. Many of the lines in these files are similar
to the command line arguments that would be provided to the programs
<html:code>/sbin/iptables</html:code> or <html:code>/sbin/ip6tables</html:code> - but some are quite
different.
<html:br /><html:br />
The following recommendations describe how to strengthen the
default ruleset configuration file. An alternative to editing this
configuration file is to create a shell script that makes calls to
the iptables program to load in rules, and then invokes service
iptables save to write those loaded rules to
<html:code>/etc/sysconfig/iptables.</html:code>
<html:br /><html:br />
The following alterations can be made directly to
<html:code>/etc/sysconfig/iptables</html:code> and <html:code>/etc/sysconfig/ip6tables</html:code>.
Instructions apply to both unless otherwise noted. Language and address
conventions for regular iptables are used throughout this section;
configuration for ip6tables will be either analogous or explicitly
covered.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The program <html:code>system-config-securitylevel</html:code>
allows additional services to penetrate the default firewall rules
and automatically adjusts <html:code>/etc/sysconfig/iptables</html:code>. This program
is only useful if the default ruleset meets your security
requirements. Otherwise, this program should not be used to make
changes to the firewall configuration because it re-writes the
saved configuration file.</ns10:warning>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default iptables Policy for Incoming Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code>/etc/sysconfig/iptables</html:code>:
<html:pre>:INPUT DROP [0:0]</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1109</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1154</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>iptables</html:code> the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_iptables_default_rule" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:INPUT ACCEPT.*/:INPUT DROP [0:0]/g' /etc/sysconfig/iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_iptables_default_rule:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default iptables Policy for Forwarded Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in FORWARD chain which processes packets that will be forwarded from
one interface to another,
add or correct the following line in
<html:code>/etc/sysconfig/iptables</html:code>:
<html:pre>:FORWARD DROP [0:0]</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1109</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>iptables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_iptables_default_rule_forward" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:FORWARD ACCEPT.*/:FORWARD DROP [0:0]/g' /etc/sysconfig/iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_iptables_default_rule_forward:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_iptables_icmp_disabled">
<ns10:title xml:lang="en-US">Restrict ICMP Message Types</ns10:title>
<ns10:description xml:lang="en-US">In <html:code>/etc/sysconfig/iptables</html:code>, the accepted ICMP messages
types can be restricted. To accept only ICMP echo reply, destination
unreachable, and time exceeded messages, remove the line:<html:br />
<html:pre>-A INPUT -p icmp --icmp-type any -j ACCEPT</html:pre>
and insert the lines:
<html:pre>-A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
-A INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT
-A INPUT -p icmp --icmp-type time-exceeded -j ACCEPT</html:pre>
To allow the system to respond to pings, also insert the following line:
<html:pre>-A INPUT -p icmp --icmp-type echo-request -j ACCEPT</html:pre>
Ping responses can also be limited to certain networks or hosts by using the -s
option in the previous rule. Because IPv6 depends so heavily on ICMPv6, it is
preferable to deny the ICMPv6 packets you know you don't need (e.g. ping
requests) in <html:code>/etc/sysconfig/ip6tables</html:code>, while letting everything else
through:
<html:pre>-A INPUT -p icmpv6 --icmpv6-type echo-request -j DROP</html:pre>
If you are going to statically configure the machine's address, it should
ignore Router Advertisements which could add another IPv6 address to the
interface or alter important network settings:
<html:pre>-A INPUT -p icmpv6 --icmpv6-type router-advertisement -j DROP</html:pre>
Restricting ICMPv6 message types in <html:code>/etc/sysconfig/ip6tables</html:code> is not
recommended because the operation of IPv6 depends heavily on ICMPv6. Thus, great
care must be taken if any other ICMPv6 types are blocked.
</ns10:description>
<ns10:rationale xml:lang="en-US">Restricting ICMP messages may make a system slightly less
discoverable to an unsophisticated attacker but is not appropriate for many
general-purpose use cases and can also make troubleshooting more difficult.
</ns10:rationale>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_iptables_log_and_drop_suspicious">
<ns10:title xml:lang="en-US">Log and Drop Packets with Suspicious Source Addresses</ns10:title>
<ns10:description xml:lang="en-US">Packets with non-routable source addresses should be rejected, as they may indicate spoofing. Because the
modified policy will reject non-matching packets, you only need to add these rules if you are interested in also
logging these spoofing or suspicious attempts before they are dropped. If you do choose to log various suspicious
traffic, add identical rules with a target of <html:code>DROP</html:code> after each <html:i>LOG</html:i>.
To log and then drop these IPv4 packets, insert the following rules in <html:code>/etc/sysconfig/iptables</html:code> (excepting
any that are intentionally used):
<html:pre>-A INPUT -s 10.0.0.0/8 -j LOG --log-prefix "IP DROP SPOOF A: "
-A INPUT -s 172.16.0.0/12 -j LOG --log-prefix "IP DROP SPOOF B: "
-A INPUT -s 192.168.0.0/16 -j LOG --log-prefix "IP DROP SPOOF C: "
-A INPUT -s 224.0.0.0/4 -j LOG --log-prefix "IP DROP MULTICAST D: "
-A INPUT -s 240.0.0.0/5 -j LOG --log-prefix "IP DROP SPOOF E: "
-A INPUT -d 127.0.0.0/8 -j LOG --log-prefix "IP DROP LOOPBACK: "</html:pre>
Similarly, you might wish to log packets containing some IPv6 reserved addresses if they are not expected
on your network:
<html:pre>-A INPUT -i eth0 -s ::1 -j LOG --log-prefix "IPv6 DROP LOOPBACK: "
-A INPUT -s 2002:E000::/20 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:7F00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:0000::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:FF00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:0A00::/24 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:AC10::/28 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "
-A INPUT -s 2002:C0A8::/32 -j LOG --log-prefix "IPv6 6to4 TRAFFIC: "</html:pre>
If you are not expecting to see site-local multicast or auto-tunneled traffic, you can log those:
<html:pre>-A INPUT -s FF05::/16 -j LOG --log-prefix "IPv6 SITE-LOCAL MULTICAST: "
-A INPUT -s ::0.0.0.0/96 -j LOG --log-prefix "IPv4 COMPATIBLE IPv6 ADDR: "</html:pre>
If you wish to block multicasts to all link-local nodes (e.g. if you are not using router auto-configuration and
do not plan to have any services that multicast to the entire local network), you can block the link-local
all-nodes multicast address (before accepting incoming ICMPv6):
<html:pre>-A INPUT -d FF02::1 -j LOG --log-prefix "Link-local All-Nodes Multicast: "</html:pre>
However, if you're going to allow IPv4 compatible IPv6 addresses (of the form ::0.0.0.0/96), you should
then consider logging the non-routable IPv4-compatible addresses:
<html:pre>-A INPUT -s ::0.0.0.0/104 -j LOG --log-prefix "IP NON-ROUTABLE ADDR: "
-A INPUT -s ::127.0.0.0/104 -j LOG --log-prefix "IP DROP LOOPBACK: "
-A INPUT -s ::224.0.0.0.0/100 -j LOG --log-prefix "IP DROP MULTICAST D: "
-A INPUT -s ::255.0.0.0/104 -j LOG --log-prefix "IP BROADCAST: "</html:pre>
If you are not expecting to see any IPv4 (or IPv4-compatible) traffic on your network, consider logging it before it gets dropped:
<html:pre>-A INPUT -s ::FFFF:0.0.0.0/96 -j LOG --log-prefix "IPv4 MAPPED IPv6 ADDR: "
-A INPUT -s 2002::/16 -j LOG --log-prefix "IPv6 6to4 ADDR: "</html:pre>
The following rule will log all traffic originating from a site-local address, which is deprecated address space:
<html:pre>-A INPUT -s FEC0::/10 -j LOG --log-prefix "SITE-LOCAL ADDRESS TRAFFIC: "</html:pre>
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network_ssl">
<ns10:title xml:lang="en-US">Transport Layer Security Support</ns10:title>
<ns10:description xml:lang="en-US">
Support for Transport Layer Security (TLS), and its predecessor, the Secure
Sockets Layer (SSL), is included in Red Hat Enterprise Linux in the OpenSSL software (RPM package
<html:code>openssl</html:code>). TLS provides encrypted and authenticated network
communications, and many network services include support for it. TLS or SSL
can be leveraged to avoid any plaintext transmission of sensitive data.
<html:br />
For information on how to use OpenSSL, see
<html:b><html:a href="http://www.openssl.org/docs/HOWTO/">http://www.openssl.org/docs/HOWTO/</html:a></html:b>. Information on FIPS validation
of OpenSSL is available at <html:b><html:a href="http://www.openssl.org/docs/fips/fipsvalidation.html">http://www.openssl.org/docs/fips/fipsvalidation.html</html:a></html:b>
and <html:b><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm</html:a></html:b>.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-uncommon">
<ns10:title xml:lang="en-US">Uncommon Network Protocols</ns10:title>
<ns10:description xml:lang="en-US">The system includes support for several network
protocols which are not commonly used. Although security vulnerabilities
in kernel networking code are not frequently
discovered, the consequences can be dramatic. Ensuring uncommon
network protocols are disabled reduces the system's risk to attacks
targeted at its implementation of those protocols.</ns10:description>
<ns10:warning xml:lang="en-US">
Although these protocols are not commonly used, avoid disruption
in your network environment by ensuring they are not needed
prior to disabling them.
</ns10:warning>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable DCCP Support</ns10:title>
<ns10:description xml:lang="en-US">
The Datagram Congestion Control Protocol (DCCP) is a
relatively new transport layer protocol, designed to support
streaming media and telephony.
To configure the system to prevent the <html:code>dccp</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install dccp /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling DCCP protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_dccp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install dccp /bin/true" > /etc/modprobe.d/dccp.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_dccp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'dccp' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- dccp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_dccp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_dccp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SCTP Support</ns10:title>
<ns10:description xml:lang="en-US">
The Stream Control Transmission Protocol (SCTP) is a
transport layer protocol, designed to support the idea of
message-oriented communication, with several streams of messages
within one connection.
To configure the system to prevent the <html:code>sctp</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install sctp /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling SCTP protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_sctp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install sctp /bin/true" > /etc/modprobe.d/sctp.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_sctp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'sctp' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- sctp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_sctp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_sctp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RDS Support</ns10:title>
<ns10:description xml:lang="en-US">
The Reliable Datagram Sockets (RDS) protocol is a transport
layer protocol designed to provide reliable high- bandwidth,
low-latency communications between nodes in a cluster.
To configure the system to prevent the <html:code>rds</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install rds /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling RDS protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_rds_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install rds /bin/true" > /etc/modprobe.d/rds.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_rds_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'rds' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- rds
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_rds_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable TIPC Support</ns10:title>
<ns10:description xml:lang="en-US">
The Transparent Inter-Process Communication (TIPC) protocol
is designed to provide communications between nodes in a
cluster.
To configure the system to prevent the <html:code>tipc</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install tipc /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling TIPC protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_tipc_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install tipc /bin/true" > /etc/modprobe.d/tipc.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_tipc_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'tipc' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- tipc
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_tipc_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_network-ipsec">
<ns10:title xml:lang="en-US">IPSec Support</ns10:title>
<ns10:description xml:lang="en-US">Support for Internet Protocol Security (IPsec)
is provided in Red Hat Enterprise Linux 6 with openswan
and libreswan packages respectively.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install openswan or libreswan Package</ns10:title>
<ns10:description xml:lang="en-US">The openswan and libreswan packages provide an implementation of
IPsec and IKE, which permits the creation of secure tunnels over untrusted
networks.
The <html:code>openswan</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install openswan</html:pre>
The <html:code>libreswan</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install libreswan</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1131</ns10:reference>
<ns10:rationale xml:lang="en-US">Providing the ability for remote users or systems
to initiate a secure VPN connection protects information when it is
transmitted over a wide area network.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install openswan
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure openswan is installed
package:
name="{{item}}"
state=present
with_items:
- openswan
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_openswan
class install_openswan {
package { 'openswan':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=openswan
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_openswan_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_openswan_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
<ns10:title xml:lang="en-US">Configure Syslog</ns10:title>
<ns10:description xml:lang="en-US">The syslog service has been the default Unix logging mechanism for
many years. It has a number of downsides, including inconsistent log format,
lack of authentication for received messages, and lack of authentication,
encryption, or reliable transport for messages sent over a network. However,
due to its long history, syslog is a de facto standard which is supported by
almost all Unix applications.
<html:br />
<html:br />
In Red Hat Enterprise Linux 6, rsyslog has replaced ksyslogd as the
syslog daemon of choice, and it includes some additional security features
such as reliable, connection-oriented (i.e. TCP) transmission of logs, the
option to log to database formats, and the encryption of log data en route to
a central logging server.
This section discusses how to configure rsyslog for
best effect, and how to use tools provided with the system to maintain and
monitor logs.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure rsyslog is Installed</ns10:title>
<ns10:description xml:lang="en-US">
Rsyslog is installed by default.
The <html:code>rsyslog</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install rsyslog</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:rationale xml:lang="en-US">
The rsyslog package provides the rsyslog daemon, which provides
system logging services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsyslog is installed
package:
name="{{item}}"
state=present
with_items:
- rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=rsyslog
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsyslog_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable rsyslog Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> service provides syslog-style logging by default on Red Hat Enterprise Linux 6.
The <html:code>rsyslog</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 rsyslog on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1557</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rsyslog</html:code> service must be running in order to provide
logging services, which are essential to system administration.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rsyslog_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rsyslog_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service rsyslog
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- rsyslog
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rsyslog_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
<ns10:title xml:lang="en-US">Ensure Proper Configuration of Log Files</ns10:title>
<ns10:description xml:lang="en-US">
The file <html:code>/etc/rsyslog.conf</html:code> controls where log message are written.
These are controlled by lines called <html:i>rules</html:i>, which consist of a
<html:i>selector</html:i> and an <html:i>action</html:i>.
These rules are often customized depending on the role of the system, the
requirements of the environment, and whatever may enable
the administrator to most effectively make use of log data.
The default rules in Red Hat Enterprise Linux 6 are:
<html:pre>*.info;mail.none;authpriv.none;cron.none /var/log/messages
authpriv.* /var/log/secure
mail.* -/var/log/maillog
cron.* /var/log/cron
*.emerg *
uucp,news.crit /var/log/spooler
local7.* /var/log/boot.log</html:pre>
See the man page <html:code>rsyslog.conf(5)</html:code> for more information.
<html:i>Note that the <html:code>rsyslog</html:code> daemon can be configured to use a timestamp format that
some log processing programs may not understand. If this occurs,
edit the file <html:code>/etc/rsyslog.conf</html:code> and add or edit the following line:</html:i>
<html:pre>$ ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat</html:pre>
</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">User who owns log files</ns10:title>
<ns10:description xml:lang="en-US">Specify user owner of all logfiles specified in
<html:code>/etc/rsyslog.conf</html:code>.</ns10:description>
<ns10:value selector="root">root</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">group who owns log files</ns10:title>
<ns10:description xml:lang="en-US">Specify group owner of all logfiles specified in
<html:code>/etc/rsyslog.conf.</html:code></ns10:description>
<ns10:value selector="root">root</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate User</ns10:title>
<ns10:description xml:lang="en-US">The owner of all log files written by
<html:code>rsyslog</html:code> should be root.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's owner:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code>root</html:code>, run the following command to
correct this:
<html:pre>$ sudo chown root <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_ownership:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate Group</ns10:title>
<ns10:description xml:lang="en-US">The group-owner of all log files written by
<html:code>rsyslog</html:code> should be root.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's group owner:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code>root</html:code>, run the following command to
correct this:
<html:pre>$ sudo chgrp root <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_groupownership:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure System Log Files Have Correct Permissions</ns10:title>
<ns10:description xml:lang="en-US">The file permissions for all log files written by
<html:code>rsyslog</html:code> should be set to 600, or more restrictive.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's permissions:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the permissions are not 600 or more restrictive,
run the following command to correct this:
<html:pre>$ sudo chmod 0600 <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">Log files can contain valuable information regarding system
configuration. If the system log files are not protected unauthorized
users could change the logged data, eliminating their forensic value.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="rsyslog_files_permissions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# List of log file paths to be inspected for correct permissions
# * Primarily inspect log file paths listed in /etc/rsyslog.conf
RSYSLOG_ETC_CONFIG="/etc/rsyslog.conf"
# * And also the log file paths listed after rsyslog's $IncludeConfig directive
# (store the result into array for the case there's shell glob used as value of IncludeConfig)
RSYSLOG_INCLUDE_CONFIG=($(grep -e "\$IncludeConfig[[:space:]]\+[^[:space:];]\+" /etc/rsyslog.conf | cut -d ' ' -f 2))
# Declare an array to hold the final list of different log file paths
declare -a LOG_FILE_PATHS
# Browse each file selected above as containing paths of log files
# ('/etc/rsyslog.conf' and '/etc/rsyslog.d/*.conf' in the default configuration)
for LOG_FILE in "${RSYSLOG_ETC_CONFIG}" "${RSYSLOG_INCLUDE_CONFIG[@]}"
do
# From each of these files extract just particular log file path(s), thus:
# * Ignore lines starting with space (' '), comment ('#"), or variable syntax ('$') characters,
# * Ignore empty lines,
# * From the remaining valid rows select only fields constituting a log file path
# Text file column is understood to represent a log file path if and only if all of the following are met:
# * it contains at least one slash '/' character,
# * it doesn't contain space (' '), colon (':'), and semicolon (';') characters
# Search log file for path(s) only in case it exists!
if [[ -f "${LOG_FILE}" ]]
then
MATCHED_ITEMS=$(sed -e "/^[[:space:]|#|$]/d ; s/[^\/]*[[:space:]]*\([^:;[:space:]]*\)/\1/g ; /^$/d" "${LOG_FILE}")
# Since above sed command might return more than one item (delimited by newline), split the particular
# matches entries into new array specific for this log file
readarray -t ARRAY_FOR_LOG_FILE <<< "$MATCHED_ITEMS"
# Concatenate the two arrays - previous content of $LOG_FILE_PATHS array with
# items from newly created array for this log file
LOG_FILE_PATHS=("${LOG_FILE_PATHS[@]}" "${ARRAY_FOR_LOG_FILE[@]}")
# Delete the temporary array
unset ARRAY_FOR_LOG_FILE
fi
done
for PATH in "${LOG_FILE_PATHS[@]}"
do
# Sanity check - if particular $PATH is empty string, skip it from further processing
if [ -z "$PATH" ]
then
continue
fi
# Per https://access.redhat.com/solutions/66805 '/var/log/boot.log' log file needs special care => perform it
if [ "$PATH" == "/var/log/boot.log" ]
then
# Ensure permissions of /var/log/boot.log are configured to be updated in /etc/rc.local
if ! /bin/grep -q "boot.log" "/etc/rc.local"
then
echo "/bin/chmod 600 /var/log/boot.log" >> /etc/rc.local
fi
# Ensure /etc/rc.d/rc.local has user-executable permission
# (in order to be actually executed during boot)
if [ "$(/usr/bin/stat -c %a /etc/rc.d/rc.local)" -ne 744 ]
then
/bin/chmod u+x /etc/rc.d/rc.local
fi
fi
# Also for each log file check if its permissions differ from 600. If so, correct them
if [ "$(/usr/bin/stat -c %a "$PATH")" -ne 600 ]
then
/bin/chmod 600 "$PATH"
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_permissions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
<ns10:title xml:lang="en-US">Rsyslog Logs Sent To Remote Host</ns10:title>
<ns10:description xml:lang="en-US">
If system logs are to be useful in detecting malicious
activities, it is necessary to send logs to a remote server. An
intruder who has compromised the root account on a machine may
delete the log entries which indicate that the system was attacked
before they are seen by an administrator.
<html:br /><html:br />
However, it is recommended that logs be stored on the local
host in addition to being sent to the loghost, especially if
<html:code>rsyslog</html:code> has been configured to use the UDP protocol to send
messages over a network. UDP does not guarantee reliable delivery,
and moderately busy sites will lose log messages occasionally,
especially in periods of high traffic which may be the result of an
attack. In addition, remote <html:code>rsyslog</html:code> messages are not
authenticated in any way by default, so it is easy for an attacker to
introduce spurious messages to the central log server. Also, some
problems cause loss of network connectivity, which will prevent the
sending of messages to the central server. For all of these reasons, it is
better to store log messages both centrally and on each host, so
that they can be correlated if necessary.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure Logs Sent To Remote Host</ns10:title>
<ns10:description xml:lang="en-US">
To configure rsyslog to send logs to a remote log server,
open <html:code>/etc/rsyslog.conf</html:code> and read and understand the last section of the file,
which describes the multiple directives necessary to activate remote
logging.
Along with these other directives, the system can be configured
to forward its logs to a particular log server by
adding or correcting one of the following lines,
substituting <html:code><html:i>loghost.example.com</html:i></html:code> appropriately.
The choice of protocol depends on the environment of the system;
although TCP and RELP provide more reliable message delivery,
they may not be supported in all environments.
<html:br />
To use UDP for log message delivery:
<html:pre>*.* @<html:i>loghost.example.com</html:i></html:pre>
<html:br />
To use TCP for log message delivery:
<html:pre>*.* @@<html:i>loghost.example.com</html:i></html:pre>
<html:br />
To use RELP for log message delivery:
<html:pre>*.* :omrelp:<html:i>loghost.example.com</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1348</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">136</ns10:reference>
<ns10:rationale xml:lang="en-US">A log server (loghost) receives syslog messages from one or more
systems. This data can be used as an additional log source in the event a
system is compromised and its local logs are suspect. Forwarding log messages
to a remote loghost also provides system administrators with a centralized
place to view the status of multiple hosts within the enterprise.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_remote_loghost:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
<ns10:title xml:lang="en-US">Configure rsyslogd to Accept Remote Messages If Acting as a Log Server</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>rsyslog</html:code> does not listen over the network
for log messages. If needed, modules can be enabled to allow
the rsyslog daemon to receive messages from other systems and for the system
thus to act as a log server.
If the machine is not a log server, then lines concerning these modules
should remain commented out.
<html:br /><html:br />
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
To ensure that it is not listening on the network, ensure the following lines are
<html:i>not</html:i> found in <html:code>/etc/rsyslog.conf</html:code>:
<html:pre>$ModLoad imtcp
$InputTCPServerRun <html:i>port</html:i>
$ModLoad imudp
$UDPServerRun <html:i>port</html:i>
$ModLoad imrelp
$InputRELPServerRun <html:i>port</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:rationale xml:lang="en-US">
Any process which receives messages from the network incurs some risk
of receiving malicious messages. This risk can be eliminated for
rsyslog by configuring it not to listen on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_nolisten:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_listen_tcp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable rsyslog to Accept Messages via TCP, if Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code>/etc/rsyslog.conf</html:code> to enable reception of messages over TCP:
<html:pre>$ModLoad imtcp
$InputTCPServerRun 514</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">
If the system needs to act as a log server, this ensures that it can receive
messages over a reliable TCP connection.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable rsyslog to Accept Messages via UDP, if Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code>/etc/rsyslog.conf</html:code> to enable reception of messages over UDP:
<html:pre>$ModLoad imudp
$UDPServerRun 514</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">
Many devices, such as switches, routers, and other Unix-like systems, may only support
the traditional syslog transmission over UDP. If the system must act as a log server,
this enables it to receive their messages as well.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_log_rotation">
<ns10:title xml:lang="en-US">Ensure All Logs are Rotated by logrotate</ns10:title>
<ns10:description xml:lang="en-US">Edit the file <html:code>/etc/logrotate.d/syslog</html:code>. Find the first
line, which should look like this (wrapped for clarity):
<html:pre>/var/log/messages /var/log/secure /var/log/maillog /var/log/spooler \
/var/log/boot.log /var/log/cron {</html:pre>
Edit this line so that it contains a one-space-separated
listing of each log file referenced in <html:code>/etc/rsyslog.conf</html:code>.
<html:br /><html:br />
All logs in use on a system must be rotated regularly, or the
log files will consume disk space over time, eventually interfering
with system operation. The file <html:code>/etc/logrotate.d/syslog</html:code> is the
configuration file used by the <html:code>logrotate</html:code> program to maintain all
log files written by <html:code>syslog</html:code>. By default, it rotates logs weekly and
stores four archival copies of each log. These settings can be
modified by editing <html:code>/etc/logrotate.conf</html:code>, but the defaults are
sufficient for purposes of this guide.
<html:br /><html:br />
Note that <html:code>logrotate</html:code> is run nightly by the cron job
<html:code>/etc/cron.daily/logrotate</html:code>. If particularly active logs need to be
rotated more often than once a day, some other mechanism must be
used.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure Logrotate Runs Periodically</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>logrotate</html:code> utility allows for the automatic rotation of
log files. The frequency of rotation is specified in <html:code>/etc/logrotate.conf</html:code>,
which triggers a cron task. To configure logrotate to run daily, add or correct
the following line in <html:code>/etc/logrotate.conf</html:code>:
<html:pre># rotate log files <html:i>frequency</html:i>
daily</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_logrotate_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_configure_logwatch_on_logserver">
<ns10:title xml:lang="en-US"> Configure Logwatch on the Central Log Server</ns10:title>
<ns10:description xml:lang="en-US">
Is this machine the central log server? If so, edit the file <html:code>/etc/logwatch/conf/logwatch.conf</html:code> as shown below.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_logwatch_configured_hostlimit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logwatch HostLimit Line</ns10:title>
<ns10:description xml:lang="en-US"> On a central logserver, you want Logwatch to summarize all syslog entries, including those which did not originate
on the logserver itself. The <html:code>HostLimit</html:code> setting tells Logwatch to report on all hosts, not just the one on which it
is running.
<html:pre> HostLimit = no </html:pre> </ns10:description>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-logwatch_configured_hostlimit:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_logwatch_configured_splithosts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logwatch SplitHosts Line</ns10:title>
<ns10:description xml:lang="en-US">
If <html:code>SplitHosts</html:code> is set, Logwatch will separate entries by hostname. This makes the report longer but significantly
more usable. If it is not set, then Logwatch will not report which host generated a given log entry, and that
information is almost always necessary
<html:pre> SplitHosts = yes </html:pre> </ns10:description>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-logwatch_configured_splithosts:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_logwatch_for_logserver" selected="false" severity="low">
<ns10:title xml:lang="en-US"> Disable Logwatch on Clients if a Logserver Exists</ns10:title>
<ns10:description xml:lang="en-US">
Does your site have a central logserver which has been configured to report on logs received from all systems?
If so:
<html:pre>
$ sudo rm /etc/cron.daily/0logwatch
</html:pre>
If no logserver exists, it will be necessary for each machine to run Logwatch individually. Using a central
logserver provides the security and reliability benefits discussed earlier, and also makes monitoring logs easier
and less time-intensive for administrators.</ns10:description>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_auditing">
<ns10:title xml:lang="en-US">System Accounting with auditd</ns10:title>
<ns10:description xml:lang="en-US">The audit service provides substantial capabilities
for recording system activities. By default, the service audits about
SELinux AVC denials and certain types of security-relevant events
such as system logins, account modifications, and authentication
events performed by programs such as sudo.
Under its default configuration, <html:code>auditd</html:code> has modest disk space
requirements, and should not noticeably impact system performance.
<html:br /><html:br />
Government networks often have substantial auditing
requirements and <html:code>auditd</html:code> can be configured to meet these
requirements.
Examining some example audit records demonstrates how the Linux audit system
satisfies common requirements.
The following example from Fedora Documentation available at
<html:code><html:a href="http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html">http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html</html:a></html:code>
shows the substantial amount of information captured in a
two typical "raw" audit messages, followed by a breakdown of the most important
fields. In this example the message is SELinux-related and reports an AVC
denial (and the associated system call) that occurred when the Apache HTTP
Server attempted to access the <html:code>/var/www/html/file1</html:code> file (labeled with
the <html:code>samba_share_t</html:code> type):
<html:pre>type=AVC msg=audit(1226874073.147:96): avc: denied { getattr } for pid=2465 comm="httpd"
path="/var/www/html/file1" dev=dm-0 ino=284133 scontext=unconfined_u:system_r:httpd_t:s0
tcontext=unconfined_u:object_r:samba_share_t:s0 tclass=file
type=SYSCALL msg=audit(1226874073.147:96): arch=40000003 syscall=196 success=no exit=-13
a0=b98df198 a1=bfec85dc a2=54dff4 a3=2008171 items=0 ppid=2463 pid=2465 auid=502 uid=48
gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) ses=6 comm="httpd"
exe="/usr/sbin/httpd" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
</html:pre>
<html:ul><html:li><html:code>msg=audit(1226874073.147:96)</html:code><html:ul><html:li>The number in parentheses is the unformatted time stamp (Epoch time)
for the event, which can be converted to standard time by using the
<html:code>date</html:code> command.
</html:li></html:ul></html:li><html:li><html:code>{ getattr }</html:code><html:ul><html:li>The item in braces indicates the permission that was denied. <html:code>getattr</html:code>
indicates the source process was trying to read the target file's status information.
This occurs before reading files. This action is denied due to the file being
accessed having the wrong label. Commonly seen permissions include <html:code>getattr</html:code>,
<html:code>read</html:code>, and <html:code>write</html:code>.</html:li></html:ul></html:li><html:li><html:code>comm="httpd"</html:code><html:ul><html:li>The executable that launched the process. The full path of the executable is
found in the <html:code>exe=</html:code> section of the system call (<html:code>SYSCALL</html:code>) message,
which in this case, is <html:code>exe="/usr/sbin/httpd"</html:code>.
</html:li></html:ul></html:li><html:li><html:code>path="/var/www/html/file1"</html:code><html:ul><html:li>The path to the object (target) the process attempted to access.
</html:li></html:ul></html:li><html:li><html:code>scontext="unconfined_u:system_r:httpd_t:s0"</html:code><html:ul><html:li>The SELinux context of the process that attempted the denied action. In
this case, it is the SELinux context of the Apache HTTP Server, which is running
in the <html:code>httpd_t</html:code> domain.
</html:li></html:ul></html:li><html:li><html:code>tcontext="unconfined_u:object_r:samba_share_t:s0"</html:code><html:ul><html:li>The SELinux context of the object (target) the process attempted to access.
In this case, it is the SELinux context of <html:code>file1</html:code>. Note: the <html:code>samba_share_t</html:code>
type is not accessible to processes running in the <html:code>httpd_t</html:code> domain.</html:li></html:ul></html:li><html:li> From the system call (<html:code>SYSCALL</html:code>) message, two items are of interest:
<html:ul><html:li><html:code>success=no</html:code>: indicates whether the denial (AVC) was enforced or not.
<html:code>success=no</html:code> indicates the system call was not successful (SELinux denied
access). <html:code>success=yes</html:code> indicates the system call was successful - this can
be seen for permissive domains or unconfined domains, such as <html:code>initrc_t</html:code>
and <html:code>kernel_t</html:code>.
</html:li><html:li><html:code>exe="/usr/sbin/httpd"</html:code>: the full path to the executable that launched
the process, which in this case, is <html:code>exe="/usr/sbin/httpd"</html:code>.
</html:li></html:ul>
</html:li></html:ul>
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable auditd Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service is an essential userspace component of
the Linux Auditing System, as it is responsible for writing audit records to
disk.
The <html:code>auditd</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 auditd on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">347</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">172</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">880</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1353</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1462</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1454</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">067</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">158</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">831</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1190</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">120</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">Ensuring the <html:code>auditd</html:code> service is active ensures
audit records generated by the kernel can be written to disk, or that appropriate
actions will be taken if other obstacles exist.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_auditd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable auditd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_auditd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service auditd
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- auditd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_auditd_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns10:title>
<ns10:description xml:lang="en-US">To ensure all processes can be audited, even
those which start prior to the audit daemon, add the argument
<html:code>audit=1</html:code> to the kernel line in <html:code>/etc/grub.conf</html:code>, in the manner below:
<html:pre>kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet audit=1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-14(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">
Each process on the system carries an "auditable" flag which
indicates whether its activities can be audited. Although <html:code>auditd</html:code>
takes care of enabling this for all processes which launch after it
does, adding the kernel argument ensures it is set for every
process during boot.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="bootloader_audit_argument" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">/sbin/grubby --update-kernel=ALL --args="audit=1"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_audit_argument:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-bootloader_audit_argument_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_configure_auditd_data_retention">
<ns10:title xml:lang="en-US">Configure auditd Data Retention</ns10:title>
<ns10:description xml:lang="en-US">
The audit system writes data to <html:code>/var/log/audit/audit.log</html:code>. By default,
<html:code>auditd</html:code> rotates 5 logs by size (6MB), retaining a maximum of 30MB of
data in total, and refuses to write entries when the disk is too
full. This minimizes the risk of audit data filling its partition
and impacting other services. This also minimizes the risk of the audit
daemon temporarily disabling the system if it cannot write audit log (which
it can be configured to do).
For a busy
system or a system which is thoroughly auditing system activity, the default settings
for data retention may be
insufficient. The log file size needed will depend heavily on what types
of events are being audited. First configure auditing to log all the events of
interest. Then monitor the log size manually for awhile to determine what file
size will allow you to keep the required data for the correct time period.
<html:br /><html:br />
Using a dedicated partition for <html:code>/var/log/audit</html:code> prevents the
<html:code>auditd</html:code> logs from disrupting system functionality if they fill, and,
more importantly, prevents other activity in <html:code>/var</html:code> from filling the
partition and stopping the audit trail. (The audit logs are size-limited and
therefore unlikely to grow without bound unless configured to do so.) Some
machines may have requirements that no actions occur which cannot be audited.
If this is the case, then <html:code>auditd</html:code> can be configured to halt the machine
if it runs out of space. <html:b>Note:</html:b> Since older logs are rotated,
configuring <html:code>auditd</html:code> this way does not prevent older logs from being
rotated away before they can be viewed.
<html:i>If your system is configured to halt when logging cannot be performed, make
sure this can never happen under normal circumstances! Ensure that
<html:code>/var/log/audit</html:code> is on its own partition, and that this partition is
larger than the maximum amount of data <html:code>auditd</html:code> will retain
normally.</html:i>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">138</ns10:reference>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_num_logs" type="number">
<ns10:title xml:lang="en-US">Number of log files for auditd to retain</ns10:title>
<ns10:description xml:lang="en-US">The setting for num_logs in /etc/audit/auditd.conf</ns10:description>
<ns10:value>5</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" type="number">
<ns10:title xml:lang="en-US">Maximum audit log file size for auditd</ns10:title>
<ns10:description xml:lang="en-US">The setting for max_log_size in /etc/audit/auditd.conf</ns10:description>
<ns10:value>6</ns10:value>
<ns10:value selector="20">20</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="1">1</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when log files reach their maximum size</ns10:title>
<ns10:description xml:lang="en-US">The setting for max_log_file_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>rotate</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="rotate">rotate</ns10:value>
<ns10:value selector="keep_logs">keep_logs</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when disk space just starts to run low</ns10:title>
<ns10:description xml:lang="en-US">The setting for space_left_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>email</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="email">email</ns10:value>
<ns10:value selector="exec">exec</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="single">single</ns10:value>
<ns10:value selector="halt">halt</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when disk space runs dangerously low</ns10:title>
<ns10:description xml:lang="en-US">The setting for space_left_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>single</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="email">email</ns10:value>
<ns10:value selector="exec">exec</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="single">single</ns10:value>
<ns10:value selector="halt">halt</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" type="string">
<ns10:title xml:lang="en-US">Account for auditd to send email when actions occurs</ns10:title>
<ns10:description xml:lang="en-US">The setting for action_mail_acct in /etc/audit/auditd.conf</ns10:description>
<ns10:value>root</ns10:value>
<ns10:value selector="root">root</ns10:value>
<ns10:value selector="admin">admin</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_flush" type="string">
<ns10:title xml:lang="en-US">Auditd priority for flushing data to disk</ns10:title>
<ns10:description xml:lang="en-US">The setting for flush in /etc/audit/auditd.conf</ns10:description>
<ns10:value>data</ns10:value>
<ns10:value selector="none">none</ns10:value>
<ns10:value selector="incremental">incremental</ns10:value>
<ns10:value selector="data">data</ns10:value>
<ns10:value selector="sync">sync</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd Number of Logs Retained</ns10:title>
<ns10:description xml:lang="en-US">Determine how many log files
<html:code>auditd</html:code> should retain when it rotates logs.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following
line, substituting <html:i>NUMLOGS</html:i> with the correct value of <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy" />:
<html:pre>num_logs = <html:i>NUMLOGS</html:i></html:pre>
Set the value to 5 for general-purpose systems.
Note that values less than 2 result in no log rotation.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum log
file size and the number of logs retained.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_num_logs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_num_logs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^num_logs $AUDITCONFIG && \
sed -i 's/^num_logs.*/num_logs = '"$var_auditd_num_logs"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "num_logs = $var_auditd_num_logs" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_num_logs:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_num_logs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_num_logs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd Max Log File Size</ns10:title>
<ns10:description xml:lang="en-US">Determine the amount of audit data (in megabytes)
which should be retained in each log file. Edit the file
<html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following line, substituting
the correct value of <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" use="legacy" /> for <html:i>STOREMB</html:i>:
<html:pre>max_log_file = <html:i>STOREMB</html:i></html:pre>
Set the value to <html:code>6</html:code> (MB) or higher for general-purpose systems.
Larger values, of course,
support retention of even more audit data.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum
log file size and the number of logs retained.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_max_log_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_max_log_file="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^max_log_file $AUDITCONFIG && \
sed -i 's/^max_log_file.*/max_log_file = '"$var_auditd_max_log_file"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "max_log_file = $var_auditd_max_log_file" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_max_log_file:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_max_log_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd max_log_file_action Upon Reaching Maximum Log Size</ns10:title>
<ns10:description xml:lang="en-US"> The default action to take when the logs reach their maximum size
is to rotate the log files, discarding the oldest one. To configure the action taken
by <html:code>auditd</html:code>, add or correct the line in <html:code>/etc/audit/auditd.conf</html:code>:
<html:pre>max_log_file_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i>ACTION</html:i> are described in the <html:code>auditd.conf</html:code> man
page. These include:
<html:ul><html:li><html:code>ignore</html:code></html:li><html:li><html:code>syslog</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>rotate</html:code></html:li><html:li><html:code>keep_logs</html:code></html:li></html:ul>
Set the <html:code><html:i>ACTION</html:i></html:code> to <html:code>rotate</html:code> to ensure log rotation
occurs. This is the default. The setting is case-insensitive.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Automatically rotating logs (by setting this to <html:code>rotate</html:code>)
minimizes the chances of the system unexpectedly running out of disk space by
being overwhelmed with log data. However, for systems that must never discard
log data, or which use external processes to transfer it and reclaim space,
<html:code>keep_logs</html:code> can be employed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_max_log_file_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_max_log_file_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^max_log_file_action $AUDITCONFIG && \
sed -i 's/^max_log_file_action.*/max_log_file_action = '"$var_auditd_max_log_file_action"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "max_log_file_action = $var_auditd_max_log_file_action" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_max_log_file_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_max_log_file_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd space_left Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to take an action
when disk space <html:i>starts</html:i> to run low.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Modify the following line,
substituting <html:i>ACTION</html:i> appropriately:
<html:pre>space_left_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i>ACTION</html:i> are described in the <html:code>auditd.conf</html:code> man page.
These include:
<html:ul><html:li><html:code>ignore</html:code></html:li><html:li><html:code>syslog</html:code></html:li><html:li><html:code>email</html:code></html:li><html:li><html:code>exec</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>single</html:code></html:li><html:li><html:code>halt</html:code></html:li></html:ul>
Set this to <html:code>email</html:code> (instead of the default,
which is <html:code>suspend</html:code>) as it is more likely to get prompt attention. Acceptable values
also include <html:code>suspend</html:code>, <html:code>single</html:code>, and <html:code>halt</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">143</ns10:reference>
<ns10:rationale xml:lang="en-US">Notifying administrators of an impending disk space problem may
allow them to take corrective action prior to any disruption.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_space_left_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_space_left_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" use="legacy" />"
#
# If space_left_action present in /etc/audit/auditd.conf, change value
# to var_auditd_space_left_action, else
# add "space_left_action = $var_auditd_space_left_action" to /etc/audit/auditd.conf
#
if grep --silent ^space_left_action /etc/audit/auditd.conf ; then
sed -i 's/^space_left_action.*/space_left_action = '"$var_auditd_space_left_action"'/g' /etc/audit/auditd.conf
else
echo -e "\n# Set space_left_action to $var_auditd_space_left_action per security requirements" >> /etc/audit/auditd.conf
echo "space_left_action = $var_auditd_space_left_action" >> /etc/audit/auditd.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_space_left_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd admin_space_left Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to take an action
when disk space is running low but prior to running out of space completely.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i>ACTION</html:i> appropriately:
<html:pre>admin_space_left_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code>single</html:code> to cause the system to switch to single-user
mode for corrective action. Acceptable values also include <html:code>suspend</html:code> and
<html:code>halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for <html:i>ACTION</html:i> are described in the
<html:code>auditd.conf</html:code> man page.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1343</ns10:reference>
<ns10:rationale xml:lang="en-US">Administrators should be made aware of an inability to record
audit records. If a separate partition or logical volume of adequate size
is used, running low on space for audit records should never occur.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_admin_space_left_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_admin_space_left_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" use="legacy" />"
grep -q ^admin_space_left_action /etc/audit/auditd.conf && \
sed -i "s/admin_space_left_action.*/admin_space_left_action = $var_auditd_admin_space_left_action/g" /etc/audit/auditd.conf
if ! [ $? -eq 0 ]; then
echo "admin_space_left_action = $var_auditd_admin_space_left_action" >> /etc/audit/auditd.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_admin_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd mail_acct Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to send email to
a designated account in certain situations. Add or correct the following line
in <html:code>/etc/audit/auditd.conf</html:code> to ensure that administrators are notified
via email for those situations:
<html:pre>action_mail_acct = <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">139</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">144</ns10:reference>
<ns10:rationale xml:lang="en-US">Email sent to the root account is typically aliased to the
administrators of the system, who can take appropriate action.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_action_mail_acct" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_action_mail_acct="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^action_mail_acct $AUDITCONFIG && \
sed -i 's/^action_mail_acct.*/action_mail_acct = '"$var_auditd_action_mail_acct"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "action_mail_acct = $var_auditd_action_mail_acct" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_action_mail_acct:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_action_mail_acct:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_flush" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure auditd flush priority</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to
synchronously write audit event data to disk. Add or correct the following
line in <html:code>/etc/audit/auditd.conf</html:code> to ensure that audit event data is
fully synchronized with the log files on the disk:
<html:pre>flush = <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_flush" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1576</ns10:reference>
<ns10:rationale xml:lang="en-US">Audit data should be synchronously written to disk to ensure
log integrity. These parameters assure that all audit event data is fully
synchronized with the log files on the disk.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_flush" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_flush="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_flush" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
# if flush is present, flush param edited to var_auditd_flush
# else flush param is defined by var_auditd_flush
#
# the freq param is only used value 'incremental' and will be
# commented out if flush != incremental
#
# if flush == incremental && freq param is not defined, it
# will be defined as the package-default value of 20
grep -q ^flush $AUDITCONFIG && \
sed -i 's/^flush.*/flush = '"$var_auditd_flush"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "flush = $var_auditd_flush" >> $AUDITCONFIG
fi
if ! [ "$var_auditd_flush" == "incremental" ]; then
sed -i 's/^freq/##freq/g' $AUDITCONFIG
elif [ "$var_auditd_flush" == "incremental" ]; then
grep -q freq $AUDITCONFIG && \
sed -i 's/^#\+freq/freq/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "freq = 20" >> $AUDITCONFIG
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_flush:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_flush" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_flush:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_flush_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure auditd to use audispd's syslog plugin</ns10:title>
<ns10:description xml:lang="en-US">To configure the <html:code>auditd</html:code> service to use the
<html:code>syslog</html:code> plug-in of the <html:code>audispd</html:code> audit event multiplexor, set
the <html:code>active</html:code> line in <html:code>/etc/audisp/plugins.d/syslog.conf</html:code> to
<html:code>yes</html:code>. Restart the <html:code>auditd</html:code> service:
<html:pre>$ sudo service auditd restart</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">136</ns10:reference>
<ns10:rationale xml:lang="en-US">The auditd service does not include the ability to send audit
records to a centralized server for management directly. It does, however,
include a plug-in for audit event multiplexor (audispd) to pass audit records
to the local syslog server</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_audispd_syslog_plugin_activated" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
grep -q ^active /etc/audisp/plugins.d/syslog.conf && \
sed -i "s/active.*/active = yes/g" /etc/audisp/plugins.d/syslog.conf
if ! [ $? -eq 0 ]; then
echo "active = yes" >> /etc/audisp/plugins.d/syslog.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_auditd_configure_rules">
<ns10:title xml:lang="en-US">Configure auditd Rules for Comprehensive Auditing</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> program can perform comprehensive
monitoring of system activity. This section describes recommended
configuration settings for comprehensive auditing, but a full
description of the auditing system's capabilities is beyond the
scope of this guide. The mailing list <html:i>linux-audit@redhat.com</html:i> exists
to facilitate community discussion of the auditing system.
<html:br /><html:br />
The audit subsystem supports extensive collection of events, including:
<html:br />
<html:ul><html:li>Tracing of arbitrary system calls (identified by name or number)
on entry or exit.</html:li><html:li>Filtering by PID, UID, call success, system call argument (with
some limitations), etc.</html:li><html:li>Monitoring of specific files for modifications to the file's
contents or metadata.</html:li></html:ul>
<html:br />
Auditing rules at startup are controlled by the file <html:code>/etc/audit/audit.rules</html:code>.
Add rules to it to meet the auditing requirements for your organization.
Each line in <html:code>/etc/audit/audit.rules</html:code> represents a series of arguments
that can be passed to <html:code>auditctl</html:code> and can be individually tested
during runtime. See documentation in <html:code>/usr/share/doc/audit-<html:i>VERSION</html:i></html:code> and
in the related man pages for more details.
<html:br /><html:br />
If copying any example audit rulesets from <html:code>/usr/share/doc/audit-VERSION</html:code>,
be sure to comment out the
lines containing <html:code>arch=</html:code> which are not appropriate for your system's
architecture. Then review and understand the following rules,
ensuring rules are activated as needed for the appropriate
architecture.
<html:br /><html:br />
After reviewing all the rules, reading the following sections, and
editing as needed, the new rules can be activated as follows:
<html:pre>$ sudo service auditd restart</html:pre>
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_audit_time_rules">
<ns10:title xml:lang="en-US">Records Events that Modify Date and Time Information</ns10:title>
<ns10:description xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time. All changes to the system
time should be audited.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record attempts to alter time through adjtimex</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S adjtimex -k audit_time_rules</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b64 -S adjtimex -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_adjtimex" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_adjtimex:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record attempts to alter time through settimeofday</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S settimeofday -k audit_time_rules</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b64 -S settimeofday -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_settimeofday" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_settimeofday:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Time Through stime</ns10:title>
<ns10:description xml:lang="en-US">Add the following line to <html:code>/etc/audit/audit.rules</html:code> for both
32-bit and 64-bit systems:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S stime -k audit_time_rules</html:pre>
Since the 64-bit version of the "stime" system call is not defined in the audit
lookup table, the corresponding "-F arch=b64" form of this rule is not expected
to be defined on 64-bit systems (the aforementioned "-F arch=b32" stime rule
form itself is sufficient for both 32-bit and 64-bit systems). The -k option
allows for the specification of a key in string form that can be used for
better reporting capability through ausearch and aureport. Multiple system
calls can be defined on the same line to save space if desired, but is not
required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_stime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_stime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Time Through clock_settime</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># time-change
-a always,exit -F arch=b32 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># time-change
-a always,exit -F arch=b64 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_clock_settime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S clock_settime -F a0=.* \(-F key=\|-k \).*"
GROUP="clock_settime"
FULL_RULE="-a always,exit -F arch=$ARCH -S clock_settime -F a0=0x0 -k time-change"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_clock_settime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter the localtime File</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/localtime -p wa -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport and
should always be used.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_watch_localtime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/localtime" "wa" "audit_time_rules"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_watch_localtime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify User/Group Information</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>, in order
to capture events that modify account changes:
<html:pre># audit_rules_usergroup_modification
-w /etc/group -p wa -k audit_rules_usergroup_modification
-w /etc/passwd -p wa -k audit_rules_usergroup_modification
-w /etc/gshadow -p wa -k audit_rules_usergroup_modification
-w /etc/shadow -p wa -k audit_rules_usergroup_modification
-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">18</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1403</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1404</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1405</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1684</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1683</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1685</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1686</ns10:reference>
<ns10:rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any
unexpected users, groups, or modifications should be investigated for
legitimacy.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_usergroup_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/group" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "auditctl" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "auditctl" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_usergroup_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Network Environment</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>, setting
ARCH to either b32 or b64 as appropriate for your system:
<html:pre># audit_rules_networkconfig_modification
-a always,exit -F arch=ARCH -S sethostname -S setdomainname -k audit_rules_networkconfig_modification
-w /etc/issue -p wa -k audit_rules_networkconfig_modification
-w /etc/issue.net -p wa -k audit_rules_networkconfig_modification
-w /etc/hosts -p wa -k audit_rules_networkconfig_modification
-w /etc/sysconfig/network -p wa -k audit_rules_networkconfig_modification</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The network environment should not be modified by anything other
than administrator action. Any change to network parameters should be
audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_networkconfig_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -k *"
# Use escaped BRE regex to specify rule group
GROUP="set\(host\|domain\)name"
FULL_RULE="-a always,exit -F arch=$ARCH -S sethostname -S setdomainname -k audit_rules_networkconfig_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
# Then perform the remediations for the watch rules
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/issue" "wa" "audit_rules_networkconfig_modification"
fix_audit_watch_rule "auditctl" "/etc/issue.net" "wa" "audit_rules_networkconfig_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/hosts" "wa" "audit_rules_networkconfig_modification"
fix_audit_watch_rule "auditctl" "/etc/sysconfig/network" "wa" "audit_rules_networkconfig_modification"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_networkconfig_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">System Audit Logs Must Have Mode 0640 or Less Permissive</ns10:title>
<ns10:description xml:lang="en-US">
If <html:code>log_group</html:code> in <html:code>/etc/audit/auditd.conf</html:code> is set to a group other than the <html:code>root</html:code>
group account, change the mode of the audit log files with the following command:
<html:pre>$ sudo chmod 0640 <html:i>audit_file</html:i></html:pre>
<html:br />
Otherwise, change the mode of the audit log files with the following command:
<html:pre>$ sudo chmod 0600 <html:i>audit_file</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">166</ns10:reference>
<ns10:rationale xml:lang="en-US">
If users can write to audit logs, audit trails can be modified or destroyed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_var_log_audit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
if `grep -q ^log_group /etc/audit/auditd.conf` ; then
GROUP=$(awk -F "=" '/log_group/ {print $2}' /etc/audit/auditd.conf | tr -d ' ')
if ! [ "${GROUP}" == 'root' ] ; then
chmod 0640 /var/log/audit/audit.log
chmod 0440 /var/log/audit/audit.log.*
else
chmod 0600 /var/log/audit/audit.log
chmod 0400 /var/log/audit/audit.log.*
fi
chmod 0640 /etc/audit/audit*
chmod 0640 /etc/audit/rules.d/*
else
chmod 0600 /var/log/audit/audit.log
chmod 0400 /var/log/audit/audit.log.*
chmod 0640 /etc/audit/audit*
chmod 0640 /etc/audit/rules.d/*
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">System Audit Logs Must Be Owned By Root</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/var/log</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /var/log </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">166</ns10:reference>
<ns10:rationale xml:lang="en-US">Failure to give ownership of the audit log files to root allows the designated
owner, and unauthorized users, potential access to sensitive information.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_var_log_audit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
if `grep -q ^log_group /etc/audit/auditd.conf` ; then
GROUP=$(awk -F "=" '/log_group/ {print $2}' /etc/audit/auditd.conf | tr -d ' ')
if ! [ "${GROUP}" == 'root' ] ; then
chown root.${GROUP} /var/log/audit
chown root.${GROUP} /var/log/audit/audit.log*
else
chown root.root /var/log/audit
chown root.root /var/log/audit/audit.log*
fi
else
chown root.root /var/log/audit
chown root.root /var/log/audit/audit.log*
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Mandatory Access Controls</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/selinux/ -p wa -k MAC-policy</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The system's mandatory access policy (SELinux) should not be
arbitrarily changed by anything other than administrator action. All changes to
MAC policy should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_mac_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/selinux/" "wa" "MAC-policy"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_mac_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_audit_dac_actions">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls</ns10:title>
<ns10:description xml:lang="en-US">At a minimum, the audit system should collect file permission
changes for all users and root. Note that the "-F arch=b32" lines should be
present even on a 64 bit system. These commands identify system calls for
auditing. Even if the system is 64 bit it can still execute 32 bit system
calls. Additionally, these rules can be configured in a number of ways while
still achieving the desired effect. An example of this is that the "-S" calls
could be split up and placed on separate lines, however, this is less efficient.
Add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod
-a always,exit -F arch=b32 -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod
-a always,exit -F arch=b32 -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If your system is 64 bit then these lines should be duplicated and the
arch=b32 replaced with arch=b64 as follows:
<html:pre>-a always,exit -F arch=b64 -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod
-a always,exit -F arch=b64 -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod
-a always,exit -F arch=b64 -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is
attempting to gain access to information that would otherwise be disallowed.
Auditing DAC modifications can facilitate the identification of patterns of
abuse among both authorized and unauthorized users.</ns10:rationale>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chmod</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_chmod" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_chmod:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S chown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S chown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_chown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_chown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmod</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchmod" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchmod:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmodat</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchmodat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchownat</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchownat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchownat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fremovexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fremovexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fsetxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fsetxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lchown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lchown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lchown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lremovexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lremovexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lsetxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lsetxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - removexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_removexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_removexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - setxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_setxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_setxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Login and Logout Events</ns10:title>
<ns10:description xml:lang="en-US">
The audit system already collects login info for all users and root. To watch for attempted manual edits of
files involved in storing login events, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock/ -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_login_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/tallylog" "wa" "logins"
fix_audit_watch_rule "auditctl" "/var/run/faillock/" "wa" "logins"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/lastlog" "wa" "logins"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_login_events:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Process and Session Initiation Information</ns10:title>
<ns10:description xml:lang="en-US"> The audit system already collects process information for all
users and root. To watch for attempted manual edits of files involved in
storing such process information, add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /var/run/utmp -p wa -k session
-w /var/log/btmp -p wa -k session
-w /var/log/wtmp -p wa -k session</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_session_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/run/utmp" "wa" "session"
fix_audit_watch_rule "auditctl" "/var/log/btmp" "wa" "session"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/wtmp" "wa" "session"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_session_events:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect
unauthorized file accesses for all users and root. Add the following
to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access
-a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access</html:pre>
If the system is 64 bit then also add the following:
<html:pre>
-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access
-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_unsuccessful_file_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
# First fix the -EACCES requirement
PATTERN="-a always,exit -F arch=$ARCH -S .* -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k *"
# Use escaped BRE regex to specify rule group
GROUP="\(creat\|open\|truncate\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
# Then fix the -EPERM requirement
PATTERN="-a always,exit -F arch=$ARCH -S .* -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k *"
# No need to change content of $GROUP variable - it's the same as for -EACCES case above
FULL_RULE="-a always,exit -F arch=$ARCH -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_unsuccessful_file_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect the
execution of privileged commands for all users and root.
To find the relevant setuid / setgid programs, run the following command
for each local partition <html:i>PART</html:i>:
<html:pre>$ sudo find <html:i>PART</html:i> -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null</html:pre>
Then, for each setuid / setgid program on the system, add a line of the
following form to <html:code>/etc/audit/audit.rules</html:code>, where
<html:i>SETUID_PROG_PATH</html:i> is the full path to each setuid / setgid program
in the list:
<html:pre>-a always,exit -F path=<html:i>SETUID_PROG_PATH</html:i> -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10))</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(9)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">40</ns10:reference>
<ns10:rationale xml:lang="en-US">Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_privileged_commands" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_perform_audit_rules_privileged_commands_remediation" use="legacy" />
perform_audit_rules_privileged_commands_remediation "auditctl" "500"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_privileged_commands:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on Exporting to Media (successful)</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect media
exportation events for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre>-a always,exit -F arch=ARCH -S mount -F auid>=500 -F auid!=4294967295 -k export</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The unauthorized exportation of data to external media could result in an information leak
where classified information, Privacy Act information, and intellectual property could be lost. An audit
trail should be created each time a filesystem is mounted to help identify and guard against information
loss.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_media_export" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="mount"
FULL_RULE="-a always,exit -F arch=$ARCH -S mount -F auid>=500 -F auid!=4294967295 -k export"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_media_export:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects File Deletion Events by User</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
deletion events for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre>-a always,exit -F arch=ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">Auditing file deletions will create an audit trail for files that are removed
from the system. The audit trail could aid in system troubleshooting, as well as, detecting
malicious processes that attempt to delete log files to conceal their presence.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_file_deletion_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k delete"
# Use escaped BRE regex to specify rule group
GROUP="\(rmdir\|unlink\|rename\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_file_deletion_events:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects System Administrator Actions</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect
administrator actions for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/sudoers -p wa -k actions</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(7)(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The actions taken by system administrators should be audited to keep a record
of what was executed on the system, as well as, for accountability purposes.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_sysadmin_actions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/sudoers" "wa" "actions"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_sysadmin_actions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Loading and Unloading</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code> in order
to capture kernel module loading and unloading events, setting ARCH to either b32 or b64 as appropriate for your system:
<html:pre>-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-a always,exit -F arch=<html:i>ARCH</html:i> -S init_module -S delete_module -k modules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The addition/removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_kernel_module_loading" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# Note: 32-bit kernel modules can't be loaded / unloaded on 64-bit kernel =>
# it's not required on a 64-bit system to check also for the presence
# of 32-bit's equivalent of the corresponding rule. Therefore for
# each system it's enought to check presence of system's native rule form.
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -k *"
# Use escaped BRE regex to specify rule group
GROUP="\(init\|delete\)_module"
FULL_RULE="-a always,exit -F arch=$ARCH -S init_module -S delete_module -k modules"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
# Then perform the remediations for the watch rules
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/sbin/insmod" "x" "modules"
fix_audit_watch_rule "auditctl" "/sbin/rmmod" "x" "modules"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/sbin/modprobe" "x" "modules"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_kernel_module_loading:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="false" severity="low">
<ns10:title xml:lang="en-US">Make the auditd Configuration Immutable</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code> in order
to make the configuration immutable:
<html:pre>-e 2</html:pre>
With this setting, a reboot will be required to change any
audit rules.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Making the audit configuration immutable prevents accidental as
well as malicious modification of the audit rules, although it may be
problematic if legitimate changes are needed during system
operation</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_immutable" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
readonly AUDIT_RULES='/etc/audit/audit.rules'
# If '-e .*' setting present in audit.rules already, delete it since the
# auditctl(8) manual page instructs it should be the last rule in configuration
sed -i '/-e[[:space:]]\+.*/d' $AUDIT_RULES
# Append '-e 2' requirement at the end of audit.rules
echo '' >> $AUDIT_RULES
echo '# Set the audit.rules configuration immutable per security requirements' >> $AUDIT_RULES
echo '# Reboot is required to change audit rules once this setting is applied' >> $AUDIT_RULES
echo '-e 2' >> $AUDIT_RULES
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_immutable:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_services">
<ns10:title xml:lang="en-US">Services</ns10:title>
<ns10:description xml:lang="en-US">
The best protection against vulnerable software is running less software. This section describes how to review
the software which Red Hat Enterprise Linux 6 installs on a system and disable software which is not needed. It
then enumerates the software packages installed on a default Red Hat Enterprise Linux 6 system and provides guidance about which
ones can be safely disabled.
<html:br /><html:br />
Red Hat Enterprise Linux 6 provides a convenient minimal install option that essentially installs the bare necessities for a functional
system. When building Red Hat Enterprise Linux 6 systems, it is highly recommended to select the minimal packages and then build up
the system from there.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_obsolete">
<ns10:title xml:lang="en-US">Obsolete Services</ns10:title>
<ns10:description xml:lang="en-US">This section discusses a number of network-visible
services which have historically caused problems for system
security, and for which disabling or severely limiting the service
has been the best available guidance for some time. As a result of
this, many of these services are not installed as part of Red Hat Enterprise Linux 6
by default.
<html:br /><html:br />
Organizations which are running these services should
switch to more secure equivalents as soon as possible.
If it remains absolutely necessary to run one of
these services for legacy reasons, care should be taken to restrict
the service as much as possible, for instance by configuring host
firewall software such as <html:code>iptables</html:code> to restrict access to the
vulnerable service to only those remote hosts which have a known
need to use it.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_inetd_and_xinetd">
<ns10:title xml:lang="en-US">Xinetd</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>xinetd</html:code> service acts as a dedicated listener for some
network services (mostly, obsolete ones) and can be used to provide access
controls and perform some logging. It has been largely obsoleted by other
features, and it is not installed by default. The older Inetd service
is not even available as part of Red Hat Enterprise Linux 6.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable xinetd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>xinetd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig xinetd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
The xinetd service provides a dedicated listener service for some programs,
which is no longer necessary for commonly-used network services. Disabling
it ensures that these uncommon services are not running, and also prevents
attacks against xinetd itself.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_xinetd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_xinetd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service xinetd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- xinetd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_xinetd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_xinetd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall xinetd Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>xinetd</html:code> package can be uninstalled with the following command:
<html:pre>$ sudo yum erase xinetd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>xinetd</html:code> package decreases the risk of the
xinetd service's accidental (or intentional) activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure xinetd is removed
package:
name="{{item}}"
state=absent
with_items:
- xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_xinetd
class remove_xinetd {
package { 'xinetd':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=xinetd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_xinetd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_xinetd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_telnet">
<ns10:title xml:lang="en-US">Telnet</ns10:title>
<ns10:description xml:lang="en-US">The telnet protocol does not provide confidentiality or integrity
for information transmitted on the network. This includes authentication
information such as passwords. Organizations which use telnet should be
actively working to migrate to a more secure protocol.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable telnet Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>telnet</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig telnet off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">197</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">877</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">888</ns10:reference>
<ns10:rationale xml:lang="en-US">
The telnet protocol uses unencrypted network communication, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network. The telnet protocol is also
subject to man-in-the-middle attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_telnetd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_telnetd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Uninstall telnet-server Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>telnet-server</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase telnet-server</html:pre></ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>telnet-server</html:code> package decreases the risk of the
telnet service's accidental (or intentional) activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove telnet-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure telnet-server is removed
package:
name="{{item}}"
state=absent
with_items:
- telnet-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_telnet-server
class remove_telnet-server {
package { 'telnet-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=telnet-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_telnet-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_telnet_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove telnet Clients</ns10:title>
<ns10:description xml:lang="en-US">The telnet client allows users to start connections to other
systems via the telnet protocol.</ns10:description>
<ns10:rationale xml:lang="en-US">The <html:code>telnet</html:code> protocol is insecure and unencrypted. The use
of an unencrypted transmission medium could allow an unauthorized user
to steal credentials. The <html:code>ssh</html:code> package provides an
encrypted session and stronger security and is included in Red Hat
Enterprise Linux.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove telnet
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure telnet is removed
package:
name="{{item}}"
state=absent
with_items:
- telnet
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_telnet
class remove_telnet {
package { 'telnet':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=telnet
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_telnet_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_telnet_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_r_services">
<ns10:title xml:lang="en-US">Rlogin, Rsh, and Rexec</ns10:title>
<ns10:description xml:lang="en-US">The Berkeley r-commands are legacy services which
allow cleartext remote access and have an insecure trust
model.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Uninstall rsh-server Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh-server</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase rsh-server</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rsh-server</html:code> package provides several obsolete and insecure
network services. Removing it
decreases the risk of those services' accidental (or intentional)
activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove rsh-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsh-server is removed
package:
name="{{item}}"
state=absent
with_items:
- rsh-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_rsh-server
class remove_rsh-server {
package { 'rsh-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=rsh-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsh-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsh-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rexec Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rexec</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rexec</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rexec off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rexec service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rexec_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rexec_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rsh Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rsh</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rsh off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rsh service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rsh_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rsh_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsh_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstal rsh Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh</html:code> package contains the client commands
for the rsh services</ns10:description>
<ns10:rationale xml:lang="en-US">These legacy clients contain numerous security exposures and have
been replaced with the more secure SSH package. Even if the server is removed,
it is best to ensure the clients are also removed to prevent users from
inadvertently attempting to use these commands and therefore exposing
their credentials. Note that removing the <html:code>rsh</html:code> package removes
the clients for <html:code>rsh</html:code>,<html:code>rcp</html:code>, and <html:code>rlogin</html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove rsh
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsh is removed
package:
name="{{item}}"
state=absent
with_items:
- rsh
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_rsh
class remove_rsh {
package { 'rsh':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=rsh
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsh_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsh_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rlogin Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rlogin</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rlogin</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rlogin off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rlogin service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rlogin_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rlogin_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="false" severity="high">
<ns10:title xml:lang="en-US">Remove Rsh Trust Files</ns10:title>
<ns10:description xml:lang="en-US">The files <html:code>/etc/hosts.equiv</html:code> and <html:code>~/.rhosts</html:code> (in
each user's home directory) list remote hosts and users that are trusted by the
local system when using the rshd daemon.
To remove these files, run the following command to delete them from any
location:
<html:pre>$ sudo rm /etc/hosts.equiv</html:pre>
<html:pre>$ rm ~/.rhosts</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">Trust files are convenient, but when
used in conjunction with the R-services, they can allow
unauthenticated access to a system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_rsh_trust_files" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">find -type f -name .rhosts -exec rm -f '{}' \;
rm /etc/hosts.equiv
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_rsh_trust_files:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nis">
<ns10:title xml:lang="en-US">NIS</ns10:title>
<ns10:description xml:lang="en-US">The Network Information Service (NIS), also known as 'Yellow
Pages' (YP), and its successor NIS+ have been made obsolete by
Kerberos, LDAP, and other modern centralized authentication
services. NIS should not be used because it suffers from security
problems inherent in its design, such as inadequate protection of
important authentication information.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall ypserv Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ypserv</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase ypserv</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">Removing the <html:code>ypserv</html:code> package decreases the risk of the
accidental (or intentional) activation of NIS or NIS+ services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove ypserv
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure ypserv is removed
package:
name="{{item}}"
state=absent
with_items:
- ypserv
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_ypserv
class remove_ypserv {
package { 'ypserv':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=ypserv
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_ypserv_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_ypserv_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable ypbind Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ypbind</html:code> service, which allows the system to act as a client in
a NIS or NIS+ domain, should be disabled.
The <html:code>ypbind</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig ypbind off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling the <html:code>ypbind</html:code> service ensures the system is not acting
as a client in a NIS or NIS+ domain.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ypbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ypbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service ypbind
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- ypbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ypbind_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ypbind_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_ypbind_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove NIS Client</ns10:title>
<ns10:description xml:lang="en-US">The Network Information Service (NIS), formerly known as Yellow Pages,
is a client-server directory service protocol used to distribute system configuration
files. The NIS client (<html:code>ypbind</html:code>) was used to bind a machine to an NIS server
and receive the distributed configuration files.</ns10:description>
<ns10:rationale xml:lang="en-US">The NIS service is inherently an insecure system that has been vulnerable
to DOS attacks, buffer overflows and has poor authentication for querying NIS maps.
NIS generally has been replaced by such protocols as Lightweight Directory Access
Protocol (LDAP). It is recommended that the service be removed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure ypbind is removed
package:
name="{{item}}"
state=absent
with_items:
- ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_ypbind
class remove_ypbind {
package { 'ypbind':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=ypbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_ypbind_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_ypbind_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_tftp">
<ns10:title xml:lang="en-US">TFTP Server</ns10:title>
<ns10:description xml:lang="en-US">
TFTP is a lightweight version of the FTP protocol which has
traditionally been used to configure networking equipment. However,
TFTP provides little security, and modern versions of networking
operating systems frequently support configuration via SSH or other
more secure protocols. A TFTP server should be run only if no more
secure method of supporting existing equipment can be
found.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable tftp Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>tftp</html:code> service should be disabled.
The <html:code>tftp</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig tftp off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling the <html:code>tftp</html:code> service ensures the system is not acting
as a TFTP server, which does not provide encryption or authentication.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_tftp_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable tftp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_tftp_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service tftp
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- tftp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_tftp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_tftp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall tftp-server Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>tftp-server</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase tftp-server</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>tftp-server</html:code> package decreases the risk of the
accidental (or intentional) activation of tftp services.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_tftp-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_tftp-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_tftp_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove tftp</ns10:title>
<ns10:description xml:lang="en-US">Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol,
typically used to automatically transfer configuration or boot files between machines.
TFTP does not support authentication and can be easily hacked. The package
<html:code>tftp</html:code> is a client program that allows for connections to a <html:code>tftp</html:code> server.
</ns10:description>
<ns10:rationale xml:lang="en-US">It is recommended that TFTP be remvoed, unless there is a specific need
for TFTP (such as a boot server). In that case, use extreme caution when configuring
the services.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_tftp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_tftp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure tftp Daemon Uses Secure Mode</ns10:title>
<ns10:description xml:lang="en-US">If running the <html:code>tftp</html:code> service is necessary, it should be configured
to change its root directory at startup. To do so, ensure
<html:code>/etc/xinetd.d/tftp</html:code> includes <html:code>-s</html:code> as a command line argument, as shown in
the following example (which is also the default):
<html:pre>server_args = -s /var/lib/tftpboot</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Using the <html:code>-s</html:code> option causes the TFTP service to only serve files from the
given directory. Serving files from an intentionally-specified directory
reduces the risk of sharing files which should remain private.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-tftpd_uses_secure_mode:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-tftpd_uses_secure_mode_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_talk">
<ns10:title xml:lang="en-US">Chat/Messaging Services</ns10:title>
<ns10:description xml:lang="en-US">
The talk software makes it possible for users to send and receive messages
across systems through a terminal session.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_talk-server_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall talk-server Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>talk-server</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase talk-server</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the <html:code>talk-server</html:code> package decreases the
risk of the accidental (or intentional) activation of talk services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove talk-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure talk-server is removed
package:
name="{{item}}"
state=absent
with_items:
- talk-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_talk-server
class remove_talk-server {
package { 'talk-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=talk-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_talk-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_talk-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_talk_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall talk Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>talk</html:code> package contains the client program for the
Internet talk protocol, which allows the user to chat with other users on
different systems. Talk is a communication program which copies lines from one
terminal to the terminal of another user.
</ns10:description>
<ns10:rationale xml:lang="en-US">
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the <html:code>talk</html:code> package decreases the
risk of the accidental (or intentional) activation of talk client program.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove talk
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure talk is removed
package:
name="{{item}}"
state=absent
with_items:
- talk
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_talk
class remove_talk {
package { 'talk':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=talk
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_talk_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_talk_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_base">
<ns10:title xml:lang="en-US">Base Services</ns10:title>
<ns10:description xml:lang="en-US">This section addresses the base services that are installed on a
Red Hat Enterprise Linux 6 default installation which are not covered in other
sections. Some of these services listen on the network and
should be treated with particular discretion. Other services are local
system utilities that may or may not be extraneous. In general, system services
should be disabled if not required.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Automatic Bug Reporting Tool (abrtd)</ns10:title>
<ns10:description xml:lang="en-US">The Automatic Bug Reporting Tool (<html:code>abrtd</html:code>) daemon collects
and reports crash data when an application crash is detected. Using a variety
of plugins, abrtd can email crash reports to system administrators, log crash
reports to files, or forward crash reports to a centralized issue tracking
system such as RHTSupport.
The <html:code>abrtd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig abrtd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US"> Mishandling crash data could expose sensitive information about
vulnerabilities in software executing on the local machine, as well as sensitive
information from within a process's address space or registers.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_abrtd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable abrtd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_abrtd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service abrtd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- abrtd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_abrtd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_abrtd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Advanced Configuration and Power Interface (acpid)</ns10:title>
<ns10:description xml:lang="en-US">The Advanced Configuration and Power Interface Daemon (<html:code>acpid</html:code>)
dispatches ACPI events (such as power/reset button depressed) to userspace
programs.
The <html:code>acpid</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig acpid off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">ACPI support is highly desirable for systems in some network roles,
such as laptops or desktops. For other systems, such as servers, it may permit
accidental or trivially achievable denial of service situations and disabling
it is appropriate.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_acpid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable acpid
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_acpid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service acpid
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- acpid
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_acpid_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_acpid_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Certmonger Service (certmonger)</ns10:title>
<ns10:description xml:lang="en-US">Certmonger is a D-Bus based service that attempts to simplify interaction
with certifying authorities on networks which use public-key infrastructure. It is often
combined with Red Hat's IPA (Identity Policy Audit) security information management
solution to aid in the management of certificates.
The <html:code>certmonger</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig certmonger off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The services provided by certmonger may be essential for systems
fulfilling some roles a PKI infrastructure, but its functionality is not necessary
for many other use cases.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_certmonger_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable certmonger
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_certmonger_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service certmonger
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- certmonger
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_certmonger_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_certmonger_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Control Group Config (cgconfig)</ns10:title>
<ns10:description xml:lang="en-US">Control groups allow an administrator to allocate system resources (such as CPU,
memory, network bandwidth, etc) among a defined group (or groups) of processes executing on
a system. The <html:code>cgconfig</html:code> daemon starts at boot and establishes the predefined control groups.
The <html:code>cgconfig</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cgconfig off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless control groups are used to manage system resources, running the cgconfig
service is not necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cgconfig_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cgconfig
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cgconfig_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cgconfig
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cgconfig
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cgconfig_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cgconfig_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cgred_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Control Group Rules Engine (cgred)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cgred</html:code> service moves tasks into control groups according to
parameters set in the <html:code>/etc/cgrules.conf</html:code> configuration file.
The <html:code>cgred</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cgred off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless control groups are used to manage system resources, running the cgred service
service is not necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cgred_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cgred
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cgred_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cgred
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cgred
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cgred_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cgred_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable CPU Speed (cpuspeed)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cpuspeed</html:code> service can adjust the clock speed of supported CPUs based upon
the current processing load thereby conserving power and reducing heat.
The <html:code>cpuspeed</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cpuspeed off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>cpuspeed</html:code> service is only necessary if adjusting the CPU clock speed
provides benefit. Traditionally this has included laptops (to enhance battery life),
but may also apply to server or desktop environments where conserving power is
highly desirable or necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cpuspeed_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cpuspeed
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cpuspeed_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cpuspeed
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cpuspeed
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cpuspeed_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cpuspeed_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Hardware Abstraction Layer Service (haldaemon)</ns10:title>
<ns10:description xml:lang="en-US">The Hardware Abstraction Layer Daemon (<html:code>haldaemon</html:code>) collects
and maintains information about the system's hardware configuration.
This service is required on a workstation
running a desktop environment, and may be necessary on any system which
deals with removable media or devices.
The <html:code>haldaemon</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig haldaemon off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The haldaemon provides essential functionality on systems
that use removable media or devices, but can be disabled for systems
that do not require these.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_haldaemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable haldaemon
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_haldaemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service haldaemon
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- haldaemon
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_haldaemon_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_haldaemon_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable IRQ Balance (irqbalance)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>irqbalance</html:code> service optimizes the balance between
power savings and performance through distribution of hardware interrupts across
multiple processors.
The <html:code>irqbalance</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 irqbalance on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">In an environment with multiple processors (now common), the irqbalance service
provides potential speedups for handling interrupt requests.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_irqbalance_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable irqbalance
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_irqbalance_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service irqbalance
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- irqbalance
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_irqbalance_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_irqbalance_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable KDump Kernel Crash Analyzer (kdump)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>kdump</html:code> service provides a kernel crash dump analyzer. It uses the <html:code>kexec</html:code>
system call to boot a secondary kernel ("capture" kernel) following a system
crash, which can load information from the crashed kernel for analysis.
The <html:code>kdump</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig kdump off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless the system is used for kernel development or testing, there
is little need to run the kdump service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_kdump_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable kdump
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_kdump_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service kdump
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- kdump
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_kdump_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Software RAID Monitor (mdmonitor)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>mdmonitor</html:code> service is used for monitoring a software RAID array; hardware
RAID setups do not use this service.
The <html:code>mdmonitor</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig mdmonitor off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If software RAID monitoring is not required,
there is no need to run this service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_mdmonitor_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable mdmonitor
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_mdmonitor_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service mdmonitor
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- mdmonitor
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_mdmonitor_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_mdmonitor_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable D-Bus IPC Service (messagebus)</ns10:title>
<ns10:description xml:lang="en-US">D-Bus provides an IPC mechanism used by
a growing list of programs, such as those used for Gnome, Bluetooth, and Avahi.
Due to these dependencies, disabling D-Bus may not be practical for
many systems.
The <html:code>messagebus</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig messagebus off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If no services which require D-Bus are needed, then it
can be disabled. As a broker for IPC between processes of different privilege levels,
it could be a target for attack. However, disabling D-Bus is likely to be
impractical for any system which needs to provide
a graphical login session.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_messagebus_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable messagebus
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_messagebus_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service messagebus
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- messagebus
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_messagebus_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_messagebus_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network Console (netconsole)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>netconsole</html:code> service is responsible for loading the
netconsole kernel module, which logs kernel printk messages over UDP to a
syslog server. This allows debugging of problems where disk logging fails and
serial consoles are impractical.
The <html:code>netconsole</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig netconsole off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>netconsole</html:code> service is not necessary unless there is a need to debug
kernel panics, which is not common.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_netconsole_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable netconsole
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_netconsole_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service netconsole
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- netconsole
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_netconsole_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_netconsole_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable ntpdate Service (ntpdate)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ntpdate</html:code> service sets the local hardware clock by polling NTP servers
when the system boots. It synchronizes to the NTP servers listed in
<html:code>/etc/ntp/step-tickers</html:code> or <html:code>/etc/ntp.conf</html:code>
and then sets the local hardware clock to the newly synchronized
system time.
The <html:code>ntpdate</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig ntpdate off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>ntpdate</html:code> service may only be suitable for systems which
are rebooted frequently enough that clock drift does not cause problems between
reboots. In any event, the functionality of the ntpdate service is now
available in the ntpd program and should be considered deprecated.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ntpdate_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ntpdate_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Odd Job Daemon (oddjobd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>oddjobd</html:code> service exists to provide an interface and
access control mechanism through which
specified privileged tasks can run tasks for unprivileged client
applications. Communication with <html:code>oddjobd</html:code> through the system message bus.
The <html:code>oddjobd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig oddjobd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>oddjobd</html:code> service may provide necessary functionality in
some environments, and can be disabled if it is not needed. Execution of
tasks by privileged programs, on behalf of unprivileged ones, has traditionally
been a source of privilege escalation security issues.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_oddjobd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable oddjobd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_oddjobd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service oddjobd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- oddjobd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_oddjobd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_oddjobd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Portreserve (portreserve)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>portreserve</html:code> service is a TCP port reservation utility that can
be used to prevent portmap from binding to well known TCP ports that are
required for other services.
The <html:code>portreserve</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig portreserve off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>portreserve</html:code> service provides helpful functionality by
preventing conflicting usage of ports in the reserved port range, but it can be
disabled if not needed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_portreserve_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable portreserve
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_portreserve_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service portreserve
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- portreserve
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_portreserve_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_portreserve_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_psacct_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Process Accounting (psacct)</ns10:title>
<ns10:description xml:lang="en-US">The process accounting service, <html:code>psacct</html:code>, works with programs
including <html:code>acct</html:code> and <html:code>ac</html:code> to allow system administrators to view
user activity, such as commands issued by users of the system.
The <html:code>psacct</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 psacct on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>psacct</html:code> service can provide administrators a convenient
view into some user activities. However, it should be noted that the auditing
system and its audit records provide more authoritative and comprehensive
records.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_psacct_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable psacct
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_psacct_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service psacct
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- psacct
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_psacct_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_psacct_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Apache Qpid (qpidd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>qpidd</html:code> service provides high speed, secure,
guaranteed delivery services. It is an implementation of the Advanced Message
Queuing Protocol. By default the qpidd service will bind to port 5672 and
listen for connection attempts.
The <html:code>qpidd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig qpidd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">The qpidd service is automatically installed when the "base"
package selection is selected during installation. The qpidd service listens
for network connections, which increases the attack surface of the system. If
the system is not intended to receive AMQP traffic, then the <html:code>qpidd</html:code>
service is not needed and should be disabled or removed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_qpidd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable qpidd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_qpidd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service qpidd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- qpidd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_qpidd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_qpidd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_quota_nld_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Quota Netlink (quota_nld)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>quota_nld</html:code> service provides notifications to
users of disk space quota violations. It listens to the kernel via a netlink
socket for disk quota violations and notifies the appropriate user of the
violation using D-Bus or by sending a message to the terminal that the user has
last accessed.
The <html:code>quota_nld</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig quota_nld off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If disk quotas are enforced on the local system, then the
<html:code>quota_nld</html:code> service likely provides useful functionality and should
remain enabled. However, if disk quotas are not used or user notification of
disk quota violation is not desired then there is no need to run this
service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_quota_nld_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable quota_nld
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_quota_nld_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service quota_nld
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- quota_nld
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_quota_nld_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_quota_nld_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network Router Discovery Daemon (rdisc)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rdisc</html:code> service implements the client side of the ICMP
Internet Router Discovery Protocol (IRDP), which allows discovery of routers on
the local subnet. If a router is discovered then the local routing table is
updated with a corresponding default route. By default this daemon is disabled.
The <html:code>rdisc</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rdisc off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">General-purpose systems typically have their network and routing
information configured statically by a system administrator. Workstations or
some special-purpose systems often use DHCP (instead of IRDP) to retrieve
dynamic network configuration information.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rdisc_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rdisc
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rdisc_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rdisc
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rdisc
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rdisc_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rdisc_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Red Hat Network Service (rhnsd)</ns10:title>
<ns10:description xml:lang="en-US">The Red Hat Network service automatically queries Red Hat Network
servers to determine whether there are any actions that should be executed,
such as package updates. This only occurs if the system was registered to an
RHN server or satellite and managed as such.
The <html:code>rhnsd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rhnsd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">Although systems management and patching is extremely important to
system security, management by a system outside the enterprise enclave is not
desirable for some environments. However, if the system is being managed by RHN or
RHN Satellite Server the <html:code>rhnsd</html:code> daemon can remain on. </ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rhnsd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rhnsd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rhnsd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rhnsd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rhnsd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rhnsd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rhnsd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Red Hat Subscription Manager Daemon (rhsmcertd)</ns10:title>
<ns10:description xml:lang="en-US">The Red Hat Subscription Manager (rhsmcertd) periodically checks for
changes in the entitlement certificates for a registered system and updates it
accordingly.
The <html:code>rhsmcertd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rhsmcertd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rhsmcertd</html:code> service can provide administrators with some
additional control over which of their systems are entitled to particular
subscriptions. However, for systems that are managed locally or which are not
expected to require remote changes to their subscription status, it is
unnecessary and can be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rhsmcertd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rhsmcertd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rhsmcertd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rhsmcertd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rhsmcertd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rhsmcertd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rhsmcertd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Cyrus SASL Authentication Daemon (saslauthd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>saslauthd</html:code> service handles plaintext authentication requests on
behalf of the SASL library. The service isolates all code requiring superuser
privileges for SASL authentication into a single process, and can also be used
to provide proxy authentication services to clients that do not understand SASL
based authentication.
The <html:code>saslauthd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig saslauthd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>saslauthd</html:code> service provides essential functionality for
performing authentication in some directory environments, such as those which
use Kerberos and LDAP. For others, however, in which only local files may be
consulted, it is not necessary and should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_saslauthd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable saslauthd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_saslauthd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service saslauthd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- saslauthd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_saslauthd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_saslauthd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable SMART Disk Monitoring Service (smartd)</ns10:title>
<ns10:description xml:lang="en-US">SMART (Self-Monitoring, Analysis, and Reporting Technology) is a
feature of hard drives that allows them to detect symptoms of disk failure and
relay an appropriate warning.
The <html:code>smartd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig smartd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">SMART can help protect against denial of
service due to failing hardware. Nevertheless, if it is not needed or the
system's drives are not SMART-capable (such as solid state drives), it can be
disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_smartd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable smartd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_smartd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service smartd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- smartd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_smartd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_smartd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable System Statistics Reset Service (sysstat)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>sysstat</html:code> service resets various I/O and CPU
performance statistics to zero in order to begin counting from a fresh state
at boot time.
The <html:code>sysstat</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig sysstat off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">By default the <html:code>sysstat</html:code> service merely runs a program at
boot to reset the statistics, which can be retrieved using programs such as
<html:code>sar</html:code> and <html:code>sadc</html:code>. These may provide useful insight into system
operation, but unless used this service can be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_sysstat_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable sysstat
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_sysstat_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service sysstat
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- sysstat
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_sysstat_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_sysstat_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_cron_and_at">
<ns10:title xml:lang="en-US">Cron and At Daemons</ns10:title>
<ns10:description xml:lang="en-US">The cron and at services are used to allow commands to
be executed at a later time. The cron service is required by almost
all systems to perform necessary maintenance tasks, while at may or
may not be required on a given system. Both daemons should be
configured defensively.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable cron Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>crond</html:code> service is used to execute commands at
preconfigured times. It is required by almost all systems to perform necessary
maintenance tasks, such as notifying root of system activity.
The <html:code>crond</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 crond on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_crond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable crond
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_crond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service crond
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- crond
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_crond_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_crond_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_anacron" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable anacron Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cronie-anacron</html:code> package, which provides <html:code>anacron</html:code>
functionality, is installed by default.
The <html:code>cronie-anacron</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase cronie-anacron</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>anacron</html:code> service provides <html:code>cron</html:code> functionality for systems
such as laptops and workstations that may be shut down during the normal times
that <html:code>cron</html:code> jobs are scheduled to run. On systems which do not require this
additional functionality, <html:code>anacron</html:code> could needlessly increase the possible
attack surface for an intruder.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_anacron_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable At Service (atd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>at</html:code> and <html:code>batch</html:code> commands can be used to
schedule tasks that are meant to be executed only once. This allows delayed
execution in a manner similar to cron, except that it is not
recurring. The daemon <html:code>atd</html:code> keeps track of tasks scheduled via
<html:code>at</html:code> and <html:code>batch</html:code>, and executes them at the specified time.
The <html:code>atd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig atd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>atd</html:code> service could be used by an unsophisticated insider to carry
out activities outside of a normal login session, which could complicate
accountability. Furthermore, the need to schedule tasks with <html:code>at</html:code> or
<html:code>batch</html:code> is not common.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_atd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable atd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_atd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service atd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- atd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_atd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_atd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_restrict_at_cron_users">
<ns10:title xml:lang="en-US">Restrict at and cron to Authorized Users if Necessary</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>/etc/cron.allow</html:code> and <html:code>/etc/at.allow</html:code> files contain lists of users who are allowed
to use cron and at to delay execution of processes. If these files exist and
if the corresponding files <html:code>/etc/cron.deny</html:code> and <html:code>/etc/at.deny</html:code> do not exist,
then only users listed in the relevant allow files can run the crontab and at
commands to submit jobs to be run at scheduled intervals.
On many systems, only the system administrator needs the ability to schedule
jobs. Note that even if a given user is not listed in <html:code>cron.allow</html:code>, cron jobs can
still be run as that user. The <html:code>cron.allow</html:code> file controls only administrative access
to the crontab command for scheduling and modifying cron jobs.
<html:br />
<html:br />
To restrict at and cron to only authorized users:
<html:ul><html:li>Remove the cron.deny file:<html:pre>$ sudo rm /etc/cron.deny</html:pre></html:li><html:li>Edit <html:code>/etc/cron.allow</html:code>, adding one line for each user allowed to use the crontab command to create cron jobs.</html:li><html:li>Remove the <html:code>at.deny</html:code> file:<html:pre>$ sudo rm /etc/at.deny</html:pre></html:li><html:li>Edit <html:code>/etc/at.allow</html:code>, adding one line for each user allowed to use the at command to create at jobs.</html:li></html:ul>
</ns10:description>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ssh">
<ns10:title xml:lang="en-US">SSH Server</ns10:title>
<ns10:description xml:lang="en-US">The SSH protocol is recommended for remote login and
remote file transfer. SSH provides confidentiality and integrity
for data exchanged between two systems, as well as server
authentication, through the use of public key cryptography. The
implementation included with the system is called OpenSSH, and more
detailed documentation is available from its website,
<html:a href="http://www.openssh.org">http://www.openssh.org</html:a>. Its server program is called <html:code>sshd</html:code> and
provided by the RPM package <html:code>openssh-server</html:code>.</ns10:description>
<ns10:Value id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">SSH session Idle time</ns10:title>
<ns10:description xml:lang="en-US">Specify duration of allowed idle time.</ns10:description>
<ns10:value>300</ns10:value>
<ns10:value selector="5_minutes">300</ns10:value>
<ns10:value selector="10_minutes">600</ns10:value>
<ns10:value selector="15_minutes">900</ns10:value>
<ns10:value selector="60_minutes">3600</ns10:value>
<ns10:value selector="120_minutes">7200</ns10:value>
</ns10:Value>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sshd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable SSH Server If Possible (Unusual)</ns10:title>
<ns10:description xml:lang="en-US">The SSH server service, sshd, is commonly needed.
However, if it can be disabled, do so.
The <html:code>sshd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig sshd off</html:pre>
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_sshd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable sshd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_sshd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service sshd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- sshd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_sshd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_iptables_sshd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove SSH Server iptables Firewall exception (Unusual)</ns10:title>
<ns10:description xml:lang="en-US">By default, inbound connections to SSH's port are allowed. If
the SSH server is not being used, this exception should be removed from the
firewall configuration.
<html:br /><html:br />
Edit the files <html:code>/etc/sysconfig/iptables</html:code> and <html:code>/etc/sysconfig/ip6tables</html:code>
(if IPv6 is in use). In each file, locate and delete the line:
<html:pre>-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT</html:pre>
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.
</ns10:description>
<ns10:rationale xml:lang="en-US">
If inbound SSH connections are not expected, disallowing access to the SSH port will
avoid possible exploitation of the port by an attacker.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-iptables_sshd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_ssh_server">
<ns10:title xml:lang="en-US">Configure OpenSSH Server if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If the system needs to act as an SSH server, then
certain changes should be made to the OpenSSH daemon configuration
file <html:code>/etc/ssh/sshd_config</html:code>. The following recommendations can be
applied to this file. See the <html:code>sshd_config(5)</html:code> man page for more
detailed information.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="false" severity="high">
<ns10:title xml:lang="en-US">Allow Only SSH Protocol 2</ns10:title>
<ns10:description xml:lang="en-US">Only SSH protocol version 2 connections should be
permitted. The default setting in
<html:code>/etc/ssh/sshd_config</html:code> is correct, and can be
verified by ensuring that the following
line appears:
<html:pre>Protocol 2</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">774</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH protocol version 1 suffers from design flaws that
result in security vulnerabilities and
should not be used.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_allow_only_protocol2" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^Protocol' '2' 'CCE-27072-8' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_allow_only_protocol2:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_limit_user_access" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Users' SSH Access</ns10:title>
<ns10:description xml:lang="en-US">By default, the SSH configuration allows any user with an account
to access the system. In order to specify the users that are allowed to login
via SSH and deny all other users, add or correct the following line in the
<html:code>/etc/ssh/sshd_config</html:code> file:
<html:pre>DenyUsers USER1 USER2</html:pre>
Where <html:code>USER1</html:code> and <html:code>USER2</html:code> are valid user names.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx" />
<ns10:rationale xml:lang="en-US">
Specifying which accounts are allowed SSH access into the system reduces the
possibility of unauthorized access to the system.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set SSH Idle Timeout Interval</ns10:title>
<ns10:description xml:lang="en-US">SSH allows administrators to set an idle timeout
interval.
After this interval has passed, the idle user will be
automatically logged out.
<html:br /><html:br />
To set an idle timeout interval, edit the following line in <html:code>/etc/ssh/sshd_config</html:code> as
follows:
<html:pre>ClientAliveInterval <html:b><ns10:sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy" /></html:b></html:pre>
The timeout <html:b>interval</html:b> is given in seconds. To have a timeout
of 15 minutes, set <html:b>interval</html:b> to 900.
<html:br /><html:br />
If a shorter timeout has already been set for the login
shell, that value will preempt any SSH
setting made here. Keep in mind that some processes may stop SSH
from correctly detecting that the user is idle.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">879</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1133</ns10:reference>
<ns10:rationale xml:lang="en-US">
Causing idle users to be automatically logged out
guards against compromises one system leading trivially
to compromises on another.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_set_idle_timeout" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
sshd_idle_timeout_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy" />"
grep -q ^ClientAliveInterval /etc/ssh/sshd_config && \
sed -i "s/ClientAliveInterval.*/ClientAliveInterval $sshd_idle_timeout_value/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "ClientAliveInterval $sshd_idle_timeout_value" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sshd_idle_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_set_idle_timeout:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set SSH Client Alive Count</ns10:title>
<ns10:description xml:lang="en-US">To ensure the SSH idle timeout occurs precisely when the <html:code>ClientAliveCountMax</html:code> is set,
edit <html:code>/etc/ssh/sshd_config</html:code> as
follows:
<html:pre>ClientAliveCountMax 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">879</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1133</ns10:reference>
<ns10:rationale xml:lang="en-US">
This ensures a user login will be terminated as soon as the <html:code>ClientAliveCountMax</html:code>
is reached.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_set_keepalive" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^ClientAliveCountMax /etc/ssh/sshd_config && \
sed -i "s/ClientAliveCountMax.*/ClientAliveCountMax 0/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "ClientAliveCountMax 0" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_set_keepalive:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SSH Support for .rhosts Files</ns10:title>
<ns10:description xml:lang="en-US">SSH can emulate the behavior of the obsolete rsh
command in allowing users to enable insecure access to their
accounts via <html:code>.rhosts</html:code> files.
<html:br /><html:br />
To ensure this behavior is disabled, add or correct the
following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>IgnoreRhosts yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_rhosts" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^IgnoreRhosts' 'yes' 'CCE-27124-7' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_rhosts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Host-Based Authentication</ns10:title>
<ns10:description xml:lang="en-US">SSH's cryptographic host-based authentication is
more secure than <html:code>.rhosts</html:code> authentication. However, it is
not recommended that hosts unilaterally trust one another, even
within an organization.
<html:br /><html:br />
To disable host-based authentication, add or correct the
following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>HostbasedAuthentication no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_host_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^HostbasedAuthentication /etc/ssh/sshd_config && \
sed -i "s/HostbasedAuthentication.*/HostbasedAuthentication no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "HostbasedAuthentication no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_host_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_host_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SSH Root Login</ns10:title>
<ns10:description xml:lang="en-US">The root user should never be allowed to login to a
system directly over a network.
To disable root login via SSH, add or correct the following line
in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitRootLogin no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Permitting direct root login reduces auditable information about who ran
privileged commands on the system
and also allows direct attack attempts on root's password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_root_login" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
SSHD_CONFIG='/etc/ssh/sshd_config'
# Obtain line number of first uncommented case-insensitive occurrence of Match
# block directive (possibly prefixed with whitespace) present in $SSHD_CONFIG
FIRST_MATCH_BLOCK=$(sed -n '/^[[:space:]]*Match[^\n]*/I{=;q}' $SSHD_CONFIG)
# Obtain line number of first uncommented case-insensitive occurence of
# PermitRootLogin directive (possibly prefixed with whitespace) present in
# $SSHD_CONFIG
FIRST_PERMIT_ROOT_LOGIN=$(sed -n '/^[[:space:]]*PermitRootLogin[^\n]*/I{=;q}' $SSHD_CONFIG)
# Case: Match block directive not present in $SSHD_CONFIG
if [ -z "$FIRST_MATCH_BLOCK" ]
then
# Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
then
# Append 'PermitRootLogin no' at the end of $SSHD_CONFIG
echo -e "\nPermitRootLogin no" >> $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG already
else
# Replace first uncommented case-insensitive occurrence
# of PermitRootLogin directive
sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG
fi
# Case: Match block directive present in $SSHD_CONFIG
else
# Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
then
# Prepend 'PermitRootLogin no' before first uncommented
# case-insensitive occurrence of Match block directive
sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
# before first Match block directive
elif [ "$FIRST_PERMIT_ROOT_LOGIN" -lt "$FIRST_MATCH_BLOCK" ]
then
# Replace first uncommented case-insensitive occurrence
# of PermitRootLogin directive
sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
# after first Match block directive
else
# Prepend 'PermitRootLogin no' before first uncommented
# case-insensitive occurrence of Match block directive
sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_root_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable SSH Access via Empty Passwords</ns10:title>
<ns10:description xml:lang="en-US">To explicitly disallow remote login from accounts with
empty passwords, add or correct the following line in
<html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitEmptyPasswords no</html:pre>
Any accounts with empty passwords should be disabled immediately, and PAM configuration
should prevent users from being able to assign themselves empty passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
Configuring this setting for the SSH daemon provides additional assurance that
remote login via SSH will require a password,
even in the event of misconfiguration elsewhere.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_empty_passwords" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^PermitEmptyPasswords /etc/ssh/sshd_config && \
sed -i "s/PermitEmptyPasswords.*/PermitEmptyPasswords no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "PermitEmptyPasswords no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_empty_passwords:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable SSH Warning Banner</ns10:title>
<ns10:description xml:lang="en-US">
To enable the warning banner and ensure it is consistent
across the system, add or correct the following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>Banner /etc/issue</html:pre>
Another section contains information on how to create an
appropriate system-wide warning banner.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:rationale xml:lang="en-US">
The warning message reinforces policy awareness during the login process and
facilitates possible legal action against attackers. Alternatively, systems
whose ownership should not be obvious should ensure usage of a banner that does
not provide easy attribution.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_enable_warning_banner" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^Banner /etc/ssh/sshd_config && \
sed -i "s/Banner.*/Banner \/etc\/issue/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "Banner /etc/issue" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_enable_warning_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="false" severity="low">
<ns10:title xml:lang="en-US">Do Not Allow SSH Environment Options</ns10:title>
<ns10:description xml:lang="en-US">To ensure users are not able to present
environment options to the SSH daemon, add or correct the following line
in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitUserEnvironment no</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH environment options potentially allow users to bypass
access restriction in some configurations.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_do_not_permit_user_env" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^PermitUserEnvironment /etc/ssh/sshd_config && \
sed -i "s/PermitUserEnvironment.*/PermitUserEnvironment no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "PermitUserEnvironment no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_do_not_permit_user_env:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Use Only Approved Ciphers</ns10:title>
<ns10:description xml:lang="en-US">Limit the ciphers to those algorithms which are FIPS-approved.
Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.
The following line in <html:code>/etc/ssh/sshd_config</html:code>
demonstrates use of FIPS-approved ciphers:
<html:pre>Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc</html:pre>
The man page <html:code>sshd_config(5)</html:code> contains a list of supported ciphers.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1144</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1145</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1146</ns10:reference>
<ns10:rationale xml:lang="en-US">
Approved algorithms should impart some level of confidence in their
implementation. These are also required for compliance.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_use_approved_ciphers" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^Ciphers /etc/ssh/sshd_config && \
sed -i "s/Ciphers.*/Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_use_approved_ciphers:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_macs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Only Approved MACs</ns10:title>
<ns10:description xml:lang="en-US">Limit the MACs to those hash algorithms which are FIPS-approved.
The following line in <html:code>/etc/ssh/sshd_config</html:code>
demonstrates use of FIPS-approved MACs:
<html:pre>MACs hmac-sha2-512,hmac-sha2-256,hmac-sha1</html:pre>
The man page <html:code>sshd_config(5)</html:code> contains a list of supported MACs.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2449</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Approved algorithms should impart some level of confidence in their
implementation. These are also required for compliance.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_use_approved_macs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^MACs' 'hmac-sha2-512,hmac-sha2-256,hmac-sha1' '' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_use_approved_macs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_sshd_strengthen_firewall">
<ns10:title xml:lang="en-US">Strengthen Firewall Configuration if Possible</ns10:title>
<ns10:description xml:lang="en-US">If the SSH server is expected to only receive connections from
the local network, then strengthen the default firewall rule for the SSH service
to only accept connections from the appropriate network segment(s).
<html:br /><html:br />
Determine an appropriate network block, <html:code>netwk</html:code>, and network mask, <html:code>mask</html:code>,
representing the machines on your network which will be allowed to access this SSH server.
<html:br /><html:br />
Edit the files <html:code>etc/sysconfig/iptables</html:code> and <html:code>/etc/sysconfig/ip6tables</html:code>
(if IPv6 is in use). In each file, locate the line:
<html:pre>-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT</html:pre>
and replace it with:
<html:pre>-A INPUT -s netwk/mask -m state --state NEW -p tcp --dport 22 -j ACCEPT</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Restricting SSH access to only trusted network segments reduces exposure of the SSH
server to attacks from unauthorized networks.</ns10:rationale>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_sssd">
<ns10:title xml:lang="en-US">System Security Services Daemon</ns10:title>
<ns10:description xml:lang="en-US">
The System Security Services Daemon (SSSD) is a system daemon that provides access
to different identity and authentication providers such as Red Hat's IdM, Microsoft's AD,
openLDAP, MIT Kerberos, etc. It uses a common framework that can provide caching and offline
support to systems utilizing SSSD. SSSD using caching to reduce load on authentication
servers permit offline authentication as well as store extended user user data.
<html:br /><html:br />
For more information, see
<html:b><html:a href="https://access.redhat.com/documentation/en_US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/SSSD-Introduction.html">https://access.redhat.com/documentation/en_US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/SSSD-Introduction.html</html:a></html:b>
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_sssd_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the SSSD Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>sssd</html:code> package should be installed.
The <html:code>sssd</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install sssd</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_sssd_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sssd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable the SSSD Service</ns10:title>
<ns10:description xml:lang="en-US">The SSSD service should be enabled.
The <html:code>sssd</html:code> service can be enabled with the following command:
<html:pre>$ sudo systemctl enable sssd.service</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_sssd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_memcache_timeout" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD's Memory Cache to Expire</ns10:title>
<ns10:description xml:lang="en-US">
SSSD's memory cache should be configured to set to expire records after 1 day.
To configure SSSD to expire memory cache, set <html:code>memcache_timeout</html:code> to
<html:code>86400</html:code> under the <html:code>[nss]</html:code> section in <html:code>/etc/sssd/sssd.conf</html:code>.
For example:
<html:pre>[nss]
memcache_timeout = 86400
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_offline_cred_expiration" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD to Expire Offline Credentials</ns10:title>
<ns10:description xml:lang="en-US">
SSSD should be configured to expire offline credentials after 1 day.
To configure SSSD to expire offline credentials, set
<html:code>offline_credentials_expiration</html:code> to <html:code>1</html:code> under the <html:code>[pam]</html:code>
section in <html:code>/etc/sssd/sssd.conf</html:code>. For example:
<html:pre>[pam]
offline_credentials_expiration = 1
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_ssh_known_hosts_timeout" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD to Expire SSH Known Hosts</ns10:title>
<ns10:description xml:lang="en-US">
SSSD should be configured to expire keys from known SSH hosts after 1 day.
To configure SSSD to known SSH hosts, set <html:code>ssh_known_hosts_timeout</html:code>
to <html:code>86400</html:code> under the <html:code>[ssh]</html:code> section in
<html:code>/etc/sssd/sssd.conf</html:code>. For example:
<html:pre>[ssh]
ssh_known_hosts_timeout = 86400
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_ssh_known_hosts_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_xwindows">
<ns10:title xml:lang="en-US">X Window System</ns10:title>
<ns10:description xml:lang="en-US">The X Window System implementation included with the
system is called X.org.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_xwindows">
<ns10:title xml:lang="en-US">Disable X Windows</ns10:title>
<ns10:description xml:lang="en-US">Unless there is a mission-critical reason for the
system to run a graphical user interface, ensure X is not set to start
automatically at boot and remove the X Windows software packages.
There is usually no reason to run X Windows
on a dedicated server machine, as it increases the system's attack surface and consumes
system resources. Administrators of server systems should instead login via
SSH or on the text console.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable X Windows Startup By Setting Runlevel</ns10:title>
<ns10:description xml:lang="en-US">Setting the system's runlevel to 3 will prevent automatic startup
of the X server. To do so, ensure the following line in <html:code>/etc/inittab</html:code>
features a <html:code>3</html:code> as shown:
<html:pre>id:3:initdefault:</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-xwindows_runlevel_setting:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-xwindows_runlevel_setting_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove the X Windows Package Group</ns10:title>
<ns10:description xml:lang="en-US">Removing all packages which constitute the X Window System
ensures users or malicious software cannot start X.
To do so, run the following command:
<html:pre>$ sudo yum groupremove "X Window System"</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Unnecessary packages should not be installed to decrease the attack surface of the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_xorg-x11-server-common_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_xorg-x11-server-common_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_avahi">
<ns10:title xml:lang="en-US">Avahi Server</ns10:title>
<ns10:description xml:lang="en-US">The Avahi daemon implements the DNS Service Discovery
and Multicast DNS protocols, which provide service and host
discovery on a network. It allows a system to automatically
identify resources on the network, such as printers or web servers.
This capability is also known as mDNSresponder and is a major part
of Zeroconf networking. </ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_service_avahi-daemon_disabled_group">
<ns10:title xml:lang="en-US">Disable Avahi Server if Possible</ns10:title>
<ns10:description xml:lang="en-US">Because the Avahi daemon service keeps an open network
port, it is subject to network attacks.
Disabling it can reduce the system's vulnerability to such attacks.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Avahi Server Software</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>avahi-daemon</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig avahi-daemon off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Because the Avahi daemon service keeps an open network
port, it is subject to network attacks. Its functionality
is convenient but is only appropriate if the local network
can be trusted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_avahi-daemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable avahi-daemon
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_avahi-daemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service avahi-daemon
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- avahi-daemon
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_avahi-daemon_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_avahi-daemon_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_avahi_configuration">
<ns10:title xml:lang="en-US">Configure Avahi if Necessary</ns10:title>
<ns10:description xml:lang="en-US">
If your system requires the Avahi daemon, its configuration can be restricted
to improve security. The Avahi daemon configuration file is
<html:code>/etc/avahi/avahi-daemon.conf</html:code>. The following security recommendations
should be applied to this file:
See the <html:code>avahi-daemon.conf(5)</html:code> man page, or documentation at
<html:a href="http://www.avahi.org">http://www.avahi.org</html:a>, for more detailed information about the configuration options.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_ip_only" selected="false" severity="low">
<ns10:title xml:lang="en-US">Serve Avahi Only via Required Protocol</ns10:title>
<ns10:description xml:lang="en-US">
If you are using only IPv4, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code> and ensure
the following line exists in the <html:code>[server]</html:code> section:
<html:pre>use-ipv6=no</html:pre>
Similarly, if you are using only IPv6, disable IPv4 sockets with the line:
<html:pre>use-ipv4=no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_ip_only:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_check_ttl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Check Avahi Responses' TTL Field</ns10:title>
<ns10:description xml:lang="en-US">
To make Avahi ignore packets unless the TTL field is 255, edit
<html:code>/etc/avahi/avahi-daemon.conf</html:code> and ensure the following line
appears in the <html:code>[server]</html:code> section:
<html:pre>check-response-ttl=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps to ensure that only mDNS responses from the local network are
processed, because the TTL field in a packet is decremented from its initial
value of 255 whenever it is routed from one network to another. Although a
properly-configured router or firewall should not allow mDNS packets into
the local network at all, this option provides another check to ensure they
are not permitted.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_check_ttl:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_prevent_port_sharing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Prevent Other Programs from Using Avahi's Port</ns10:title>
<ns10:description xml:lang="en-US">
To prevent other mDNS stacks from running, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code>
and ensure the following line appears in the <html:code>[server]</html:code> section:
<html:pre>disallow-other-stacks=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps ensure that only Avahi is responsible for mDNS traffic coming from
that port on the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_prevent_port_sharing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_disable_publishing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Avahi Publishing</ns10:title>
<ns10:description xml:lang="en-US">
To prevent Avahi from publishing its records, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code>
and ensure the following line appears in the <html:code>[publish]</html:code> section:
<html:pre>disable-publishing=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps ensure that no record will be published by Avahi.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_disable_publishing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_restrict_published_information" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Information Published by Avahi</ns10:title>
<ns10:description xml:lang="en-US">
If it is necessary to publish some information to the network, it should not be joined
by any extraneous information, or by information supplied by a non-trusted source
on the system.
Prevent user applications from using Avahi to publish services by adding or
correcting the following line in the <html:code>[publish]</html:code> section:
<html:pre>disable-user-service-publishing=yes</html:pre>
Implement as many of the following lines as possible, to restrict the information
published by Avahi.
<html:pre>publish-addresses=no
publish-hinfo=no
publish-workstation=no
publish-domain=no</html:pre>
Inspect the files in the directory <html:code>/etc/avahi/services/</html:code>. Unless there
is an operational need to publish information about each of these services,
delete the corresponding file.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
These options prevent publishing attempts from succeeding,
and can be applied even if publishing is disabled entirely via
disable-publishing. Alternatively, these can be used to restrict
the types of published information in the event that some information
must be published.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_restrict_published_information:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_printing">
<ns10:title xml:lang="en-US">Print Support</ns10:title>
<ns10:description xml:lang="en-US">The Common Unix Printing System (CUPS) service provides both local
and network printing support. A system running the CUPS service can accept
print jobs from other systems, process them, and send them to the appropriate
printer. It also provides an interface for remote administration through a web
browser. The CUPS service is installed and activated by default. The project
homepage and more detailed documentation are available at <html:a href="http://www.cups.org">http://www.cups.org</html:a>.
<html:br /><html:br /> </ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable the CUPS Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cups</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cups off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Turn off unneeded services to reduce attack surface.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cups_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cups
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cups_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cups
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cups
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cups_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cups_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_configure_printing">
<ns10:title xml:lang="en-US">Configure the CUPS Service if Necessary</ns10:title>
<ns10:description xml:lang="en-US">CUPS provides the ability to easily share local printers with
other machines over the network. It does this by allowing machines to share
lists of available printers. Additionally, each machine that runs the CUPS
service can potentially act as a print server. Whenever possible, the printer
sharing and print server capabilities of CUPS should be limited or disabled.
The following recommendations should demonstrate how to do just that.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_cups_disable_browsing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Printer Browsing Entirely if Possible</ns10:title>
<ns10:description xml:lang="en-US">By default, CUPS listens on the network for printer list
broadcasts on UDP port 631. This functionality is called printer browsing.
To disable printer browsing entirely, edit the CUPS configuration
file, located at <html:code>/etc/cups/cupsd.conf</html:code>, to include the following:
<html:pre>Browsing Off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The CUPS print service can be configured to broadcast a list of
available printers to the network. Other machines on the network, also running
the CUPS print service, can be configured to listen to these broadcasts and add
and configure these printers for immediate use. By disabling this browsing
capability, the machine will no longer generate or receive such broadcasts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-cups_disable_browsing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_cups_disable_printserver" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Print Server Capabilities</ns10:title>
<ns10:description xml:lang="en-US">To prevent remote users from potentially connecting to and using
locally configured printers, disable the CUPS print server sharing
capabilities. To do so, limit how the server will listen for print jobs by
removing the more generic port directive from /etc/cups/cupsd.conf:
<html:pre>Port 631</html:pre>
and replacing it with the <html:code>Listen</html:code> directive:
<html:pre>Listen localhost:631</html:pre>
This will prevent remote users from printing to locally configured printers
while still allowing local users on the machine to print normally.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">By default, locally configured printers will not be shared over the
network, but if this functionality has somehow been enabled, these
recommendations will disable it again. Be sure to disable outgoing printer list
broadcasts, or remote users will still be able to see the locally configured
printers, even if they cannot actually print to them. To limit print serving to
a particular set of users, use the Policy directive.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-cups_disable_printserver:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dhcp">
<ns10:title xml:lang="en-US">DHCP</ns10:title>
<ns10:description xml:lang="en-US">The Dynamic Host Configuration Protocol (DHCP) allows
systems to request and obtain an IP address and other configuration
parameters from a server.
<html:br /><html:br />
This guide recommends configuring networking on clients by manually editing
the appropriate files under <html:code>/etc/sysconfig</html:code>. Use of DHCP can make client
systems vulnerable to compromise by rogue DHCP servers, and should be avoided
unless necessary. If using DHCP is necessary, however, there are best practices
that should be followed to minimize security risk.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_dhcp_server">
<ns10:title xml:lang="en-US">Disable DHCP Server</ns10:title>
<ns10:description xml:lang="en-US">
The DHCP server <html:code>dhcpd</html:code> is not installed or activated by
default. If the software was installed and activated, but the
system does not need to act as a DHCP server, it should be disabled
and removed.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable DHCP Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>dhcpd</html:code> service should be disabled on
any system that does not need to act as a DHCP server.
The <html:code>dhcpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig dhcpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unmanaged or unintentionally activated DHCP servers may provide faulty information
to clients, interfering with the operation of a legitimate site
DHCP server if there is one.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_dhcpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable dhcpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_dhcpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service dhcpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- dhcpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_dhcpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_dhcpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall DHCP Server Package</ns10:title>
<ns10:description xml:lang="en-US">If the system does not need to act as a DHCP server,
the dhcp package can be uninstalled.
The <html:code>dhcp</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase dhcp</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the DHCP server ensures that it cannot be easily or
accidentally reactivated and disrupt network operation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dhcp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dhcp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dhcp_server_configuration">
<ns10:title xml:lang="en-US">Disable DHCP Server</ns10:title>
<ns10:description xml:lang="en-US">If the system must act as a DHCP server, the configuration
information it serves should be minimized. Also, support for other protocols
and DNS-updating schemes should be explicitly disabled unless needed. The
configuration file for dhcpd is called <html:code>/etc/dhcp/dhcpd.conf</html:code>. The file
begins with a number of global configuration options. The remainder of the file
is divided into sections, one for each block of addresses offered by dhcpd,
each of which contains configuration options specific to that address
block.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_disable_ddns" selected="false" severity="low">
<ns10:title xml:lang="en-US">Do Not Use Dynamic DNS</ns10:title>
<ns10:description xml:lang="en-US">To prevent the DHCP server from receiving DNS information from
clients, edit <html:code>/etc/dhcp/dhcpd.conf</html:code>, and add or correct the following global
option: <html:pre>ddns-update-style none;</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The ddns-update-style option controls only whether
the DHCP server will attempt to act as a Dynamic DNS client. As long as the DNS
server itself is correctly configured to reject DDNS attempts, an incorrect
ddns-update-style setting on the client is harmless (but should be fixed as a
best practice).</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The Dynamic DNS protocol is used to remotely update the data served
by a DNS server. DHCP servers can use Dynamic DNS to publish information about
their clients. This setup carries security risks, and its use is not
recommended. If Dynamic DNS must be used despite the risks it poses, it is
critical that Dynamic DNS transactions be protected using TSIG or some other
cryptographic authentication mechanism. See dhcpd.conf(5) for more information
about protecting the DHCP server from passing along malicious DNS data from its
clients. </ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_disable_ddns:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_deny_decline" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deny Decline Messages</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/dhcp/dhcpd.conf</html:code> and add or correct the following
global option to prevent the DHCP server from responding the DHCPDECLINE
messages, if possible: <html:pre>deny declines;</html:pre> </ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The DHCPDECLINE message can be sent by a DHCP client to indicate
that it does not consider the lease offered by the server to be valid. By
issuing many DHCPDECLINE messages, a malicious client can exhaust the DHCP
server's pool of IP addresses, causing the DHCP server to forget old address
allocations.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_deny_decline:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_deny_bootp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deny BOOTP Queries</ns10:title>
<ns10:description xml:lang="en-US">Unless your network needs to support older BOOTP clients, disable
support for the bootp protocol by adding or correcting the global option:
<html:pre>deny bootp;</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The bootp option tells dhcpd to respond to BOOTP queries. If support
for this simpler protocol is not needed, it should be disabled to remove attack
vectors against the DHCP server.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_deny_bootp:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_minimize_served_info" selected="false" severity="low">
<ns10:title xml:lang="en-US">Minimize Served Information</ns10:title>
<ns10:description xml:lang="en-US">Edit /etc/dhcp/dhcpd.conf. Examine each address range section within
the file, and ensure that the following options are not defined unless there is
an operational need to provide this information via DHCP:
<html:pre>option domain-name
option domain-name-servers
option nis-domain
option nis-servers
option ntp-servers
option routers
option time-offset</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">By default, the Red Hat Enterprise Linux client installation uses DHCP
to request much of the above information from the DHCP server. In particular,
domain-name, domain-name-servers, and routers are configured via DHCP. These
settings are typically necessary for proper network functionality, but are also
usually static across machines at a given site.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Because the configuration information provided by the DHCP server
could be maliciously provided to clients by a rogue DHCP server, the amount of
information provided via DHCP should be minimized. Remove these definitions
from the DHCP server configuration to ensure that legitimate clients do not
unnecessarily rely on DHCP for this information.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_minimize_served_info:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_configure_logging" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logging</ns10:title>
<ns10:description xml:lang="en-US">Ensure that the following line exists in
<html:code>/etc/rsyslog.conf</html:code>:
<html:pre>daemon.* /var/log/daemon.log</html:pre>
Configure logwatch or other log monitoring tools to summarize error conditions
reported by the dhcpd process.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:rationale xml:lang="en-US">By default, dhcpd logs notices to the daemon facility. Sending all
daemon messages to a dedicated log file is part of the syslog configuration
outlined in the Logging and Auditing section</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_configure_logging:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_dhcp_client">
<ns10:title xml:lang="en-US">Disable DHCP Client</ns10:title>
<ns10:description xml:lang="en-US">
DHCP is the default network configuration method provided by the system
installer, and common on many networks. Nevertheless, manual management
of IP addresses for systems implies a greater degree of management and
accountability for network activity.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable DHCP Client</ns10:title>
<ns10:description xml:lang="en-US">
For each interface on the system (e.g. eth0), edit
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code> and make the
following changes:
<html:ul><html:li> Correct the BOOTPROTO line to read:
<html:pre>BOOTPROTO=none</html:pre>
</html:li><html:li> Add or correct the following lines, substituting the appropriate
values based on your site's addressing scheme:
<html:pre>NETMASK=255.255.255.0
IPADDR=192.168.1.2
GATEWAY=192.168.1.1</html:pre>
</html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
DHCP relies on trusting the local network. If the local network is not trusted,
then it should not be used. However, the automatic configuration provided by
DHCP is commonly used and the alternative, manual configuration, presents an
unacceptable burden in many circumstances.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysconfig_networking_bootproto_ifcfg:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysconfig_networking_bootproto_ifcfg_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dhcp_client_configuration">
<ns10:title xml:lang="en-US">Configure DHCP Client if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If DHCP must be used, then certain configuration changes can
minimize the amount of information it receives and applies from the network,
and thus the amount of incorrect information a rogue DHCP server could
successfully distribute. For more information on configuring dhclient, see the
<html:code>dhclient(8)</html:code> and <html:code>dhclient.conf(5)</html:code> man pages. </ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_client_restrict_options" selected="false" severity="low">
<ns10:title xml:lang="en-US">Minimize the DHCP-Configured Options</ns10:title>
<ns10:description xml:lang="en-US">Create the file <html:code>/etc/dhcp/dhclient.conf</html:code>, and add an
appropriate setting for each of the ten configuration settings which can be
obtained via DHCP. For each setting, do one of the following:
<html:br />
If the setting should <html:i>not</html:i> be configured remotely by the DHCP server,
select an appropriate static value, and add the line:
<html:pre>supersede <html:code>setting value</html:code>;</html:pre>
If the setting should be configured remotely by the DHCP server, add the lines:
<html:pre>request <html:code>setting</html:code>;
require <html:code>setting</html:code>;</html:pre>
For example, suppose the DHCP server should provide only the IP address itself
and the subnet mask. Then the entire file should look like:
<html:pre>supersede domain-name "example.com";
supersede domain-name-servers 192.168.1.2;
supersede nis-domain "";
supersede nis-servers "";
supersede ntp-servers "ntp.example.com ";
supersede routers 192.168.1.1;
supersede time-offset -18000;
request subnet-mask;
require subnet-mask;</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">In this example, the options nis-servers and
nis-domain are set to empty strings, on the assumption that the deprecated NIS
protocol is not in use. It is necessary to supersede settings for unused
services so that they cannot be set by a hostile DHCP server. If an option is
set to an empty string, dhclient will typically not attempt to configure the
service.</ns10:warning>
<ns10:rationale xml:lang="en-US">By default, the DHCP client program, dhclient, requests and applies
ten configuration options (in addition to the IP address) from the DHCP server.
subnet-mask, broadcast-address, time-offset, routers, domain-name,
domain-name-servers, host-name, nis-domain, nis-servers, and ntp-servers. Many
of the options requested and applied by dhclient may be the same for every
system on a network. It is recommended that almost all configuration options be
assigned statically, and only options which must vary on a host-by-host basis
be assigned via DHCP. This limits the damage which can be done by a rogue DHCP
server. If appropriate for your site, it is also possible to supersede the
host-name directive in <html:code>/etc/dhcp/dhclient.conf</html:code>, establishing a static
hostname for the machine. However, dhclient does not use the host name option
provided by the DHCP server (instead using the value provided by a reverse DNS
lookup).</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_client_restrict_options:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ntp">
<ns10:title xml:lang="en-US">Network Time Protocol</ns10:title>
<ns10:description xml:lang="en-US">The Network Time Protocol is used to manage the system
clock over a network. Computer clocks are not very accurate, so
time will drift unpredictably on unmanaged systems. Central time
protocols can be used both to ensure that time is consistent among
a network of machines, and that their time is consistent with the
outside world.
<html:br /><html:br />
If every system on a network reliably reports the same time, then it is much
easier to correlate log messages in case of an attack. In addition, a number of
cryptographic protocols (such as Kerberos) use timestamps to prevent certain
types of attacks. If your network does not have synchronized time, these
protocols may be unreliable or even unusable.
<html:br /><html:br />
Depending on the specifics of the network, global time accuracy may be just as
important as local synchronization, or not very important at all. If your
network is connected to the Internet, using a
public timeserver (or one provided by your enterprise) provides globally
accurate timestamps which may be essential in investigating or responding to
an attack which originated outside of your network.
<html:br /><html:br />
A typical network setup involves a small number of internal systems operating as NTP
servers, and the remainder obtaining time information from those
internal servers.
<html:br /><html:br />
More information on how to configure the NTP server software,
including configuration of cryptographic authentication for
time data, is available at <html:a href="http://www.ntp.org">http://www.ntp.org</html:a>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable the NTP Daemon</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ntpd</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 ntpd on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">160</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling the <html:code>ntpd</html:code> service ensures that the <html:code>ntpd</html:code>
service will be running and that the system will synchronize its time to
any servers specified. This is important whether the system is configured to be
a client (and synchronize only its own clock) or it is also acting as an NTP
server to other systems. Synchronizing time is essential for authentication
services such as Kerberos, but it is also important for maintaining accurate
logs and auditing possible security breaches.
<html:br /><html:br />
The NTP daemon offers all of the functionality of <html:code>ntpdate</html:code>, which is now
deprecated. Additional information on this is available at
<html:a href="http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate">http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate</html:a></ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ntpd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable ntpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ntpd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service ntpd
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- ntpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ntpd_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Specify a Remote NTP Server</ns10:title>
<ns10:description xml:lang="en-US">To specify a remote NTP server for time synchronization, edit
the file <html:code>/etc/ntp.conf</html:code>. Add or correct the following lines,
substituting the IP or hostname of a remote NTP server for <html:em>ntpserver</html:em>:
<html:pre>server <html:i>ntpserver</html:i></html:pre>
This instructs the NTP software to contact that remote server to obtain time
data.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">160</ns10:reference>
<ns10:rationale xml:lang="en-US">Synchronizing with an NTP server makes it possible
to collate system logs from multiple sources or correlate computer events with
real time events.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ntpd_specify_remote_server:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Specify Additional Remote NTP Servers</ns10:title>
<ns10:description xml:lang="en-US">Additional NTP servers can be specified for time synchronization
in the file <html:code>/etc/ntp.conf</html:code>. To do so, add additional lines of the
following form, substituting the IP address or hostname of a remote NTP server for
<html:em>ntpserver</html:em>:
<html:pre>server <html:i>ntpserver</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Specifying additional NTP servers increases the availability of
accurate time data, in the event that one of the specified servers becomes
unavailable. This is typical for a system acting as an NTP server for
other systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ntpd_specify_multiple_servers:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_mail">
<ns10:title xml:lang="en-US">Mail Server Software</ns10:title>
<ns10:description xml:lang="en-US">
Mail servers are used to send and receive email over the network.
Mail is a very common service, and Mail Transfer Agents (MTAs) are obvious
targets of network attack.
Ensure that machines are not running MTAs unnecessarily,
and configure needed MTAs as defensively as possible.
<html:br /><html:br />
Very few systems at any site should be configured to directly receive email over the
network. Users should instead use mail client programs to retrieve email
from a central server that supports protocols such as IMAP or POP3.
However, it is normal for most systems to be independently capable of sending email,
for instance so that cron jobs can report output to an administrator.
Most MTAs, including Postfix, support a submission-only mode in which mail can be sent from
the local system to a central site MTA (or directly delivered to a local account),
but the system still cannot receive mail directly over a network.
<html:br /><html:br />
The <html:code>alternatives</html:code> program in Red Hat Enterprise Linux permits selection of other mail server software
(such as Sendmail), but Postfix is the default and is preferred.
Postfix was coded with security in mind and can also be more effectively contained by
SELinux as its modular design has resulted in separate processes performing specific actions.
More information is available on its website, <html:a href="http://www.postfix.org">http://www.postfix.org</html:a>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Postfix Service</ns10:title>
<ns10:description xml:lang="en-US">The Postfix mail transfer agent is used for local mail delivery
within the system. The default configuration only listens for connections to
the default SMTP port (port 25) on the loopback interface (127.0.0.1). It is
recommended to leave this service enabled for local mail delivery.
The <html:code>postfix</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 postfix on</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Local mail delivery is essential to some system maintenance and
notification tasks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_postfix_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable postfix
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_postfix_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service postfix
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- postfix
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_postfix_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_postfix_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall Sendmail Package</ns10:title>
<ns10:description xml:lang="en-US">Sendmail is not the default mail transfer agent and is
not installed by default.
The <html:code>sendmail</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase sendmail</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The sendmail software was not developed with security in mind and
its design prevents it from being effectively contained by SELinux. Postfix
should be used instead.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_sendmail_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_sendmail_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_client">
<ns10:title xml:lang="en-US">Configure SMTP For Mail Clients</ns10:title>
<ns10:description xml:lang="en-US">This section discusses settings for Postfix in a submission-only
e-mail configuration.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Postfix Network Listening</ns10:title>
<ns10:description xml:lang="en-US">
Edit the file <html:code>/etc/postfix/main.cf</html:code> to ensure that only the following
<html:code>inet_interfaces</html:code> line appears:
<html:pre>inet_interfaces = localhost</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
This ensures <html:code>postfix</html:code> accepts mail messages
(such as cron job reports) from the local system only,
and not from the network, which protects it from network attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-postfix_network_listening_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-postfix_network_listening_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_harden_os">
<ns10:title xml:lang="en-US">Configure Operating System to Protect Mail Server
</ns10:title>
<ns10:description xml:lang="en-US">The guidance in this section is appropriate for any host which is
operating as a site MTA, whether the mail server runs using Sendmail, Postfix,
or some other software.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_configure_ssl_certs">
<ns10:title xml:lang="en-US">Configure SSL Certificates for Use with SMTP AUTH</ns10:title>
<ns10:description xml:lang="en-US">
If SMTP AUTH is to be used, the use of SSL to protect credentials in transit is strongly recommended.
There are also configurations for which it may be desirable to encrypt all mail in transit from one MTA to another,
though such configurations are beyond the scope of this guide. In either event, the steps for creating and installing
an SSL certificate are independent of the MTA in use, and are described here.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_install_ssl_cert">
<ns10:title xml:lang="en-US">Ensure Security of Postfix SSL Certificate</ns10:title>
<ns10:description xml:lang="en-US">Create the PKI directory for mail certificates, if it does not already exist:
<html:pre>$ sudo mkdir /etc/pki/tls/mail
$ sudo chown root:root /etc/pki/tls/mail
$ sudo chmod 755 /etc/pki/tls/mail</html:pre>
Using removable media or some other secure transmission format, install the files generated in the previous
step onto the mail server:
<html:pre>/etc/pki/tls/mail/serverkey.pem: the private key mailserverkey.pem
/etc/pki/tls/mail/servercert.pem: the certificate file mailservercert.pem</html:pre>
Verify the ownership and permissions of these files:
<html:pre>$ sudo chown root:root /etc/pki/tls/mail/serverkey.pem
$ sudo chown root:root /etc/pki/tls/mail/servercert.pem
$ sudo chmod 600 /etc/pki/tls/mail/serverkey.pem
$ sudo chmod 644 /etc/pki/tls/mail/servercert.pem</html:pre>
Verify that the CA's public certificate file has been installed as <html:code>/etc/pki/tls/CA/cacert.pem</html:code>, and has the
correct permissions:
<html:pre>$ sudo chown root:root /etc/pki/tls/CA/cacert.pem
$ sudo chmod 644 /etc/pki/tls/CA/cacert.pem</html:pre>
</ns10:description>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_configuration">
<ns10:title xml:lang="en-US">Configure Postfix if Necessary</ns10:title>
<ns10:description xml:lang="en-US">Postfix stores its configuration files in the directory
/etc/postfix by default. The primary configuration file is
<html:code>/etc/postfix/main.cf</html:code>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_postfix_server_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SMTP Greeting Banner</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/postfix/main.cf</html:code>, and add or correct the
following line, substituting some other wording for the banner information if
you prefer:
<html:pre>smtpd_banner = $myhostname ESMTP</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-22</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-13</ns10:reference>
<ns10:rationale xml:lang="en-US">The default greeting banner discloses that the listening mail
process is Postfix. When remote mail senders connect to the MTA on port 25,
they are greeted by an initial banner as part of the SMTP dialogue. This banner
is necessary, but it frequently gives away too much information, including the
MTA software which is in use, and sometimes also its version number. Remote
mail senders do not need this information in order to send mail, so the banner
should be changed to reveal only the hostname (which is already known and may
be useful) and the word ESMTP, to indicate that the modern SMTP protocol
variant is supported.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-postfix_server_banner:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_denial_of_service">
<ns10:title xml:lang="en-US">Configure Postfix Resource Usage to Limit Denial of Service Attacks</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/postfix/main.cf</html:code>. Edit the following lines to
configure the amount of system resources Postfix can consume:
<html:pre>default_process_limit = 100
smtpd_client_connection_count_limit = 10
smtpd_client_connection_rate_limit = 30
queue_minfree = 20971520
header_size_limit = 51200
message_size_limit = 10485760
smtpd_recipient_limit = 100</html:pre>
The values here are examples.
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note: The values given here are examples, and may
need to be modified for any particular site. By default, the Postfix anvil
process gathers mail receipt statistics. To get information about about what
connection rates are typical at your site, look in <html:code>/var/log/maillog</html:code>
for lines with the daemon name postfix/anvil.
</ns10:warning>
<ns10:rationale xml:lang="en-US">These configuration options serve to make it more difficult for
attackers to consume resources on the MTA host. The
<html:code>default_process_limit</html:code> parameter controls how many <html:code>smtpd</html:code>
processes can exist at a time, while
<html:code>smtpd_client_connection_count_limit</html:code> controls the number of those which
can be occupied by any one remote sender, and
<html:code>smtpd_client_connection_rate_limit</html:code> controls the number of connections
any one client can make per minute. By default, local hosts (those in
<html:code>mynetworks</html:code>) are exempted from per-client rate limiting. The
<html:code>queue_minfree</html:code> parameter establishes a free space threshold, in order
to stop e-mail receipt before the queue filesystem is entirely full. The
<html:code>header_size_limit</html:code>, <html:code>message_size_limit</html:code>, and
<html:code>smtpd_recipient_limit</html:code> parameters place bounds on the legal sizes of
messages received via SMTP.
</ns10:rationale>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_relay">
<ns10:title xml:lang="en-US">Control Mail Relaying</ns10:title>
<ns10:description xml:lang="en-US">Postfix's mail relay controls are implemented with the help of the
smtpd recipient restrictions option, which controls the restrictions placed on
the SMTP dialogue once the sender and recipient envelope addresses are known.
The guidance in the following sections should be applied to all machines. If
there are machines which must be allowed to relay mail, but which cannot be
trusted to relay unconditionally, configure SMTP AUTH with SSL support.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_set_trusted_networks">
<ns10:title xml:lang="en-US">Configure Trusted Networks and Hosts</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/postfix/main.cf</html:code>, and configure the contents of
the <html:code>mynetworks</html:code> variable in one of the following ways:
<html:ul><html:li>If any machine in the subnet containing the MTA may be trusted to relay
messages, add or correct the following line:
<html:pre>mynetworks_style = subnet</html:pre>
This is also the default setting, and is in effect if all
<html:code>my_networks_style</html:code> directives are commented.</html:li><html:li>If only the MTA host itself is trusted to relay messages, add or correct
the following line:
<html:pre>mynetworks_style = host</html:pre></html:li><html:li>If the set of machines which can relay is more complicated, manually
specify an entry for each netblock or IP address which is trusted to relay by
setting the <html:code>mynetworks</html:code> variable directly:
<html:pre>mynetworks = 10.0.0.0/16, 192.168.1.0/24, 127.0.0.1</html:pre></html:li></html:ul>
</ns10:description>
<ns10:rationale xml:lang="en-US">The <html:code>mynetworks</html:code> variable must contain only the set of
machines for which this MTA should unconditionally relay mail. This is a trust
relationship - if spammers gain access to these machines, your site will
effectively become an open relay. It is recommended that only machines which
are managed by you or by another trusted organization be placed in mynetworks,
and users of all other machines be required to use SMTP AUTH to send mail.
</ns10:rationale>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_relay_restrictions">
<ns10:title xml:lang="en-US">Enact SMTP Relay Restrictions</ns10:title>
<ns10:description xml:lang="en-US">
To configure Postfix to restrict addresses to which it
will send mail, see:
<html:a href="http://www.postfix.org/SMTPD_ACCESS_README.html#danger">http://www.postfix.org/SMTPD_ACCESS_README.html#danger</html:a>
<html:br />
The full contents of <html:code>smtpd_recipient_restrictions</html:code> will
vary by site, since this is a common place to put spam restrictions and other
site-specific options. The <html:code>permit_mynetworks</html:code> option allows all mail to
be relayed from the machines in <html:code>mynetworks</html:code>. Then, the
<html:code>reject_unauth_destination</html:code> option denies all mail whose destination
address is not local, preventing any other machines from relaying. These two
options should always appear in this order, and should usually follow one
another immediately unless SMTP AUTH is used.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_smtpd_recipient_restrictions">
<ns10:title xml:lang="en-US">Enact SMTP Recipient Restrictions</ns10:title>
<ns10:description xml:lang="en-US">
To configure Postfix to restrict addresses to which it
will send mail, see:
<html:a href="http://www.postfix.org/SMTPD_ACCESS_README.html#danger">http://www.postfix.org/SMTPD_ACCESS_README.html#danger</html:a>
<html:br />
The full contents of <html:code>smtpd_recipient_restrictions</html:code> will
vary by site, since this is a common place to put spam restrictions and other
site-specific options. The <html:code>permit_mynetworks</html:code> option allows all mail to
be relayed from the machines in <html:code>mynetworks</html:code>. Then, the
<html:code>reject_unauth_destination</html:code> option denies all mail whose destination
address is not local, preventing any other machines from relaying. These two
options should always appear in this order, and should usually follow one
another immediately unless SMTP AUTH is used.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_smtp_auth_for_untrusted_networks">
<ns10:title xml:lang="en-US">Require SMTP AUTH Before Relaying from Untrusted Clients</ns10:title>
<ns10:description xml:lang="en-US">SMTP authentication allows remote clients to relay mail safely by
requiring them to authenticate before submitting mail. Postfix's SMTP AUTH uses
an authentication library called SASL, which is not part of Postfix itself. To
enable the use of SASL authentication, see
<html:a href="http://www.postfix.org/SASL_README.html">http://www.postfix.org/SASL_README.html</html:a>
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_postfix_server_mail_relay_require_tls_for_smtp_auth">
<ns10:title xml:lang="en-US">Use TLS for SMTP AUTH</ns10:title>
<ns10:description xml:lang="en-US">
Postfix provides options to use TLS for certificate-based
authentication and encrypted sessions. An encrypted session protects the
information that is transmitted with SMTP mail or with SASL authentication.
To configure Postfix to protect all SMTP AUTH transactions
using TLS, see <html:a href="http://www.postfix.org/TLS_README.html">http://www.postfix.org/TLS_README.html</html:a>.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ldap">
<ns10:title xml:lang="en-US">LDAP</ns10:title>
<ns10:description xml:lang="en-US">LDAP is a popular directory service, that is, a
standardized way of looking up information from a central database.
Red Hat Enterprise Linux 6 includes software that enables a system to act as both
an LDAP client and server.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_openldap_client">
<ns10:title xml:lang="en-US">Configure OpenLDAP Clients</ns10:title>
<ns10:description xml:lang="en-US">This section provides information on which security settings are
important to configure in OpenLDAP clients by manually editing the appropriate
configuration files. Red Hat Enterprise Linux 6 provides an automated configuration tool called
authconfig and a graphical wrapper for authconfig called
<html:code>system-config-authentication</html:code>. However, these tools do not provide as
much control over configuration as manual editing of configuration files. The
authconfig tools do not allow you to specify locations of SSL certificate
files, which is useful when trying to use SSL cleanly across several protocols.
Installation and configuration of OpenLDAP on Red Hat Enterprise Linux 6 is available at
<html:a href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Directory_Servers.html">https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Directory_Servers.html</html:a>.
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Before configuring any system to be an
LDAP client, ensure that a working LDAP server is present on the
network.</ns10:warning>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure LDAP Client to Use TLS For All Transactions</ns10:title>
<ns10:description xml:lang="en-US">Configure LDAP to enforce TLS use. First, edit the file
<html:code>/etc/pam_ldap.conf</html:code>, and add or correct the following lines:
<html:pre>ssl start_tls</html:pre>
Then review the LDAP server and ensure TLS has been configured.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">778</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:rationale xml:lang="en-US">The ssl directive specifies whether to use ssl or not. If
not specified it will default to no. It should be set to start_tls rather
than doing LDAP over SSL.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ldap_client_start_tls:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ldap_client_start_tls_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Certificate Directives for LDAP Use of TLS</ns10:title>
<ns10:description xml:lang="en-US">Ensure a copy of a trusted CA certificate has been placed in
the file <html:code>/etc/pki/tls/CA/cacert.pem</html:code>. Configure LDAP to enforce TLS
use and to trust certificates signed by that CA. First, edit the file
<html:code>/etc/pam_ldap.conf</html:code>, and add or correct either of the following lines:
<html:pre>tls_cacertdir /etc/pki/tls/CA</html:pre>
or
<html:pre>tls_cacertfile /etc/pki/tls/CA/cacert.pem</html:pre>
Then review the LDAP server and ensure TLS has been configured.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">778</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:rationale xml:lang="en-US">The tls_cacertdir or tls_cacertfile directives are required when
tls_checkpeer is configured (which is the default for openldap versions 2.1 and
up). These directives define the path to the trust certificates signed by the
site CA.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ldap_client_tls_cacertpath:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ldap_client_tls_cacertpath_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_openldap_server">
<ns10:title xml:lang="en-US">Configure OpenLDAP Server</ns10:title>
<ns10:description xml:lang="en-US">This section details some security-relevant settings
for an OpenLDAP server. Installation and configuration of OpenLDAP on Red Hat Enterprise Linux 6 is available at:
<html:a href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Directory_Servers.html">https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Directory_Servers.html</html:a>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall openldap-servers Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>openldap-servers</html:code> package should be removed if not in use.
Is this machine the OpenLDAP server? If not, remove the package.
<html:pre>$ sudo yum erase openldap-servers</html:pre>
The openldap-servers RPM is not installed by default on Red Hat Enterprise Linux 6
machines. It is needed only by the OpenLDAP server, not by the
clients which use LDAP for authentication. If the system is not
intended for use as an LDAP Server it should be removed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>openldap-servers</html:code> package is not installed by default on RHEL6 machines.
It is needed only by the OpenLDAP server system, not clients which use LDAP for authentication. If
the system is not intended for use as an LDAP server, <html:code>openldap-servers</html:code> should be removed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_openldap-servers_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_openldap-servers_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_ldap_server_config_certificate_files">
<ns10:title xml:lang="en-US">Install and Protect LDAP Certificate Files</ns10:title>
<ns10:description xml:lang="en-US">Create the PKI directory for LDAP certificates if it does not already exist:
<html:pre>$ sudo mkdir /etc/pki/tls/ldap
$ sudo chown root:root /etc/pki/tls/ldap
$ sudo chmod 755 /etc/pki/tls/ldap</html:pre>
Using removable media or some other secure transmission format, install the certificate files
onto the LDAP server:
<html:ul><html:li><html:code>/etc/pki/tls/ldap/serverkey.pem</html:code>: the private key <html:code>ldapserverkey.pem</html:code></html:li><html:li><html:code>/etc/pki/tls/ldap/servercert.pem</html:code>: the certificate file <html:code>ldapservercert.pem</html:code></html:li></html:ul>
Verify the ownership and permissions of these files:
<html:pre>$ sudo chown root:ldap /etc/pki/tls/ldap/serverkey.pem
$ sudo chown root:ldap /etc/pki/tls/ldap/servercert.pem
$ sudo chmod 640 /etc/pki/tls/ldap/serverkey.pem
$ sudo chmod 640 /etc/pki/tls/ldap/servercert.pem</html:pre>
Verify that the CA's public certificate file has been installed as
<html:code>/etc/pki/tls/CA/cacert.pem</html:code>, and has the correct permissions:
<html:pre>$ sudo mkdir /etc/pki/tls/CA
$ sudo chown root:root /etc/pki/tls/CA/cacert.pem
$ sudo chmod 644 /etc/pki/tls/CA/cacert.pem</html:pre>
As a result of these steps, the LDAP server will have access to its own private
certificate and the key with which that certificate is encrypted, and to the
public certificate file belonging to the CA. Note that it would be possible for
the key to be protected further, so that processes running as ldap could not
read it. If this were done, the LDAP server process would need to be restarted
manually whenever the server rebooted.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_and_rpc">
<ns10:title xml:lang="en-US">NFS and RPC</ns10:title>
<ns10:description xml:lang="en-US">The Network File System is a popular distributed filesystem for
the Unix environment, and is very widely deployed. This section discusses the
circumstances under which it is possible to disable NFS and its dependencies,
and then details steps which should be taken to secure
NFS's configuration. This section is relevant to machines operating as NFS
clients, as well as to those operating as NFS servers.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_nfs">
<ns10:title xml:lang="en-US">Disable All NFS Services if Possible</ns10:title>
<ns10:description xml:lang="en-US">If there is not a reason for the system to operate as either an
NFS client or an NFS server, follow all instructions in this section to disable
subsystems required by NFS.
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The steps in this section will prevent a machine
from operating as either an NFS client or an NFS server. Only perform these
steps on machines which do not need NFS at all.</ns10:warning>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_nfs_services">
<ns10:title xml:lang="en-US">Disable Services Used Only by NFS</ns10:title>
<ns10:description xml:lang="en-US">If NFS is not needed, disable the NFS client daemons nfslock, rpcgssd, and rpcidmapd.
<html:br /><html:br />
All of these daemons run with elevated privileges, and many listen for network
connections. If they are not needed, they should be disabled to improve system
security posture.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File System Lock Service (nfslock)</ns10:title>
<ns10:description xml:lang="en-US">The Network File System Lock (nfslock) service starts the required
remote procedure call (RPC) processes which allow clients to lock files on the
server. If the local machine is not configured to mount NFS filesystems then
this service should be disabled.
The <html:code>nfslock</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig nfslock off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_nfslock_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable nfslock
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_nfslock_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service nfslock
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- nfslock
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_nfslock_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Secure RPC Client Service (rpcgssd)</ns10:title>
<ns10:description xml:lang="en-US">
The rpcgssd service manages RPCSEC GSS contexts required to secure protocols
that use RPC (most often Kerberos and NFS). The rpcgssd service is the
client-side of RPCSEC GSS. If the system does not require secure RPC then this
service should be disabled.
The <html:code>rpcgssd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcgssd off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcgssd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcgssd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcgssd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcgssd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RPC ID Mapping Service (rpcidmapd)</ns10:title>
<ns10:description xml:lang="en-US">The rpcidmapd service is used to map user names and groups to UID
and GID numbers on NFSv4 mounts. If NFS is not in use on the local system then
this service should be disabled.
The <html:code>rpcidmapd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcidmapd off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcidmapd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcidmapd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcidmapd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcidmapd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcidmapd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcidmapd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcbind_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RPC Bind service (rpcbind)</ns10:title>
<ns10:description xml:lang="en-US">The rpcbind utility is a server that converts RPC program numbers
into universal addresses. If RPC calls are not made to servers on the local
system then this service should be disabled.
The <html:code>rpcbind</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcbind off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcbind
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcbind_disabled:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_netfs">
<ns10:title xml:lang="en-US">Disable netfs if Possible</ns10:title>
<ns10:description xml:lang="en-US">To determine if any network filesystems handled by netfs are
currently mounted on the system execute the following command:
<html:pre>$ mount -t nfs,nfs4,smbfs,cifs,ncpfs</html:pre>
If the command did not return any output then disable netfs.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File Systems (netfs)</ns10:title>
<ns10:description xml:lang="en-US">The netfs script manages the boot-time mounting of several types
of networked filesystems, of which NFS and Samba are the most common. If these
filesystem types are not in use, the script can be disabled, protecting the
system somewhat against accidental or malicious changes to <html:code>/etc/fstab</html:code>
and against flaws in the netfs script itself.
The <html:code>netfs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig netfs off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_netfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable netfs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_netfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service netfs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- netfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_netfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_configuring_all_machines">
<ns10:title xml:lang="en-US">Configure All Machines which Use NFS</ns10:title>
<ns10:description xml:lang="en-US">The steps in this section are appropriate for all machines which
run NFS, whether they operate as clients or as servers.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_client_or_server_not_both">
<ns10:title xml:lang="en-US">Make Each Machine a Client or a Server, not Both</ns10:title>
<ns10:description xml:lang="en-US">If NFS must be used, it should be deployed in the simplest
configuration possible to avoid maintainability problems which may lead to
unnecessary security exposure. Due to the reliability and security problems
caused by NFS (specially NFSv3 and NFSv2), it is not a good idea for machines
which act as NFS servers to also mount filesystems via NFS. At the least,
crossed mounts (the situation in which each of two servers mounts a filesystem
from the other) should never be used.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_configure_fixed_ports">
<ns10:title xml:lang="en-US">Configure NFS Services to Use Fixed Ports (NFSv3 and NFSv2)</ns10:title>
<ns10:description xml:lang="en-US">Firewalling should be done at each host and at the border
firewalls to protect the NFS daemons from remote access, since NFS servers
should never be accessible from outside the organization. However, by default
for NFSv3 and NFSv2, the RPC Bind service assigns each NFS service to a port
dynamically at service startup time. Dynamic ports cannot be protected by port
filtering firewalls such as iptables.
<html:br /><html:br />
Therefore, restrict each service to always use a given port, so that
firewalling can be done effectively. Note that, because of the way RPC is
implemented, it is not possible to disable the RPC Bind service even if ports
are assigned statically to all RPC services.
<html:br /><html:br />
In NFSv4, the mounting and locking protocols have been incorporated into the
protocol, and the server listens on the the well-known TCP port 2049. As such,
NFSv4 does not need to interact with the <html:code>rpcbind, lockd, and rpc.statd</html:code>
daemons, which can and should be disabled in a pure NFSv4 environment. The
<html:code>rpc.mountd</html:code> daemon is still required on the NFS server to setup
exports, but is not involved in any over-the-wire operations.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_tcp_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure lockd to use static TCP port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>lockd</html:code> daemon to use a static TCP port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>LOCKD_TCPPORT=lockd-port</html:pre>
Where <html:code>lockd-port</html:code> is a port which is not used by any other service on
your network.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Restrict service to always use a given port, so that firewalling can be done
effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_udp_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure lockd to use static UDP port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>lockd</html:code> daemon to use a static UDP port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>LOCKD_UDPPORT=lockd-port</html:pre>
Where <html:code>lockd-port</html:code> is a port which is not used by any other service on
your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_statd_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure statd to use static port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>statd</html:code> daemon to use a static port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>STATD_PORT=statd-port</html:pre>
Where <html:code>statd-port</html:code> is a port which is not used by any other service on your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_mountd_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure mountd to use static port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>mountd</html:code> daemon to use a static port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>MOUNTD_PORT=statd-port</html:pre>
Where <html:code>mountd-port</html:code> is a port which is not used by any other service on your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_configuring_clients">
<ns10:title xml:lang="en-US">Configure NFS Clients</ns10:title>
<ns10:description xml:lang="en-US">The steps in this section are appropriate for machines which operate as NFS clients.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_nfsd">
<ns10:title xml:lang="en-US">Disable NFS Server Daemons</ns10:title>
<ns10:description xml:lang="en-US">
There is no need to run the NFS server daemons <html:code>nfs</html:code> and
<html:code>rpcsvcgssd</html:code> except on a small number of properly secured machines
designated as NFS servers. Ensure that these daemons are turned off on
clients.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_no_anonymous" selected="false" severity="low">
<ns10:title xml:lang="en-US">Specify UID and GID for Anonymous NFS Connections</ns10:title>
<ns10:description xml:lang="en-US">To specify the UID and GID for remote root users, edit the <html:code>/etc/exports</html:code> file and add the following for each export:
<html:pre>
anonuid=<html:code>value greater than UID_MAX from /etc/login.defs</html:code>
anongid=<html:code>value greater than GID_MAX from /etc/login.defs</html:code>
</html:pre>
Note that a value of "-1" is technically acceptable as this will randomize the <html:code>anonuid</html:code> and
<html:code>anongid</html:code> values on a Red Hat Enterprise Linux 6 based NFS server. While acceptable from a security perspective,
a value of <html:code>-1</html:code> may cause interoperability issues, particularly with Red Hat Enterprise Linux 7 client systems.
</ns10:description>
<ns10:rationale xml:lang="en-US">Specifying the anonymous UID and GID ensures that the remote root user is mapped
to a local account which has no permissions on the system.</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-nfs_no_anonymous_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_nfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File System (nfs)</ns10:title>
<ns10:description xml:lang="en-US">The Network File System (NFS) service allows remote hosts to mount
and interact with shared filesystems on the local machine. If the local machine
is not designated as a NFS server then this service should be disabled.
The <html:code>nfs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig nfs off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_nfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable nfs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_nfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service nfs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- nfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_nfs_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_nfs_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Secure RPC Server Service (rpcsvcgssd)</ns10:title>
<ns10:description xml:lang="en-US">The rpcsvcgssd service manages RPCSEC GSS contexts required to
secure protocols that use RPC (most often Kerberos and NFS). The rpcsvcgssd
service is the server-side of RPCSEC GSS. If the system does not require secure
RPC then this service should be disabled.
The <html:code>rpcsvcgssd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcsvcgssd off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rpcsvcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcsvcgssd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcsvcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcsvcgssd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcsvcgssd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcsvcgssd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rpcsvcgssd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_mounting_remote_filesystems">
<ns10:title xml:lang="en-US">Mount Remote Filesystems with Restrictive Options</ns10:title>
<ns10:description xml:lang="en-US">Edit the file <html:code>/etc/fstab</html:code>. For each filesystem whose type
(column 3) is <html:code>nfs</html:code> or <html:code>nfs4</html:code>, add the text
<html:code>,nodev,nosuid</html:code> to the list of mount options in column 4. If
appropriate, also add <html:code>,noexec</html:code>.
<html:br /><html:br />
See the section titled "Restrict Partition Mount Options" for a description of
the effects of these options. In general, execution of files mounted via NFS
should be considered risky because of the possibility that an adversary could
intercept the request and substitute a malicious file. Allowing setuid files to
be executed from remote servers is particularly risky, both for this reason and
because it requires the clients to extend root-level trust to the NFS
server.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Mount Remote Filesystems with nodev</ns10:title>
<ns10:description xml:lang="en-US">
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any NFS mounts.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Legitimate device files should only exist in the /dev directory. NFS mounts
should not present device files to users.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_remote_filesystems:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_nodev_remote_filesystems_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Mount Remote Filesystems with nosuid</ns10:title>
<ns10:description xml:lang="en-US">
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any NFS mounts.
</ns10:description>
<ns10:rationale xml:lang="en-US">NFS mounts should not present suid binaries to users. Only vendor-supplied suid executables
should be installed to their default location on the local filesystem.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nosuid_remote_filesystems:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_nosuid_remote_filesystems_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_nfs_configuring_servers">
<ns10:title xml:lang="en-US">Configure NFS Servers</ns10:title>
<ns10:description xml:lang="en-US">The steps in this section are appropriate for machines which operate as NFS servers.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_configure_exports_restrictively">
<ns10:title xml:lang="en-US">Configure the Exports File Restrictively</ns10:title>
<ns10:description xml:lang="en-US">Linux's NFS implementation uses the file <html:code>/etc/exports</html:code> to control what filesystems
and directories may be accessed via NFS. (See the <html:code>exports(5)</html:code> manpage for more information about the
format of this file.)
<html:br /><html:br />
The syntax of the <html:code>exports</html:code> file is not necessarily checked fully on reload, and syntax errors
can leave your NFS configuration more open than intended. Therefore, exercise caution when modifying
the file.
<html:br /><html:br />
The syntax of each line in <html:code>/etc/exports</html:code> is:
<html:pre>/DIR host1(opt1,opt2) host2(opt3)</html:pre>
where <html:code>/DIR</html:code> is a directory or filesystem to export, <html:code>hostN</html:code> is an IP address, netblock,
hostname, domain, or netgroup to which to export, and <html:code>optN</html:code> is an option.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_use_acl_enforce_auth_restrictions">
<ns10:title xml:lang="en-US">Use Access Lists to Enforce Authorization Restrictions</ns10:title>
<ns10:description xml:lang="en-US">When configuring NFS exports, ensure that each export line in <html:code>/etc/exports</html:code> contains
a list of hosts which are allowed to access that export. If no hosts are specified on an export line,
then that export is available to any remote host which requests it. All lines of the exports file should
specify the hosts (or subnets, if needed) which are allowed to access the exported directory, so that
unknown or remote hosts will be denied.
<html:br /><html:br />
Authorized hosts can be specified in several different formats:
<html:ul><html:li>Name or alias that is recognized by the resolver</html:li><html:li>Fully qualified domain name</html:li><html:li>IP address</html:li><html:li>IP subnets in the format <html:code>address/netmask</html:code> or <html:code>address/CIDR</html:code></html:li></html:ul>
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_export_filesystems_read_only">
<ns10:title xml:lang="en-US">Export Filesystems Read-Only if Possible</ns10:title>
<ns10:description xml:lang="en-US">If a filesystem is being exported so that users can view the files in a convenient
fashion, but there is no need for users to edit those files, exporting the filesystem read-only
removes an attack vector against the server. The default filesystem export mode is <html:code>ro</html:code>,
so do not specify <html:code>rw</html:code> without a good reason.
</ns10:description>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_use_root_squashing_all_exports" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Root-Squashing on All Exports</ns10:title>
<ns10:description xml:lang="en-US">If a filesystem is exported using root squashing, requests from root on the client
are considered to be unprivileged (mapped to a user such as nobody). This provides some mild
protection against remote abuse of an NFS server. Root squashing is enabled by default, and
should not be disabled.
<html:br /><html:br />
Ensure that no line in <html:code>/etc/exports</html:code> contains the option <html:code>no_root_squash</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">If the NFS server allows root access to local file systems from remote hosts, this
access could be used to compromise the system.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_restrict_nfs_clients_to_privileged_ports" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict NFS Clients to Privileged Ports</ns10:title>
<ns10:description xml:lang="en-US">By default, the server NFS implementation requires that all client requests be made
from ports less than 1024. If your organization has control over machines connected to its
network, and if NFS requests are prohibited at the border firewall, this offers some protection
against malicious requests from unprivileged users. Therefore, the default should not be changed.
<html:br /><html:br />
To ensure that the default has not been changed, ensure no line in
<html:code>/etc/exports</html:code> contains the option <html:code>insecure</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">Allowing client requests to be made from ports higher than 1024 could allow a unprivileged
user to initiate an NFS connection. If the unprivileged user account has been compromised, an
attacker could gain access to data on the NFS server.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Insecure File Locking is Not Allowed</ns10:title>
<ns10:description xml:lang="en-US">By default the NFS server requires secure file-lock requests,
which require credentials from the client in order to lock a file. Most NFS
clients send credentials with file lock requests, however, there are a few
clients that do not send credentials when requesting a file-lock, allowing the
client to only be able to lock world-readable files. To get around this, the
<html:code>insecure_locks</html:code> option can be used so these clients can access the
desired export. This poses a security risk by potentially allowing the client
access to data for which it does not have authorization.
Remove any instances of the
<html:code>insecure_locks</html:code> option from the file <html:code>/etc/exports</html:code>.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">764</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing insecure file locking could allow for sensitive data to be
viewed or edited by an unauthorized user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_insecure_locks_exports:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_insecure_locks_exports_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns">
<ns10:title xml:lang="en-US">DNS Server</ns10:title>
<ns10:description xml:lang="en-US">Most organizations have an operational need to run at
least one nameserver. However, there are many common attacks
involving DNS server software, and this server software should
be disabled on any system
on which it is not needed.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_dns_server">
<ns10:title xml:lang="en-US">Disable DNS Server</ns10:title>
<ns10:description xml:lang="en-US">
DNS software should be disabled on any machine which does not
need to be a nameserver. Note that the BIND DNS server software is
not installed on Red Hat Enterprise Linux 6 by default. The remainder of this section
discusses secure configuration of machines which must be
nameservers.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable DNS Server</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>named</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig named off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
All network services involve some risk of compromise due to
implementation flaws and should be disabled if possible.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_named_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable named
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_named_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service named
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- named
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_named_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_named_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall bind Package</ns10:title>
<ns10:description xml:lang="en-US">To remove the <html:code>bind</html:code> package, which contains the
<html:code>named</html:code> service, run the following command:
<html:pre>$ sudo yum erase bind</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
If there is no need to make DNS server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_bind_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_bind_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_isolation">
<ns10:title xml:lang="en-US">Isolate DNS from Other Services</ns10:title>
<ns10:description xml:lang="en-US">This section discusses mechanisms for preventing the DNS server
from interfering with other services. This is done both to protect the
remainder of the network should a nameserver be compromised, and to make direct
attacks on nameservers more difficult.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_dedicated">
<ns10:title xml:lang="en-US">Run DNS Software on Dedicated Servers</ns10:title>
<ns10:description xml:lang="en-US">Since DNS is
a high-risk service which must frequently be made available to the entire
Internet, it is strongly recommended that no other services be offered by
machines which act as organizational DNS servers.</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_chroot">
<ns10:title xml:lang="en-US">Run DNS Software in a chroot Jail</ns10:title>
<ns10:description xml:lang="en-US">Install the <html:code>bind-chroot</html:code> package:
<html:pre>$ sudo yum install bind-chroot</html:pre>
Place a valid named.conf file inside the chroot jail:
<html:pre>$ sudo cp /etc/named.conf /var/named/chroot/etc/named.conf
$ sudo chown root:root /var/named/chroot/etc/named.conf
$ sudo chmod 644 /var/named/chroot/etc/named.conf</html:pre>
Create and populate an appropriate zone directory within the jail, based on the
options directive. If your <html:code>named.conf</html:code> includes:
<html:pre>options {
directory "/path/to/DIRNAME ";
...
}</html:pre>
then copy that directory and its contents from the original zone directory:
<html:pre>$ sudo cp -r /path/to/DIRNAME /var/named/chroot/DIRNAME</html:pre>
Add or correct the following line within <html:code>/etc/sysconfig/named</html:code>:
<html:pre>ROOTDIR=/var/named/chroot</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">If you are running BIND in a chroot jail, then you
should use the jailed <html:code>named.conf</html:code> as the primary nameserver
configuration file. That is, when this guide recommends editing
<html:code>/etc/named.conf</html:code>, you should instead edit
<html:code>/var/named/chroot/etc/named.conf</html:code>.
</ns10:warning>
<ns10:rationale xml:lang="en-US">Chroot jails are not foolproof. However, they serve to make it more
difficult for a compromised program to be used to attack the entire host. They
do this by restricting a program's ability to traverse the directory upward, so
that files outside the jail are not visible to the chrooted process. Since RHEL
supports a standard mechanism for placing BIND in a chroot jail, you should
take advantage of this feature.</ns10:rationale>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_protection">
<ns10:title xml:lang="en-US">Protect DNS Data from Tampering or Attack</ns10:title>
<ns10:description xml:lang="en-US">This section discusses DNS configuration options which make it
more difficult for attackers to gain access to private DNS data or to modify
DNS data.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_separate_internal_external">
<ns10:title xml:lang="en-US">Run Separate DNS Servers for External and Internal Queries</ns10:title>
<ns10:description xml:lang="en-US">Is it possible to run external and internal nameservers on
separate machines? If so, follow the configuration guidance in this section. On
the external nameserver, edit <html:code>/etc/named.conf</html:code> to add or correct the
following directives:
<html:pre>options {
allow-query { any; };
recursion no;
...
};
zone "example.com " IN {
...
};</html:pre>
On the internal nameserver, edit <html:code>/etc/named.conf</html:code>. Add or correct the
following directives, where SUBNET is the numerical IP representation of your
organization in the form xxx.xxx.xxx.xxx/xx:
<html:pre>acl internal {
SUBNET ;
localhost;
};
options {
allow-query { internal; };
...
};
zone "internal.example.com " IN {
...
};</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Enterprise nameservers generally serve two functions. One is to
provide public information about the machines in a domain for the benefit of
outside users who wish to contact those machines, for instance in order to send
mail to users in the enterprise, or to visit the enterprise's external web
page. The other is to provide nameservice to client machines within the
enterprise. Client machines require both private information about enterprise
machines (which may be different from the public information served to the rest
of the world) and public information about machines outside the enterprise,
which is used to send mail or visit websites outside of the organization.
<html:br />
In order to provide the public nameservice function, it is necessary to share
data with untrusted machines which request it - otherwise, the enterprise
cannot be conveniently contacted by outside users. However, internal data
should be protected from disclosure, and serving irrelevant public name queries
for outside domains leaves the DNS server open to cache poisoning and other
attacks. Therefore, local network nameservice functions should not be provided
to untrusted machines.
<html:br />
Separate machines should be used to fill these two functions whenever possible.
</ns10:rationale>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dns_server_partition_with_views">
<ns10:title xml:lang="en-US">Use Views to Partition External and Internal Information</ns10:title>
<ns10:description xml:lang="en-US">If it is not possible to run external and internal nameservers on
separate physical machines, run BIND9 and simulate this feature using views.
Edit <html:code>/etc/named.conf</html:code>. Add or correct the following directives (where
SUBNET is the numerical IP representation of your organization in the form
xxx.xxx.xxx.xxx/xx):
<html:pre>acl internal {
SUBNET ;
localhost;
};
view "internal-view" {
match-clients { internal; };
zone "." IN {
type hint;
file "db.cache";
};
zone "internal.example.com " IN {
...
};
};
view "external-view" {
match-clients { any; };
recursion no;
zone "example.com " IN {
...
};
};</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">As shown in the example, database files which are
required for recursion, such as the root hints file, must be available to any
clients which are allowed to make recursive queries. Under typical
circumstances, this includes only the internal clients which are allowed to use
this server as a general-purpose nameserver.</ns10:warning>
<ns10:rationale xml:lang="en-US">The view feature is provided by BIND9 as a way to allow a single
nameserver to make different sets of data available to different sets of
clients. If possible, it is always better to run external and internal
nameservers on separate machines, so that even complete compromise of the
external server cannot be used to obtain internal data or confuse internal DNS
clients. However, this is not always feasible, and use of a feature like views
is preferable to leaving internal DNS data entirely unprotected.</ns10:rationale>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_disable_zone_transfers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Zone Transfers from the Nameserver</ns10:title>
<ns10:description xml:lang="en-US">Is it necessary for a secondary nameserver to receive zone data
via zone transfer from the primary server? If not, follow the instructions in
this section. If so, see the next section for instructions on protecting zone
transfers.
Add or correct the following directive within <html:code>/etc/named.conf</html:code>:
<html:pre>options {
allow-transfer { none; };
...
}</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">If both the primary and secondary nameserver are under your control,
or if you have only one nameserver, it may be possible to use an external
configuration management mechanism to distribute zone updates. In that case, it
is not necessary to allow zone transfers within BIND itself, so they should be
disabled to avoid the potential for abuse.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_authenticate_zone_transfers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Authenticate Zone Transfers</ns10:title>
<ns10:description xml:lang="en-US">If it is necessary for a secondary nameserver to receive zone data
via zone transfer from the primary server, follow the instructions here. Use
dnssec-keygen to create a symmetric key file in the current directory:
<html:pre>$ cd /tmp
$ sudo dnssec-keygen -a HMAC-MD5 -b 128 -n HOST dns.example.com
Kdns.example.com .+aaa +iiiii</html:pre>
This output is the name of a file containing the new key. Read the file to find
the base64-encoded key string:
<html:pre>$ sudo cat Kdns.example.com .+NNN +MMMMM .key
dns.example.com IN KEY 512 3 157 base64-key-string</html:pre>
Add the directives to <html:code>/etc/named.conf</html:code> on the primary server:
<html:pre>key zone-transfer-key {
algorithm hmac-md5;
secret "base64-key-string ";
};
zone "example.com " IN {
type master;
allow-transfer { key zone-transfer-key; };
...
};</html:pre>
Add the directives below to <html:code>/etc/named.conf</html:code> on the secondary nameserver:
<html:pre>key zone-transfer-key {
algorithm hmac-md5;
secret "base64-key-string ";
};
server IP-OF-MASTER {
keys { zone-transfer-key; };
};
zone "example.com " IN {
type slave;
masters { IP-OF-MASTER ; };
...
};</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The purpose of the dnssec-keygen command is to
create the shared secret string base64-key-string. Once this secret has been
obtained and inserted into named.conf on the primary and secondary servers, the
key files Kdns.example.com .+NNN +MMMMM .key and Kdns.example.com .+NNN +MMMMM
.private are no longer needed, and may safely be deleted.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The BIND transaction signature (TSIG) functionality allows primary
and secondary nameservers to use a shared secret to verify authorization to
perform zone transfers. This method is more secure than using IP-based limiting
to restrict nameserver access, since IP addresses can be easily spoofed.
However, if you cannot configure TSIG between your servers because, for
instance, the secondary nameserver is not under your control and its
administrators are unwilling to configure TSIG, you can configure an
allow-transfer directive with numerical IP addresses or ACLs as a last resort.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_disable_dynamic_updates" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Dynamic Updates</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason to enable the risky dynamic
update functionality? If not, edit <html:code>/etc/named.conf</html:code>. For each zone
specification, correct the following directive if necessary:
<html:pre>zone "example.com " IN {
allow-update { none; };
...
};</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Dynamic updates allow remote servers to add, delete, or modify any
entries in your zone file. Therefore, they should be considered highly risky,
and disabled unless there is a very good reason for their use. If dynamic
updates must be allowed, IP-based ACLs are insufficient protection, since they
are easily spoofed. Instead, use TSIG keys (see the previous section for an
example), and consider using the update-policy directive to restrict changes to
only the precise type of change needed.</ns10:rationale>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ftp">
<ns10:title xml:lang="en-US">FTP Server</ns10:title>
<ns10:description xml:lang="en-US">FTP is a common method for allowing remote access to
files. Like telnet, the FTP protocol is unencrypted, which means
that passwords and other data transmitted during the session can be
captured and that the session is vulnerable to hijacking.
Therefore, running the FTP server software is not recommended.
<html:br /><html:br />
However, there are some FTP server configurations which may
be appropriate for some environments, particularly those which
allow only read-only anonymous access as a means of downloading
data available to the public.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_vsftpd">
<ns10:title xml:lang="en-US">Disable vsftpd if Possible</ns10:title>
<ns10:description xml:lang="en-US">To minimize attack surface, disable vsftpd if at all
possible.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable vsftpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>vsftpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig vsftpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running FTP server software provides a network-based avenue
of attack, and should be disabled if not needed.
Furthermore, the FTP protocol is unencrypted and creates
a risk of compromising sensitive information.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_vsftpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_vsftpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service vsftpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- vsftpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_vsftpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_vsftpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall vsftpd Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>vsftpd</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase vsftpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the vsftpd package decreases the risk of its
accidental activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_vsftpd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_vsftpd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ftp_use_vsftpd">
<ns10:title xml:lang="en-US">Use vsftpd to Provide FTP Service if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If your use-case requires FTP service, install and
set-up vsftpd to provide it.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_vsftpd_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install vsftpd Package</ns10:title>
<ns10:description xml:lang="en-US">If this machine must operate as an FTP server, install the <html:code>vsftpd</html:code> package via the standard channels.
<html:pre>$ sudo yum install vsftpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">After Red Hat Enterprise Linux 2.1, Red Hat switched from distributing wu-ftpd with Red Hat Enterprise Linux to distributing vsftpd. For security
and for consistency with future Red Hat releases, the use of vsftpd is recommended.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure vsftpd is installed
package:
name="{{item}}"
state=present
with_items:
- vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_vsftpd
class install_vsftpd {
package { 'vsftpd':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=vsftpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_vsftpd_installed:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_ftp_configure_vsftpd">
<ns10:title xml:lang="en-US">Use vsftpd to Provide FTP Service if Necessary</ns10:title>
<ns10:description xml:lang="en-US">The primary vsftpd configuration file is
<html:code>/etc/vsftpd.conf</html:code>, if that file exists, or
<html:code>/etc/vsftpd/vsftpd.conf</html:code> if it does not.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Logging of All FTP Transactions</ns10:title>
<ns10:description xml:lang="en-US">Add or correct the following configuration options within the <html:code>vsftpd</html:code>
configuration file, located at <html:code>/etc/vsftpd/vsftpd.conf</html:code>:
<html:pre>xferlog_enable=YES
xferlog_std_format=NO
log_ftp_protocol=YES</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">If verbose logging to <html:code>vsftpd.log</html:code> is done, sparse logging of downloads to <html:code>/var/log/xferlog</html:code> will not also occur. However, the information about what files were downloaded is included in the information logged to <html:code>vsftpd.log</html:code></ns10:warning>
<ns10:rationale xml:lang="en-US">To trace malicious activity facilitated by the FTP service, it must be configured to ensure that all commands sent to
the FTP server are logged using the verbose vsftpd log
format. The default vsftpd log file is <html:code>/var/log/vsftpd.log</html:code>.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_log_transactions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ftp_log_transactions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Create Warning Banners for All FTP Users</ns10:title>
<ns10:description xml:lang="en-US">Edit the vsftpd configuration file, which resides at <html:code>/etc/vsftpd/vsftpd.conf</html:code>
by default. Add or correct the following configuration options:
<html:pre>banner_file=/etc/issue</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:rationale xml:lang="en-US">This setting will cause the system greeting banner to be used for FTP connections as well.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_present_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ftp_present_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_ftp_restrict_users">
<ns10:title xml:lang="en-US">Restrict the Set of Users Allowed to Access FTP</ns10:title>
<ns10:description xml:lang="en-US">This section describes how to disable non-anonymous (password-based) FTP logins, or, if it is not possible to
do this entirely due to legacy applications, how to restrict insecure FTP login to only those users who have an
identified need for this access.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_restrict_to_anon" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Access to Anonymous Users if Possible</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason for users to transfer files to/from their own accounts using FTP, rather than
using a secure protocol like SCP/SFTP? If not, edit the vsftpd configuration file. Add or correct the following configuration option:
<html:pre>local_enable=NO</html:pre>
If non-anonymous FTP logins are necessary, follow the guidance in the remainder of this section to secure
these logins as much as possible.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:rationale xml:lang="en-US">The use of non-anonymous FTP logins is strongly discouraged. Since SSH clients and servers are widely available, and since SSH provides support for a transfer mode which resembles FTP in user interface, there is no good reason to allow password-based FTP access. </ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_restrict_to_anon:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_limit_users" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Users Allowed FTP Access if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If there is a mission-critical reason for users to access their accounts via the insecure FTP protocol, limit the set of users who are allowed this access. Edit the vsftpd configuration file. Add or correct the following configuration options:
<html:pre>userlist_enable=YES
userlist_file=/etc/vsftp.ftpusers
userlist_deny=NO</html:pre>
Edit the file <html:code>/etc/vsftp.ftpusers</html:code>. For each user USERNAME who should be allowed to access the system via FTP, add a line containing that user's name:
<html:pre>USERNAME</html:pre>
If anonymous access is also required, add the anonymous usernames to <html:code>/etc/vsftp.ftpusers</html:code> as well.
<html:pre>anonymous
ftp</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Historically, the file <html:code>/etc/ftpusers</html:code> contained a list of users who were not allowed to access the system via FTP. It was used to prevent system users such as the root user from logging in via the insecure FTP protocol. However, when the configuration option <html:code>userlist deny=NO</html:code> is set, vsftpd interprets ftpusers as the set of users who are allowed to login via FTP. Since it should be possible for most users to access their accounts via secure protocols, it is recommended that this setting be used, so that non-anonymous FTP access can be limited to legacy users who have been explicitly identified.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_limit_users:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_disable_uploads" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable FTP Uploads if Possible</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason for users to upload files via FTP? If not,
edit the vsftpd configuration file to add or correct the following configuration options:
<html:pre>write_enable=NO</html:pre>
If FTP uploads are necessary, follow the guidance in the remainder of this section to secure these transactions
as much as possible.</ns10:description>
<ns10:rationale xml:lang="en-US">Anonymous FTP can be a convenient way to make files available for universal download. However, it is less
common to have a need to allow unauthenticated users to place files on the FTP server. If this must be done, it
is necessary to ensure that files cannot be uploaded and downloaded from the same directory.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_disable_uploads:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_home_partition" selected="false" severity="low">
<ns10:title xml:lang="en-US">Place the FTP Home Directory on its Own Partition</ns10:title>
<ns10:description xml:lang="en-US">By default, the anonymous FTP root is the home directory of the FTP user account. The df command can
be used to verify that this directory is on its own partition.</ns10:description>
<ns10:rationale xml:lang="en-US">If there is a mission-critical reason for anonymous users to upload files, precautions must be taken to prevent
these users from filling a disk used by other services.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_configure_firewall" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Firewalls to Protect the FTP Server</ns10:title>
<ns10:description xml:lang="en-US">By default, <html:code>iptables</html:code>
blocks access to the ports used by the web server.
To configure <html:code>iptables</html:code> to allow port
21 traffic one must edit
<html:code>/etc/sysconfig/iptables</html:code> and
<html:code>/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG
and DROP lines for the INPUT chain:
<html:pre xml:space="preserve">-A INPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT</html:pre>
Edit the file <html:code>/etc/sysconfig/iptables-config</html:code>. Ensure that the space-separated list of modules contains
the FTP connection tracking module:
<html:pre>IPTABLES_MODULES="ip_conntrack_ftp"</html:pre></ns10:description>
<ns10:rationale xml:lang="en-US">These settings configure iptables to allow connections to an FTP server. The first line allows initial connections
to the FTP server port.
FTP is an older protocol which is not very compatible with firewalls. During the initial FTP dialogue, the client
and server negotiate an arbitrary port to be used for data transfer. The <html:code>ip_conntrack_ftp</html:code> module is used by
iptables to listen to that dialogue and allow connections to the data ports which FTP negotiates. This allows an
FTP server to operate on a machine which is running a firewall.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_configure_firewall:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_http">
<ns10:title xml:lang="en-US">Web Server</ns10:title>
<ns10:description xml:lang="en-US">The web server is responsible for providing access to
content via the HTTP protocol. Web servers represent a significant
security risk because:
<html:br /><html:br />
<html:ul><html:li>The HTTP port is commonly probed by malicious sources</html:li><html:li>Web server software is very complex, and includes a long
history of vulnerabilities</html:li><html:li>The HTTP protocol is unencrypted and vulnerable to passive
monitoring</html:li></html:ul>
<html:br /><html:br />
The system's default web server software is Apache 2 and is
provided in the RPM package <html:code>httpd</html:code>.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_httpd">
<ns10:title xml:lang="en-US">Disable Apache if Possible</ns10:title>
<ns10:description xml:lang="en-US">If Apache was installed and activated, but the system
does not need to act as a web server, then it should be disabled
and removed from the system.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable httpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig httpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running web server software provides a network-based avenue
of attack, and should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_httpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_httpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service httpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- httpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_httpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_httpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall httpd Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase httpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
If there is no need to make the web server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure httpd is removed
package:
name="{{item}}"
state=absent
with_items:
- httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_httpd
class remove_httpd {
package { 'httpd':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=httpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_httpd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_httpd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_installing_httpd">
<ns10:title xml:lang="en-US">Install Apache if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If <html:code>httpd</html:code> was not installed and activated, but the system
needs to act as a web server, then it should be installed on the system. Follow these
guidelines to install it defensively. The <html:code>httpd</html:code> package can be installed with
the following command:
<html:pre>$ sudo yum install httpd</html:pre>
This method of installation is recommended over installing the "Web Server"
package group during the system installation process. The Web Server package
group includes many packages which are likely extraneous, while the
command-line method installs only the required <html:code>httpd</html:code> package itself.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_minimal_modules_installed">
<ns10:title xml:lang="en-US">Confirm Minimal Built-in Modules Installed</ns10:title>
<ns10:description xml:lang="en-US">The default <html:code>httpd</html:code> installation minimizes the number of
modules that are compiled directly into the binary (<html:code>core prefork http_core
mod_so</html:code>). This minimizes risk by limiting the capabilities allowed by the
web server.
Query the set of compiled-in modules using the following command:
<html:pre>$ httpd -l</html:pre>
If the number of compiled-in modules is significantly larger than the
aforementioned set, this guide recommends re-installing <html:code>httpd</html:code> with a
reduced configuration. Minimizing the number of modules that are compiled into
the <html:code>httpd</html:code> binary, reduces risk by limiting the capabilities allowed by
the webserver.
</ns10:description>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_securing_httpd">
<ns10:title xml:lang="en-US">Secure Apache Configuration</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>httpd</html:code> configuration file is
<html:code>/etc/httpd/conf/httpd.conf</html:code>. Apply the recommendations in the remainder
of this section to this file.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_restrict_info_leakage">
<ns10:title xml:lang="en-US">Restrict Web Server Information Leakage</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ServerTokens</html:code> and <html:code>ServerSignature</html:code> directives determine how
much information the web server discloses about the configuration of the
system.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_servertokens_prod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set httpd ServerTokens Directive to Prod</ns10:title>
<ns10:description xml:lang="en-US"><html:code>ServerTokens Prod</html:code> restricts information in page headers, returning only the word "Apache."
<html:br /><html:br />
Add or correct the following directive in <html:code>/etc/httpd/conf/httpd.conf</html:code>:
<html:pre>ServerTokens Prod</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Information disclosed to clients about the configuration of the web server and system could be used
to plan an attack on the given system. This information disclosure should be restricted to a minimum.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_serversignature_off" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set httpd ServerSignature Directive to Off</ns10:title>
<ns10:description xml:lang="en-US"><html:code>ServerSignature Off</html:code> restricts <html:code>httpd</html:code> from displaying server version number
on error pages.
<html:br /><html:br />
Add or correct the following directive in <html:code>/etc/httpd/conf/httpd.conf</html:code>:
<html:pre>ServerSignature Off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Information disclosed to clients about the configuration of the web server and system could be used
to plan an attack on the given system. This information disclosure should be restricted to a minimum.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_minimize_loadable_modules">
<ns10:title xml:lang="en-US">Minimize Web Server Loadable Modules</ns10:title>
<ns10:description xml:lang="en-US">
A default installation of <html:code>httpd</html:code> includes a plethora of dynamically shared objects (DSO)
that are loaded at run-time. Unlike the aforementioned compiled-in modules, a DSO can be
disabled in the configuration file by removing the corresponding LoadModule directive.
<html:br /><html:br />
Note: A DSO only provides additional functionality if associated directives are included
in the <html:code>httpd</html:code> configuration file. It should also be noted that removing a DSO will produce
errors on <html:code>httpd</html:code> startup if the configuration file contains directives that apply to that
module. Refer to <html:code><html:a href="http://httpd.apache.org/docs/">http://httpd.apache.org/docs/</html:a></html:code> for details on which directives
are associated with each DSO.
<html:br /><html:br />
Following each DSO removal, the configuration can be tested with the following command
to check if everything still works:
<html:pre>$ sudo service httpd configtest</html:pre>
The purpose of each of the modules loaded by default will now be addressed one at a time.
If none of a module's directives are being used, remove it.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_core_modules">
<ns10:title xml:lang="en-US">httpd Core Modules</ns10:title>
<ns10:description xml:lang="en-US">
These modules comprise a basic subset of modules that are likely needed for base <html:code>httpd</html:code>
functionality; ensure they are not commented out in <html:code>/etc/httpd/conf/httpd.conf</html:code>:
<html:pre>LoadModule auth_basic_module modules/mod_auth_basic.so
LoadModule authn_default_module modules/mod_authn_default.so
LoadModule authz_host_module modules/mod_authz_host.so
LoadModule authz_user_module modules/mod_authz_user.so
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
LoadModule authz_default_module modules/mod_authz_default.so
LoadModule log_config_module modules/mod_log_config.so
LoadModule logio_module modules/mod_logio.so
LoadModule setenvif_module modules/mod_setenvif.so
LoadModule mime_module modules/mod_mome.so
LoadModule autoindex_module modules/mod_autoindex.so
LoadModule negotiation_module modules/mod_negotiation.so
LoadModule dir_module modules/mod_dir.so
LoadModule alias_module modules/mod_alias.so</html:pre>
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_basic_authentication">
<ns10:title xml:lang="en-US">Minimize Modules for HTTP Basic Authentication</ns10:title>
<ns10:description xml:lang="en-US">
The following modules are necessary if this web server will provide content that will
be restricted by a password.
<html:br /><html:br />
Authentication can be performed using local plain text password files (<html:code>authn_file</html:code>),
local DBM password files (<html:code>authn_dbm</html:code>) or an LDAP directory. The only module required by
the web server depends on your choice of authentication. Comment out the modules you don't
need from the following:
<html:pre>LoadModule authn_file_module modules/mod_authn_file.so
LoadModule authn_dbm_module modules/mod_authn_dbm.so</html:pre>
<html:code>authn_alias</html:code> allows for authentication based on aliases. <html:code>authn_anon</html:code>
allows anonymous authentication similar to that of anonymous ftp sites. <html:code>authz_owner</html:code>
allows authorization based on file ownership. <html:code>authz_dbm</html:code> allows for authorization
based on group membership if the web server is using DBM authentication.
<html:br /><html:br />
If the above functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule authn_alias_module modules/mod_authn_alias.so
#LoadModule authn_anon_module modules/mod_authn_anon.so
#LoadModule authz_owner_module modules/mod_authz_owner.so
#LoadModule authz_dbm_module modules/mod_authz_dbm.so</html:pre>
</ns10:description>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_digest_authentication" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable HTTP Digest Authentication</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>auth_digest</html:code> module provides encrypted authentication sessions.
If this functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule auth_digest_module modules/mod_auth_digest.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_mod_rewrite" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable HTTP mod_rewrite</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>mod_rewrite</html:code> module is very powerful and can protect against
certain classes of web attacks. However, it is also very complex and has a
significant history of vulnerabilities itself. If its functionality is
unnecessary, comment out the related module:
<html:pre>#LoadModule rewrite_module modules/mod_rewrite.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_ldap_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable LDAP Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ldap</html:code> module provides HTTP authentication via an LDAP directory.
If its functionality is unnecessary, comment out the related modules:
<html:pre>#LoadModule ldap_module modules/mod_ldap.so
#LoadModule authnz_ldap_module modules/mod_authnz_ldap.so</html:pre>
If LDAP is to be used, SSL encryption should be used as well.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_side_includes" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Server Side Includes</ns10:title>
<ns10:description xml:lang="en-US">
Server Side Includes provide a method of dynamically generating web pages through the
insertion of server-side code. However, the technology is also deprecated and
introduces significant security concerns.
If this functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule include_module modules/mod_include.so</html:pre>
If there is a critical need for Server Side Includes, they should be enabled with the
option <html:code>IncludesNoExec</html:code> to prevent arbitrary code execution. Additionally, user
supplied data should be encoded to prevent cross-site scripting vulnerabilities.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_mime_magic" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable MIME Magic</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>mime_magic</html:code> module provides a second layer of MIME support that in most configurations
is likely extraneous. If its functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule mime_magic_module modules/mod_mime_magic.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_webdav" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable WebDAV (Distributed Authoring and Versioning)</ns10:title>
<ns10:description xml:lang="en-US">
WebDAV is an extension of the HTTP protocol that provides distributed and
collaborative access to web content. If its functionality is unnecessary,
comment out the related modules:
<html:pre>#LoadModule dav_module modules/mod_dav.so
#LoadModule dav_fs_module modules/mod_dav_fs.so</html:pre>
If there is a critical need for WebDAV, extra care should be taken in its configuration.
Since DAV access allows remote clients to manipulate server files, any location on the
server that is DAV enabled should be protected by access controls.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server, reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_activity_status" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Server Activity Status</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>status</html:code> module provides real-time access to statistics on the internal operation of
the web server. This may constitute an unnecessary information leak and should be disabled
unless necessary. To do so, comment out the related module:
<html:pre>#LoadModule status_module modules/mod_status.so</html:pre>
If there is a critical need for this module, ensure that access to the status
page is properly restricted to a limited set of hosts in the status handler
configuration.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_configuration_display" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Web Server Configuration Display</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>info</html:code> module creates a web page illustrating the configuration of the web server. This
can create an unnecessary security leak and should be disabled.
If its functionality is unnecessary, comment out the module:
<html:pre>#LoadModule info_module modules/mod_info.so</html:pre>
If there is a critical need for this module, use the <html:code>Location</html:code> directive to provide
an access control list to restrict access to the information.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_url_correction" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable URL Correction on Misspelled Entries</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>speling</html:code> module attempts to find a document match by allowing one misspelling in an
otherwise failed request. If this functionality is unnecessary, comment out the module:
<html:pre>#LoadModule speling_module modules/mod_speling.so</html:pre>
This functionality weakens server security by making site enumeration easier.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_proxy_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Proxy Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>proxy</html:code> module provides proxying support, allowing <html:code>httpd</html:code> to forward requests and
serve as a gateway for other servers. If its functionality is unnecessary, comment out the module:
<html:pre>#LoadModule proxy_module modules/mod_proxy.so</html:pre>
If proxy support is needed, load <html:code>mod_proxy</html:code> and the appropriate proxy protocol handler
module (one of <html:code>mod_proxy_http</html:code>, <html:code>mod_proxy_ftp</html:code>, or <html:code>mod_proxy_connect</html:code>). Additionally,
make certain that a server is secure before enabling proxying, as open proxy servers
are a security risk. <html:code>mod_proxy_balancer</html:code> enables load balancing, but requires that
<html:code>mod status</html:code> be enabled.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_cache_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Cache Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cache</html:code> module allows <html:code>httpd</html:code> to cache data, optimizing access to
frequently accessed content. However, it introduces potential security flaws
such as the possibility of circumventing <html:code>Allow</html:code> and
<html:code>Deny</html:code> directives.
<html:br /><html:br /> If this functionality is
unnecessary, comment out the module:
<html:pre>#LoadModule cache_module modules/mod_cache.so</html:pre>
If caching is required, it should not be enabled for any limited-access content.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_cgi_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable CGI Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cgi</html:code> module allows HTML to interact with the CGI web programming language.
<html:br /><html:br />
If this functionality is unnecessary, comment out the module:
<html:pre>#LoadModule cgi_module modules/mod_cgi.so</html:pre>
If the web server requires the use of CGI, enable <html:code>mod_cgi</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_optional_components">
<ns10:title xml:lang="en-US">Minimize Various Optional Components</ns10:title>
<ns10:description xml:lang="en-US">
The following modules perform very specific tasks, sometimes providing access to
just a few additional directives. If such functionality is not required (or if you
are not using these directives), comment out the associated module:
<html:ul><html:li>External filtering (response passed through external program prior to client delivery)
<html:pre>#LoadModule ext_filter_module modules/mod_ext_filter.so</html:pre></html:li><html:li>User-specified Cache Control and Expiration
<html:pre>#LoadModule expires_module modules/mod_expires.so</html:pre></html:li><html:li>Compression Output Filter (provides content compression prior to client delivery)
<html:pre>#LoadModule deflate_module modules/mod_deflate.so</html:pre></html:li><html:li>HTTP Response/Request Header Customization
<html:pre>#LoadModule headers_module modules/mod_headers.so</html:pre></html:li><html:li>User activity monitoring via cookies
<html:pre>#LoadModule usertrack_module modules/mod_usertrack.so</html:pre></html:li><html:li>Dynamically configured mass virtual hosting
<html:pre>#LoadModule vhost_alias_module modules/mod_vhost_alias.so</html:pre></html:li></html:ul>
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_minimize_config_files_included">
<ns10:title xml:lang="en-US">Minimize Configuration Files Included</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>Include</html:code> directive directs <html:code>httpd</html:code> to load supplementary configuration files
from a provided path. The default configuration loads all files that end in <html:code>.conf</html:code>
from the <html:code>/etc/httpd/conf.d</html:code> directory.
<html:br /><html:br />
To restrict excess configuration, the following line should be commented out and
replaced with <html:code>Include</html:code> directives that only reference required configuration files:
<html:pre>#Include conf.d/*.conf</html:pre>
If the above change was made, ensure that the SSL encryption remains loaded by
explicitly including the corresponding configuration file:
<html:pre>Include conf.d/ssl.conf</html:pre>
If PHP is necessary, a similar alteration must be made:
<html:pre>Include conf.d/php.conf</html:pre>
Explicitly listing the configuration files to be loaded during web server start-up avoids
the possibility of unwanted or malicious configuration files to be automatically included as
part of the server's running configuration.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_directory_restrictions">
<ns10:title xml:lang="en-US">Directory Restrictions</ns10:title>
<ns10:description xml:lang="en-US">
The Directory tags in the web server configuration file allow finer grained access
control for a specified directory. All web directories should be configured on a
case-by-case basis, allowing access only where needed.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_root_directory" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Root Directory</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> root directory should always have the most restrictive configuration enabled.
<html:pre><Directory / >
Options None
AllowOverride None
Order allow,deny
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
The Web Server's root directory content should be protected from unauthorized access
by web clients.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_web_directory" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Web Directory</ns10:title>
<ns10:description xml:lang="en-US">
The default configuration for the web (<html:code>/var/www/html</html:code>) Directory allows directory
indexing (<html:code>Indexes</html:code>) and the following of symbolic links (<html:code>FollowSymLinks</html:code>).
Neither of these is recommended.
<html:br /><html:br />
The <html:code>/var/www/html</html:code> directory hierarchy should not be viewable via the web, and
symlinks should only be followed if the owner of the symlink also owns the linked file.
<html:br /><html:br />
Ensure that this policy is adhered to by altering the related section of the configuration:
<html:pre><Directory "/var/www/html">
# ...
Options SymLinksIfOwnerMatch
# ...
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Access to the web server's directory hierarchy could allow access to unauthorized files
by web clients. Following symbolic links could also allow such access.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_critical_directories" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Other Critical Directories</ns10:title>
<ns10:description xml:lang="en-US">
All accessible web directories should be configured with similarly restrictive settings.
The <html:code>Options</html:code> directive should be limited to necessary functionality and the <html:code>AllowOverride</html:code>
directive should be used only if needed. The <html:code>Order</html:code> and <html:code>Deny</html:code> access control tags
should be used to deny access by default, allowing access only where necessary.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Directories accessible from a web client should be configured with the least amount of
access possible in order to avoid unauthorized access to restricted content or server information.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_limit_available_methods" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Available Methods</ns10:title>
<ns10:description xml:lang="en-US">
Web server methods are defined in section 9 of RFC 2616 (<html:a href="http://www.ietf.org/rfc/rfc2616.txt">http://www.ietf.org/rfc/rfc2616.txt</html:a>).
If a web server does not require the implementation of all available methods,
they should be disabled.
<html:br /><html:br />
Note: <html:code>GET</html:code> and <html:code>POST</html:code> are the most common methods. A majority of the others
are limited to the WebDAV protocol.
<html:pre><Directory /var/www/html>
# ...
# Only allow specific methods (this command is case-sensitive!)
<LimitExcept GET POST>
Order allow,deny
</LimitExcept>
# ...
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of available methods to the web client reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_modules_improve_security">
<ns10:title xml:lang="en-US">Use Appropriate Modules to Improve httpd's Security</ns10:title>
<ns10:description xml:lang="en-US">
Among the modules available for <html:code>httpd</html:code> are several whose use may improve the
security of the web server installation. This section recommends and discusses
the deployment of security-relevant modules.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_deploy_mod_ssl">
<ns10:title xml:lang="en-US">Deploy mod_ssl</ns10:title>
<ns10:description xml:lang="en-US">
Because HTTP is a plain text protocol, all traffic is susceptible to passive
monitoring. If there is a need for confidentiality, SSL should be configured
and enabled to encrypt content.
<html:br /><html:br />
Note: <html:code>mod_nss</html:code> is a FIPS 140-2 certified alternative to <html:code>mod_ssl</html:code>.
The modules share a considerable amount of code and should be nearly identical
in functionality. If FIPS 140-2 validation is required, then <html:code>mod_nss</html:code> should
be used. If it provides some feature or its greater compatibility is required,
then <html:code>mod_ssl</html:code> should be used.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_install_mod_ssl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install mod_ssl</ns10:title>
<ns10:description xml:lang="en-US">
Install the <html:code>mod_ssl</html:code> module:
<html:pre>$ sudo yum install mod_ssl</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US"><html:code>mod_ssl</html:code> provides encryption capabilities for the <html:code>httpd</html:code> Web server. Unencrypted
content is transmitted in plain text which could be passively monitored and accessed by
unauthorized parties.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_deploy_mod_security">
<ns10:title xml:lang="en-US">Deploy mod_security</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>security</html:code> module provides an application level firewall for <html:code>httpd</html:code>.
Following its installation with the base ruleset, specific configuration advice can be found at
<html:a href="http://www.modsecurity.org/">http://www.modsecurity.org/</html:a> to design a policy that best matches the security needs of
the web applications. Usage of <html:code>mod_security</html:code> is highly recommended for some environments,
but it should be noted this module does not ship with Red Hat Enterprise Linux itself,
and instead is provided via Extra Packages for Enterprise Linux (EPEL).
For more information on EPEL please refer to <html:a href="http://fedoraproject.org/wiki/EPEL">http://fedoraproject.org/wiki/EPEL</html:a>.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_install_mod_security" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install mod_security</ns10:title>
<ns10:description xml:lang="en-US">
Install the <html:code>security</html:code> module:
<html:pre>$ sudo yum install mod_security</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US"><html:code>mod_security</html:code> provides an additional level of protection for the web server by
enabling the administrator to implement content access policies and filters at the
application layer.
</ns10:rationale>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_use_dos_protection_modules">
<ns10:title xml:lang="en-US">Use Denial-of-Service Protection Modules</ns10:title>
<ns10:description xml:lang="en-US">
Denial-of-service attacks are difficult to detect and prevent while maintaining
acceptable access to authorized users. However, some traffic-shaping
modules can be used to address the problem. Well-known DoS protection modules include:
<html:pre>mod_cband mod_bwshare mod_limitipconn mod_evasive</html:pre>
Denial-of-service prevention should be implemented for a web server if such a threat exists.
However, specific configuration details are very dependent on the environment and often best left
at the discretion of the administrator.
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_configure_php_securely">
<ns10:title xml:lang="en-US">Configure PHP Securely</ns10:title>
<ns10:description xml:lang="en-US">
PHP is a widely-used and often misconfigured server-side scripting language. It should
be used with caution, but configured appropriately when needed.
<html:br /><html:br />
Review <html:code>/etc/php.ini</html:code> and make the following changes if possible:
<html:pre># Do not expose PHP error messages to external users
display_errors = Off
# Enable safe mode
safe_mode = On
# Only allow access to executables in isolated directory
safe_mode_exec_dir = php-required-executables-path
# Limit external access to PHP environment
safe_mode_allowed_env_vars = PHP_
# Restrict PHP information leakage
expose_php = Off
# Log all errors
log_errors = On
# Do not register globals for input data
register_globals = Off
# Minimize allowable PHP post size
post_max_size = 1K
# Ensure PHP redirects appropriately
cgi.force_redirect = 0
# Disallow uploading unless necessary
file_uploads = Off
# Disallow treatment of file requests as fopen calls
allow_url_fopen = Off
# Enable SQL safe mode
sql.safe_mode = On
</html:pre>
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_configure_os_protect_web_server">
<ns10:title xml:lang="en-US">Configure Operating System to Protect Web Server</ns10:title>
<ns10:description xml:lang="en-US">
The following configuration steps should be taken on the machine which hosts the
web server, in order to provide as safe an environment as possible for the web server.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_restrict_file_dir_access">
<ns10:title xml:lang="en-US">Restrict File and Directory Access</ns10:title>
<ns10:description xml:lang="en-US">
Minimize access to critical <html:code>httpd</html:code> files and directories.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_var_log_httpd" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on the /var/log/httpd/ Directory</ns10:title>
<ns10:description xml:lang="en-US">
Ensure that the permissions on the web server log directory is set to 700:
<html:pre>$ sudo chmod 700 /var/log/httpd/</html:pre>
This is its default setting.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Access to the web server's log files may allow an unauthorized user or attacker
to access information about the web server or alter the server's log files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_var_log_httpd:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_etc_httpd_conf" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on the /etc/httpd/conf/ Directory</ns10:title>
<ns10:description xml:lang="en-US">
Set permissions on the web server configuration directory to 750:
<html:pre>$ sudo chmod 750 /etc/httpd/conf/</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Access to the web server's configuration files may allow an unauthorized user or attacker
to access information about the web server or alter the server's configuration files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_etc_httpd_conf:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_httpd_server_conf_files" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on All Configuration Files Inside /etc/httpd/conf/</ns10:title>
<ns10:description xml:lang="en-US">
Set permissions on the web server configuration files to 640:
<html:pre>$ sudo chmod 640 /etc/httpd/conf/*</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Access to the web server's configuration files may allow an unauthorized user or attacker
to access information about the web server or to alter the server's configuration files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_httpd_server_conf_files:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_configure_iptables">
<ns10:title xml:lang="en-US">Configure iptables to Allow Access to the Web Server</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>iptables</html:code>
blocks access to the ports used by the web server.
To configure <html:code>iptables</html:code> to allow port
80 traffic one must edit
<html:code>/etc/sysconfig/iptables</html:code> and
<html:code>/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG
and DROP lines for the INPUT chain:
<html:pre xml:space="preserve">-A INPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT</html:pre>
To configure <html:code>iptables</html:code> to allow port
443 traffic one must edit
<html:code>/etc/sysconfig/iptables</html:code> and
<html:code>/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG
and DROP lines for the INPUT chain:
<html:pre xml:space="preserve">-A INPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT</html:pre>
</ns10:description>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_httpd_chroot">
<ns10:title xml:lang="en-US">Run httpd in a chroot Jail if Practical</ns10:title>
<ns10:description xml:lang="en-US">
Running <html:code>httpd</html:code> inside a <html:code>chroot</html:code> jail is designed to isolate the
web server process to a small section of the filesystem, limiting the damage if
it is compromised. Versions of Apache greater than 2.2.10 (such as the one
included with Red Hat Enterprise Linux 6) provide the <html:code>ChrootDir</html:code> directive. To run Apache
inside a chroot jail in <html:code>/chroot/apache</html:code>, add the following line to
<html:code>/etc/httpd/conf/httpd.conf</html:code>: <html:pre>ChrootDir /chroot/apache</html:pre> This
necessitates placing all files required by <html:code>httpd</html:code> inside
<html:code>/chroot/apache</html:code> , including <html:code>httpd</html:code>'s binaries, modules,
configuration files, and served web pages. The details of this configuration
are beyond the scope of this guide. This may also require additional SELinux
configuration.
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_imap">
<ns10:title xml:lang="en-US">IMAP and POP3 Server</ns10:title>
<ns10:description xml:lang="en-US">Dovecot provides IMAP and POP3 services. It is not
installed by default. The project page at <html:a href="http://www.dovecot.org">http://www.dovecot.org</html:a>
contains more detailed information about Dovecot
configuration.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_dovecot">
<ns10:title xml:lang="en-US">Disable Dovecot</ns10:title>
<ns10:description xml:lang="en-US">If the system does not need to operate as an IMAP or
POP3 server, the dovecot software should be disabled and removed.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_dovecot_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Dovecot Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>dovecot</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig dovecot off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running an IMAP or POP3 server provides a network-based
avenue of attack, and should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_dovecot_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_dovecot_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service dovecot
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- dovecot
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_dovecot_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_dovecot_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall dovecot Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>dovecot</html:code> package can be uninstalled
with the following command:
<html:pre>$ sudo yum erase dovecot</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to make the Dovecot software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure dovecot is removed
package:
name="{{item}}"
state=absent
with_items:
- dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_dovecot
class remove_dovecot {
package { 'dovecot':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=dovecot
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dovecot_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dovecot_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_configure_dovecot">
<ns10:title xml:lang="en-US">Configure Dovecot if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If the system will operate as an IMAP or
POP3 server, the dovecot software should be configured securely by following
the recommendations below.
</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_dovecot_support_necessary_protocols">
<ns10:title xml:lang="en-US">Support Only the Necessary Protocols</ns10:title>
<ns10:description xml:lang="en-US">Dovecot supports the IMAP and POP3 protocols, as well as
SSL-protected versions of those protocols. Configure the Dovecot server
to support only the protocols needed by your site. Edit <html:code>/etc/dovecot/dovecot.conf</html:code>.
Add or correct the following lines, replacing <html:code>PROTOCOL</html:code> with
only the subset of protocols (<html:code>imap</html:code>, <html:code>imaps</html:code>,
<html:code>pop3</html:code>, <html:code>pop3s</html:code>) required:
<html:pre>protocols = PROTOCOL</html:pre>
If possible, require SSL protection for all transactions. The SSL
protocol variants listen on alternate ports (995 instead of 110 for
pop3s, and 993 instead of 143 for imaps), and require SSL-aware clients.
An alternate approach is to listen on the standard port and require the
client to use the STARTTLS command before authenticating.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Configuring Dovecot to only support the protocols the protocols needed by
your site reduces the risk of an attacker using one of the unused protocols
to base an attack.</ns10:rationale>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dovecot_enabling_ssl">
<ns10:title xml:lang="en-US">Enable SSL Support</ns10:title>
<ns10:description xml:lang="en-US">SSL should be used to encrypt network traffic between the
Dovecot server and its clients. Users must authenticate to the Dovecot
server in order to read their mail, and passwords should never be
transmitted in clear text. In addition, protecting mail as it is
downloaded is a privacy measure, and clients may use SSL certificates
to authenticate the server, preventing another system from impersonating
the server.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_enable_ssl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable the SSL flag in /etc/dovecot.conf</ns10:title>
<ns10:description xml:lang="en-US">To allow clients to make encrypted connections the <html:code>ssl</html:code>
flag in Dovecot's configuration file needs to be set to <html:code>yes</html:code>.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following line:
<html:pre>ssl = yes</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL encrypt network traffic between the Dovecot server and its clients
protecting user credentials, mail as it is downloaded, and clients may use
SSL certificates to authenticate the server, preventing another system from
impersonating the server.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dovecot_enable_ssl:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_cert" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Dovecot to Use the SSL Certificate file</ns10:title>
<ns10:description xml:lang="en-US">This option tells Dovecot where to find the the mail
server's SSL Certificate.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following
line (<html:i>note: the path below is the default path set by the Dovecot installation. If
you are using a different path, ensure you reference the appropriate file</html:i>):
<html:pre>ssl_cert = </etc/pki/dovecot/certs/dovecot.pem</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL certificates are used by the client to authenticate the identity
of the server, as well as to encrypt credentials and message traffic.
Not using SSL to encrypt mail server traffic could allow unauthorized
access to credentials and mail messages since they are sent in plain
text over the network.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_key" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Dovecot to Use the SSL Key file</ns10:title>
<ns10:description xml:lang="en-US">This option tells Dovecot where to find the the mail
server's SSL Key.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following
line (<html:i>note: the path below is the default path set by the Dovecot installation. If
you are using a different path, ensure you reference the appropriate file</html:i>):
<html:pre>ssl_key = </etc/pki/dovecot/private/dovecot.pem</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL certificates are used by the client to authenticate the identity
of the server, as well as to encrypt credentials and message traffic.
Not using SSL to encrypt mail server traffic could allow unauthorized
access to credentials and mail messages since they are sent in plain
text over the network.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_disable_plaintext_auth" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Plaintext Authentication</ns10:title>
<ns10:description xml:lang="en-US">To prevent Dovecot from attempting plaintext
authentication of clients, edit <html:code>/etc/dovecot/conf.d/10-auth.conf</html:code> and add
or correct the following line:
<html:pre>disable_plaintext_auth = yes</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Using plain text authentication to the mail server could allow an
attacker access to credentials by monitoring network traffic.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dovecot_disable_plaintext_auth:def:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_dovecot_allow_imap_access">
<ns10:title xml:lang="en-US">Allow IMAP Clients to Access the Server</ns10:title>
<ns10:description xml:lang="en-US">The default iptables configuration does not allow inbound
access to any services. This modification will allow remote hosts to
initiate connections to the IMAP daemon, while keeping all other ports
on the server in their default protected state.
To configure <html:code>iptables</html:code> to allow port
143 traffic one must edit
<html:code>/etc/sysconfig/iptables</html:code> and
<html:code>/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG
and DROP lines for the INPUT chain:
<html:pre xml:space="preserve">-A INPUT -m state --state NEW -p tcp --dport 143 -j ACCEPT</html:pre>
</ns10:description>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_smb">
<ns10:title xml:lang="en-US">Samba(SMB) Microsoft Windows File Sharing Server</ns10:title>
<ns10:description xml:lang="en-US">When properly configured, the Samba service allows
Linux machines to provide file and print sharing to Microsoft
Windows machines. There are two software packages that provide
Samba support. The first, <html:code>samba-client</html:code>, provides a series of
command line tools that enable a client machine to access Samba
shares. The second, simply labeled <html:code>samba</html:code>, provides the Samba
service. It is this second package that allows a Linux machine to
act as an Active Directory server, a domain controller, or as a
domain member. Only the <html:code>samba-client</html:code> package is installed by
default.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_samba">
<ns10:title xml:lang="en-US">Disable Samba if Possible</ns10:title>
<ns10:description xml:lang="en-US">
Even after the Samba server package has been installed, it
will remain disabled. Do not enable this service unless it is
absolutely necessary to provide Microsoft Windows file and print
sharing functionality.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_smb_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Samba</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>smb</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig smb off</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running a Samba server provides a network-based avenue of attack, and
should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_smb_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable smb
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_smb_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service smb
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- smb
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_smb_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_smb_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_samba_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall samba Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>samba</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase samba</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to mount directories and file systems to
Windows systems, then this service can be deleted to reduce
the potential attack surface.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove samba
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure samba is removed
package:
name="{{item}}"
state=absent
with_items:
- samba
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_samba
class remove_samba {
package { 'samba':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=samba
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_samba_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_samba_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_configuring_samba">
<ns10:title xml:lang="en-US">Configure Samba if Necessary</ns10:title>
<ns10:description xml:lang="en-US">All settings for the Samba daemon can be found in
<html:code>/etc/samba/smb.conf</html:code>. Settings are divided between a
<html:code>[global]</html:code> configuration section and a series of user
created share definition sections meant to describe file or print
shares on the system. By default, Samba will operate in user mode
and allow client machines to access local home directories and
printers. It is recommended that these settings be changed or that
additional limitations be set in place.</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_samba-common_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the Samba Common Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>samba-common</html:code> package should be installed.
The <html:code>samba-common</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install samba-common</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If the samba-common package is not installed, samba cannot be configured.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install samba-common
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure samba-common is installed
package:
name="{{item}}"
state=present
with_items:
- samba-common
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_samba-common
class install_samba-common {
package { 'samba-common':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=samba-common
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_samba-common_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_samba-common_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_smb_restrict_file_sharing">
<ns10:title xml:lang="en-US">Restrict SMB File Sharing to Configured Networks</ns10:title>
<ns10:description xml:lang="en-US">Only users with local user accounts will be able to log in to
Samba shares by default. Shares can be limited to particular users or network
addresses. Use the <html:code>hosts allow</html:code> and <html:code>hosts deny</html:code> directives
accordingly, and consider setting the valid users directive to a limited subset
of users or to a group of users. Separate each address, user, or user group
with a space as follows for a particular <html:i>share</html:i> or global:
<html:pre>[<html:i>share</html:i>]
hosts allow = 192.168.1. 127.0.0.1
valid users = userone usertwo @usergroup</html:pre>
It is also possible to limit read and write access to particular users with the
read list and write list options, though the permissions set by the system
itself will override these settings. Set the read only attribute for each share
to ensure that global settings will not accidentally override the individual
share settings. Then, as with the valid users directive, separate each user or
group of users with a space:
<html:pre>[<html:i>share</html:i>]
read only = yes
write list = userone usertwo @usergroup</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">The Samba service is only required for sharing files and printers
with Microsoft Windows workstations, and even then, other options may exist.
</ns10:rationale>
</ns10:Group>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_smb_server_disable_root" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Root Access to SMB Shares</ns10:title>
<ns10:description xml:lang="en-US">Administrators should not use administrator accounts to access
Samba file and printer shares. Disable the root user and the wheel
administrator group:
<html:pre>[<html:i>share</html:i>]
invalid users = root @wheel</html:pre>
If administrator accounts cannot be disabled, ensure that local machine
passwords and Samba service passwords do not match.</ns10:description>
<ns10:rationale xml:lang="en-US">
Typically, administrator access is required when Samba must create user and
machine accounts and shares. Domain member servers and standalone servers may
not need administrator access at all. If that is the case, add the invalid
users parameter to <html:code>[global]</html:code> instead.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Require Client SMB Packet Signing, if using smbclient</ns10:title>
<ns10:description xml:lang="en-US">
To require samba clients running <html:code>smbclient</html:code> to use
packet signing, add the following to the <html:code>[global]</html:code> section
of the Samba configuration file, <html:code>/etc/samba/smb.conf</html:code>:
<html:pre>client signing = mandatory</html:pre>
Requiring samba clients such as <html:code>smbclient</html:code> to use packet
signing ensures they can
only communicate with servers that support packet signing.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Packet signing can prevent
man-in-the-middle attacks which modify SMB packets in
transit.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="require_smb_client_signing" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">######################################################################
#By Luke "Brisk-OH" Brisk
#luke.brisk@boeing.com or luke.brisk@gmail.com
######################################################################
CLIENTSIGNING=$( grep -ic 'client signing' /etc/samba/smb.conf )
if [ "$CLIENTSIGNING" -eq 0 ]; then
# Add to global section
sed -i 's/\[global\]/\[global\]\n\n\tclient signing = mandatory/g' /etc/samba/smb.conf
else
sed -i 's/[[:blank:]]*client[[:blank:]]signing[[:blank:]]*=[[:blank:]]*no/ client signing = mandatory/g' /etc/samba/smb.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-require_smb_client_signing:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-require_smb_client_signing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Require Client SMB Packet Signing, if using mount.cifs</ns10:title>
<ns10:description xml:lang="en-US">Require packet signing of clients who mount Samba
shares using the <html:code>mount.cifs</html:code> program (e.g., those who specify shares
in <html:code>/etc/fstab</html:code>). To do so, ensure signing options (either
<html:code>sec=krb5i</html:code> or <html:code>sec=ntlmv2i</html:code>) are used.
<html:br /><html:br />
See the <html:code>mount.cifs(8)</html:code> man page for more information. A Samba
client should only communicate with servers who can support SMB
packet signing.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Packet signing can prevent man-in-the-middle
attacks which modify SMB packets in transit.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_smb_client_signing:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_smb_client_signing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Group id="xccdf_org.ssgproject.content_group_smb_disable_printing">
<ns10:title xml:lang="en-US">Restrict Printer Sharing</ns10:title>
<ns10:description xml:lang="en-US">By default, Samba utilizes the CUPS printing service to enable
printer sharing with Microsoft Windows workstations. If there are no printers
on the local machine, or if printer sharing with Microsoft Windows is not
required, disable the printer sharing capability by commenting out the
following lines, found in <html:code>/etc/samba/smb.conf</html:code>:
<html:pre>[global]
load printers = yes
cups options = raw
[printers]
comment = All Printers
path = /usr/spool/samba
browseable = no
guest ok = no
writable = no
printable = yes</html:pre>
There may be other options present, but these are the only options enabled and
uncommented by default. Removing the <html:code>[printers]</html:code> share should be enough
for most users. If the Samba printer sharing capability is needed, consider
disabling the Samba network browsing capability or restricting access to a
particular set of users or network addresses. Set the <html:code>valid users</html:code>
parameter to a small subset of users or restrict it to a particular group of
users with the shorthand <html:code>@</html:code>. Separate each user or group of users with
a space. For example, under the <html:code>[printers]</html:code> share:
<html:pre>[printers]
valid users = user @printerusers</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">The Samba service is only required for sharing files and printers
with Microsoft Windows workstations, and even then, other options may exist. Do
not use the Samba service to share files between Unix or Linux machines.
</ns10:rationale>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_proxy">
<ns10:title xml:lang="en-US">Proxy Server</ns10:title>
<ns10:description xml:lang="en-US">A proxy server is a very desirable target for a
potential adversary because much (or all) sensitive data for a
given infrastructure may flow through it. Therefore, if one is
required, the machine acting as a proxy server should be dedicated
to that purpose alone and be stored in a physically secure
location. The system's default proxy server software is Squid, and
provided in an RPM package of the same name.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_squid">
<ns10:title xml:lang="en-US">Disable Squid if Possible</ns10:title>
<ns10:description xml:lang="en-US">If Squid was installed and activated, but the system
does not need to act as a proxy server, then it should be disabled
and removed.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_squid_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Squid</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>squid</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig squid off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running proxy server software provides a network-based avenue
of attack, and should be removed if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_squid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable squid
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_squid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service squid
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- squid
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_squid_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_squid_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall squid Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>squid</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase squid</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to make the proxy server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_squid_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_squid_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_snmp">
<ns10:title xml:lang="en-US">SNMP Server</ns10:title>
<ns10:description xml:lang="en-US">The Simple Network Management Protocol allows
administrators to monitor the state of network devices, including
computers. Older versions of SNMP were well-known for weak
security, such as plaintext transmission of the community string
(used for authentication) and usage of easily-guessable
choices for the community string.</ns10:description>
<ns10:Group id="xccdf_org.ssgproject.content_group_disabling_snmp_service">
<ns10:title xml:lang="en-US">Disable SNMP Server if Possible</ns10:title>
<ns10:description xml:lang="en-US">The system includes an SNMP daemon that allows for its remote
monitoring, though it not installed by default. If it was installed and
activated but is not needed, the software should be disabled and removed.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_snmpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable snmpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>snmpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig snmpd off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running SNMP software provides a network-based avenue of attack, and
should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_snmpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable snmpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_snmpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service snmpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- snmpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_snmpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_snmpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall net-snmp Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>net-snmp</html:code> package provides the snmpd service.
The <html:code>net-snmp</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase net-snmp</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to run SNMP server software,
removing the package provides a safeguard against its
activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove net-snmp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure net-snmp is removed
package:
name="{{item}}"
state=absent
with_items:
- net-snmp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_net-snmp
class remove_net-snmp {
package { 'net-snmp':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=net-snmp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_net-snmp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_net-snmp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
<ns10:Group id="xccdf_org.ssgproject.content_group_snmp_configure_server">
<ns10:title xml:lang="en-US">Configure SNMP Server if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If it is necessary to run the snmpd agent on the system, some best
practices should be followed to minimize the security risk from the
installation. The multiple security models implemented by SNMP cannot be fully
covered here so only the following general configuration advice can be offered:
<html:ul><html:li>use only SNMP version 3 security models and enable the use of authentication and encryption</html:li><html:li>write access to the MIB (Management Information Base) should be allowed only if necessary</html:li><html:li>all access to the MIB should be restricted following a principle of least privilege</html:li><html:li>network access should be limited to the maximum extent possible including restricting to expected network
addresses both in the configuration files and in the system firewall rules</html:li><html:li>ensure SNMP agents send traps only to, and accept SNMP queries only from, authorized management
stations</html:li><html:li>ensure that permissions on the <html:code>snmpd.conf</html:code> configuration file (by default, in <html:code>/etc/snmp</html:code>) are 640 or more restrictive</html:li><html:li>ensure that any MIB files' permissions are also 640 or more restrictive</html:li></html:ul>
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SNMP Service to Use Only SNMPv3 or Newer </ns10:title>
<ns10:description xml:lang="en-US">
Edit <html:code>/etc/snmp/snmpd.conf</html:code>, removing any references to <html:code>rocommunity</html:code>, <html:code>rwcommunity</html:code>, or <html:code>com2sec</html:code>.
Upon doing that, restart the SNMP service:
<html:pre>$ sudo service snmpd restart</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Earlier versions of SNMP are considered insecure, as they potentially allow
unauthorized access to detailed system management information.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-snmpd_use_newer_protocol:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-snmpd_use_newer_protocol_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_snmpd_not_default_password" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Default Password Is Not Used</ns10:title>
<ns10:description xml:lang="en-US">
Edit <html:code>/etc/snmp/snmpd.conf</html:code>, remove default community string <html:code>public</html:code>.
Upon doing that, restart the SNMP service:
<html:pre>$ sudo service snmpd restart</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Presence of the default SNMP password enables querying of different system
aspects and could result in unauthorized knowledge of the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-snmpd_not_default_password:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-snmpd_not_default_password_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
<ns10:Group hidden="true" id="xccdf_org.ssgproject.content_group_srg_support">
<ns10:title xml:lang="en-US">Documentation to Support DISA OS SRG Mapping</ns10:title>
<ns10:description xml:lang="en-US">These groups exist to document how the Red Hat Enterprise Linux
product meets (or does not meet) requirements listed in the DISA OS SRG, for
those cases where Groups or Rules elsewhere in scap-security-guide do
not clearly relate.
</ns10:description>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_generic" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">42</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">56</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">206</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1084</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">86</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">185</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">223</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">171</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">172</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1694</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">162</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">163</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">164</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">345</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">346</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1096</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1111</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1291</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">156</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">186</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1083</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1082</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1090</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1127</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1128</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1129</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1248</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1265</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1362</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1368</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1310</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1328</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1399</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1400</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1427</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1632</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1693</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1665</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1674</ns10:reference>
<ns10:rationale xml:lang="en-US">
Red Hat Enterprise Linux meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_generic_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_auditing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">131</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">132</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">133</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">134</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">135</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">159</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">174</ns10:reference>
<ns10:rationale xml:lang="en-US">
The Red Hat Enterprise Linux audit system meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_auditing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_nonselected" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">34</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">35</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">99</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">154</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">226</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">802</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">872</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1086</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1087</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1089</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1091</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1424</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1426</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1428</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1209</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1214</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1237</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1269</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1338</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1425</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1670</ns10:reference>
<ns10:rationale xml:lang="en-US">
Red Hat Enterprise Linux meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_nonselected_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_nonfinding_nonselected_scope" selected="false" severity="low">
<ns10:title xml:lang="en-US">Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is NA. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">21</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">25</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">28</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">29</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">30</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">165</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">221</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">354</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">553</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">779</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">780</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">781</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1009</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1094</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1123</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1124</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1125</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1132</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1135</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1141</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1142</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1143</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1145</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1147</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1148</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1166</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1339</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1340</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1341</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1350</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1356</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1373</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1383</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1391</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1392</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1395</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1662</ns10:reference>
<ns10:rationale xml:lang="en-US">
The guidance does not meet this requirement.
The requirement is impractical or out of scope.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_nonfinding_nonselected_scope_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_finding_nonselected" selected="false" severity="low">
<ns10:title xml:lang="en-US">Implementation of the Requirement is Not Supported</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent finding and cannot be fixed. An appropriate
mitigation for the system must be implemented but this finding cannot be
considered fixed.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">20</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">31</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">52</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">144</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1158</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1294</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1295</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1500</ns10:reference>
<ns10:rationale xml:lang="en-US">
RHEL6 does not support this requirement.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_finding_nonselected_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_nonfinding_scope" selected="false" severity="low">
<ns10:title xml:lang="en-US">Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is NA. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">15</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">27</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">218</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">219</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">371</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">372</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">535</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">537</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">539</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1682</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">370</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">37</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">24</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1112</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1126</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1143</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1149</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1159</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1210</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1211</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1274</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1372</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1376</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1377</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1401</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1555</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1556</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1150</ns10:reference>
<ns10:rationale xml:lang="en-US">
The guidance does not meet this requirement.
The requirement is impractical or out of scope.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_nonfinding_scope_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_update_process" selected="false" severity="low">
<ns10:title xml:lang="en-US">A process for prompt installation of OS updates must exist.</ns10:title>
<ns10:description xml:lang="en-US">
Procedures to promptly apply software updates must be established and
executed. The Red Hat operating system provides support for automating such a
process, by running the yum program through a cron job or by managing the
system and its packages through the Red Hat Network or a Satellite Server.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1232</ns10:reference>
<ns10:rationale xml:lang="en-US">
This is a manual inquiry about update procedure.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-update_process_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_output--ssg-rhel6-oval.xml" timestamp="2017-08-11T21:23:31">
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<ns3:generator>
<ns5:product_name>python</ns5:product_name>
<ns5:product_version>2.7.13+</ns5:product_version>
<ns5:schema_version>5.11</ns5:schema_version>
<ns5:timestamp>2017-08-11T21:23:24</ns5:timestamp>
</ns3:generator>
<ns3:definitions>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_groupownership:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All syslog log files should be owned by the appropriate group.</ns3:description>
<ns3:reference ref_id="rsyslog_files_groupownership" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if all system log files are owned by root group" test_ref="oval:ssg-test_rsyslog_files_groupownership:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_ownership:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All syslog log files should be owned by the appropriate user.</ns3:description>
<ns3:reference ref_id="rsyslog_files_ownership" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if all system log files are owned by root user" test_ref="oval:ssg-test_rsyslog_files_ownership:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_files_permissions:def:1" version="1">
<ns3:metadata>
<ns3:title>Confirm Existence and Permissions of System Log Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for all syslog log files should be set correctly.</ns3:description>
<ns3:reference ref_id="rsyslog_files_permissions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check permissions of all system log files" test_ref="oval:ssg-test_rsyslog_files_permissions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_dcredit:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password dcredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password dcredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_dcredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib dcredit" test_ref="oval:ssg-test_password_pam_cracklib_dcredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_difok:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password difok Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password difok should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_difok" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib difok" test_ref="oval:ssg-test_password_pam_cracklib_difok:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_lcredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password lcredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password lcredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_lcredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib lcredit" test_ref="oval:ssg-test_password_pam_cracklib_lcredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_maxrepeat:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password maxrepeat Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password maxrepeat should meet minimum
requirements using pam_pwquality</ns3:description>
<ns3:reference ref_id="accounts_password_pam_maxrepeat" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib maxrepeat" test_ref="oval:ssg-test_password_pam_cracklib_maxrepeat:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_minclass:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password minclass Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password minclass should meet the minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_minclass" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib minclass" test_ref="oval:ssg-test_password_pam_cracklib_minclass:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_minlen:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password minlen Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password minlen should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_minlen" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib" test_ref="oval:ssg-test_password_pam_minlen:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_ocredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password ocredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password ocredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_ocredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib ocredit" test_ref="oval:ssg-test_password_pam_cracklib_ocredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_retry:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password retry Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password retry should meet minimum
requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_retry" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib" test_ref="oval:ssg-test_password_pam_cracklib_retry:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_ucredit:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Password ucredit Requirements</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password ucredit should meet minimum requirements</ns3:description>
<ns3:reference ref_id="accounts_password_pam_ucredit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="rhel6 pam_cracklib ucredit" test_ref="oval:ssg-test_password_pam_cracklib_ucredit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chmod:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - chmod</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_chmod" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification chmod x32" test_ref="oval:ssg-test_audit_rules_dac_modification_chmod_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification chmod x64" test_ref="oval:ssg-test_audit_rules_dac_modification_chmod_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_chown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - chown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_chown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification chown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_chown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification chown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_chown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmod:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchmod</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchmod" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchmod x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmod_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchmod x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmod_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchmodat</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchmodat" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchmodat x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmodat_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchmodat x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchmodat_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fchownat:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fchownat</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fchownat" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fchownat x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fchownat_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fchownat x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fchownat_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fremovexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fremovexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fremovexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fremovexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - fsetxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_fsetxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification fsetxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification fsetxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lchown:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lchown</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lchown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lchown x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lchown_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lchown x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lchown_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lremovexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lremovexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lremovexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lremovexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - lsetxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_lsetxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification lsetxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification lsetxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_removexattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - removexattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_removexattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification removexattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_removexattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification removexattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_removexattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_dac_modification_setxattr:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Discretionary Access Control Modification Events - setxattr</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The changing of file permissions and attributes should be
audited.</ns3:description>
<ns3:reference ref_id="audit_rules_dac_modification_setxattr" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="dac modification setxattr x32" test_ref="oval:ssg-test_audit_rules_dac_modification_setxattr_x32:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="x64?" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criterion comment="dac modification setxattr x64" test_ref="oval:ssg-test_audit_rules_dac_modification_setxattr_x64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_file_deletion_events:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit File Deletion Events</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit files deletion events.</ns3:description>
<ns3:reference ref_id="audit_rules_file_deletion_events" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit file delete" test_ref="oval:ssg-test_audit_rules_file_deletion_events:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_immutable:def:1" version="1">
<ns3:metadata>
<ns3:title>Make Audit Configuration Immutable</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Force a reboot to change audit rules is
enabled</ns3:description>
<ns3:reference ref_id="audit_rules_immutable" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="immutable" test_ref="oval:ssg-test_audit_rules_immutable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_kernel_module_loading:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit Kernel Module Loading and Unloading</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The audit rules should be configured to log information about kernel module loading and unloading.</ns3:description>
<ns3:reference ref_id="audit_rules_kernel_module_loading" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="audit insmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_insmod:tst:1" />
<ns3:criterion comment="audit rmmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_rmmod:tst:1" />
<ns3:criterion comment="audit rmmod" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_modprobe:tst:1" />
<ns3:criterion comment="audit module syscalls" test_ref="oval:ssg-test_audit_rule_kernel_module_loading_syscall:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_login_events:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Login and Logout Events</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should be configured to log successful and unsuccessful login and logout events.</ns3:description>
<ns3:reference ref_id="audit_rules_login_events" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="tallylog" test_ref="oval:ssg-test_audit_rules_login_events_tallylog:tst:1" />
<ns3:criterion comment="faillock" test_ref="oval:ssg-test_audit_rules_login_events_faillock:tst:1" />
<ns3:criterion comment="lastlog" test_ref="oval:ssg-test_audit_rules_login_events_lastlog:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_mac_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Events that Modify the System's Mandatory Access Controls</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules that detect changes to the system's mandatory access controls (SELinux) are enabled.</ns3:description>
<ns3:reference ref_id="audit_rules_mac_modification" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit changes selinux" test_ref="oval:ssg-test_audit_rules_mac_modification:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_media_export:def:1" version="1">
<ns3:metadata>
<ns3:title>Audit Information Export To Media</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules that detect the mounting of filesystems should be enabled.</ns3:description>
<ns3:reference ref_id="audit_rules_media_export" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit mount" test_ref="oval:ssg-test_audit_rules_media_export:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_networkconfig_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Events that Modify the System's Network Environment</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The network environment should not be modified by anything other than
administrator action. Any change to network parameters should be audited.</ns3:description>
<ns3:reference ref_id="audit_rules_networkconfig_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="network modification syscall" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_syscall:tst:1" />
<ns3:criterion comment="/etc/issue modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue:tst:1" />
<ns3:criterion comment="/etc/issue.net modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue_net:tst:1" />
<ns3:criterion comment="/etc/hosts modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_hosts:tst:1" />
<ns3:criterion comment="/etc/sysconfig/network modification" test_ref="oval:ssg-test_audit_rules_networkconfig_modification_etc_sysconfig_network:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_privileged_commands:def:1" version="3">
<ns3:metadata>
<ns3:title>
Ensure auditd Collects Information on the Use of Privileged Commands
</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules about the Information on the Use of Privileged
Commands are enabled</ns3:description>
<ns3:reference ref_id="audit_rules_privileged_commands" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/etc/audit/audit.rules contains -a always,exit -F path=path_to_binary -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged for each setuid or setgid executable on the system" test_ref="oval:ssg-test_audit_rules_privileged_commands:tst:1" />
<ns3:criterion comment="check if count of privileged commands on the system matches the count of defined audit.rules in the expected form" test_ref="oval:ssg-test_sets_dimension_match:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_session_events:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Process and Session Initiation Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should capture information about session initiation.</ns3:description>
<ns3:reference ref_id="audit_rules_session_events" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="utmp" test_ref="oval:ssg-test_audit_rules_session_events_utmp:tst:1" />
<ns3:criterion comment="btmp" test_ref="oval:ssg-test_audit_rules_session_events_btmp:tst:1" />
<ns3:criterion comment="wtmp" test_ref="oval:ssg-test_audit_rules_session_events_wtmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_sysadmin_actions:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit System Administrator Actions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit actions taken by system administrators on the system.</ns3:description>
<ns3:reference ref_id="audit_rules_sysadmin_actions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="audit sudoers" test_ref="oval:ssg-test_audit_rules_sysadmin_actions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_adjtimex:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Adjtimex</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through adjtimex.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_adjtimex" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line adjtimex and key present" test_ref="oval:ssg-test_audit_rules_time_adjtimex_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for adjtimex and key present" test_ref="oval:ssg-test_audit_rules_time_adjtimex_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_clock_settime:def:1" version="2">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Clock_settime</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through clock_settime.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_clock_settime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line clock_settime and key present" test_ref="oval:ssg-test_audit_rules_time_clock_settime_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for clock_settime and key present" test_ref="oval:ssg-test_audit_rules_time_clock_settime_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_settimeofday:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Settimeofday</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through settimeofday.
</ns3:description>
<ns3:reference ref_id="audit_rules_time_settimeofday" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for either..." operator="OR">
<ns3:criteria comment="both..." operator="AND">
<ns3:extend_definition comment="32bit and ..." definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:criterion comment="32bit line settimeofday and key present" test_ref="oval:ssg-test_audit_rules_time_settimeofday_x86:tst:1" />
</ns3:criteria>
<ns3:criteria comment="both ..." operator="AND">
<ns3:extend_definition comment="64bit and ..." definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
<ns3:criterion comment="64bit line for settimeofday and key present" test_ref="oval:ssg-test_audit_rules_time_settimeofday_x86_64:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_stime:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through Stime</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through stime. Note that on
64-bit architectures the stime system call is not defined in the audit
system calls lookup table.</ns3:description>
<ns3:reference ref_id="audit_rules_time_stime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="32-bit or 64-bit system and 32-bit arch stime line and key present" operator="AND">
<ns3:criteria comment="32-bit or 64-bit system" operator="OR">
<ns3:extend_definition comment="32-bit system" definition_ref="oval:ssg-system_info_architecture_x86:def:1" />
<ns3:extend_definition comment="64-bit system" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" />
</ns3:criteria>
<ns3:criterion comment="32-bit arch stime line and key present" test_ref="oval:ssg-test_audit_rules_time_stime_x86:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_time_watch_localtime:def:1" version="1">
<ns3:metadata>
<ns3:title>Record Attempts to Alter Time Through the Localtime File</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Record attempts to alter time through /etc/localtime
</ns3:description>
<ns3:reference ref_id="audit_rules_time_watch_localtime" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for localtime file being watched">
<ns3:criterion comment="watch localtime file" test_ref="oval:ssg-test_audit_rules_time_watch_localtime:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_unsuccessful_file_modification:def:1" version="3">
<ns3:metadata>
<ns3:title>Ensure auditd Collects Unauthorized Access Attempts to
Files (unsuccessful)</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled</ns3:description>
<ns3:reference ref_id="audit_rules_unsuccessful_file_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="32-bit audit file eacces" test_ref="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" />
<ns3:criterion comment="32-bit audit file eperm" test_ref="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" />
<ns3:criteria operator="OR">
<ns3:extend_definition comment="64-bit" definition_ref="oval:ssg-system_info_architecture_64bit:def:1" negate="true" />
<ns3:criteria operator="AND">
<ns3:criterion comment="64-bit audit file eacces" test_ref="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" />
<ns3:criterion comment="64-bit audit file eperm" test_ref="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-audit_rules_usergroup_modification:def:1" version="2">
<ns3:metadata>
<ns3:title>Audit User/Group Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit rules should detect modification to system files that hold information about users and groups.</ns3:description>
<ns3:reference ref_id="audit_rules_usergroup_modification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="audit /etc/group" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_group:tst:1" />
<ns3:criterion comment="audit /etc/passwd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd:tst:1" />
<ns3:criterion comment="audit /etc/gshadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow:tst:1" />
<ns3:criterion comment="audit /etc/shadow" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow:tst:1" />
<ns3:criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_check_ttl:def:1" version="1">
<ns3:metadata>
<ns3:title>Check Avahi Responses' to TTL Field</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Check that Avahi is ignoring packets
unless the TTL field is 255.
</ns3:description>
<ns3:reference ref_id="avahi_check_ttl" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check Avahi TTL setting" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Avahi TTL setting is enabled" test_ref="oval:ssg-test_avahi_ttl_setting:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_disable_publishing:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Avahi Publishing</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable Avahi from publishing records.</ns3:description>
<ns3:reference ref_id="avahi_disable_publishing" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Disable Avahi Publishing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Avahi publishing is disabled" test_ref="oval:ssg-test_avahi_disable_publishing:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_ip_only:def:1" version="1">
<ns3:metadata>
<ns3:title>Serve Avahi Only via Required Protocol</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require Avahi to run on IPv4 or IPv6.</ns3:description>
<ns3:reference ref_id="avahi_ip_only" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check Avahi IPv4 and IPv6 settings" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criteria comment="Test that Avahi IPv4 is enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is enabled" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is disabled" negate="true" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
<ns3:criteria comment="Test that Avahi IPv6 is enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is disabled" negate="true" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is enabled" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
<ns3:criteria comment="Test that Avahi IPv4 and IPv6 are enabled" operator="AND">
<ns3:criterion comment="Avahi IPv4 setting is enabled" test_ref="oval:ssg-test_avahi_ipv4_setting:tst:1" />
<ns3:criterion comment="Avahi IPv6 setting is enabled" test_ref="oval:ssg-test_avahi_ipv6_setting:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_prevent_port_sharing:def:1" version="1">
<ns3:metadata>
<ns3:title>Prevent Other Programs from using Avahi's Port</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Ensures that only Avahi is responsible for mDNS
traffic coming from the port on the system.
</ns3:description>
<ns3:reference ref_id="avahi_prevent_port_sharing" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Prevent Avahi Port Sharing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criterion comment="Prevent Avahi Port Sharing" test_ref="oval:ssg-test_avahi_port_sharing:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-avahi_restrict_published_information:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Information Published by Avahi</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevent user applications from using Avahi
to publish services.
</ns3:description>
<ns3:reference ref_id="avahi_restrict_published_information" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Restrict Avahi Publishing" operator="OR">
<ns3:extend_definition comment="avahi package is not installed" definition_ref="oval:ssg-package_avahi_installed:def:1" negate="true" />
<ns3:criteria comment="Test that Avahi publishing information is disabled" operator="AND">
<ns3:criterion comment="Avahi user publishing information is disabled" test_ref="oval:ssg-test_avahi_restrict_user_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Address Publishing" test_ref="oval:ssg-test_avahi_restrict_address_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict HW Publishing" test_ref="oval:ssg-test_avahi_restrict_CPU_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Workstation Publishing" test_ref="oval:ssg-test_avahi_restrict_workstation_publishing:tst:1" />
<ns3:criterion comment="Avahi Restrict Domain Publishing" test_ref="oval:ssg-test_avahi_restrict_domain_publishing:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_audit_argument:def:1" version="3">
<ns3:metadata>
<ns3:title>Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument audit=1 in the kernel line in /etc/grub.conf.</ns3:description>
<ns3:reference ref_id="bootloader_audit_argument" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="check for audit=1 in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_audit_argument:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_nousb_argument:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Kernel Support for USB via Bootloader Configuration</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument "nousb" in the kernel line in /etc/grub.conf</ns3:description>
<ns3:reference ref_id="bootloader_nousb_argument" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="look for argument 'nousb' in the kernel line in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_nousb_argument:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-bootloader_password:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Boot Loader Password</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub boot loader should have password protection enabled.</ns3:description>
<ns3:reference ref_id="bootloader_password" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="make sure a password is defined in /etc/grub.conf" test_ref="oval:ssg-test_bootloader_password:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_client_restrict_options:def:1" version="1">
<ns3:metadata>
<ns3:title>Minimize DHCP Client Configured Options</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the options that the DHCP gets
and applies to the DHCP client.</ns3:description>
<ns3:reference ref_id="dhcp_client_restrict_options" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="Minimize DHCP client configured options" operator="AND">
<ns3:criterion comment="Check domain-name in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_domain-named:tst:1" />
<ns3:criterion comment="Check domain-name-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_domain-name-servers:tst:1" />
<ns3:criterion comment="Check nis-domain in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_nis-domain:tst:1" />
<ns3:criterion comment="Check nis-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_nis-servers:tst:1" />
<ns3:criterion comment="Check ntp-servers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_ntp-servers:tst:1" />
<ns3:criterion comment="Check routers in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_routers:tst:1" />
<ns3:criterion comment="Check time-offset in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_time-offset:tst:1" />
<ns3:criterion comment="Check subnet-mask in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_subnet-mask:tst:1" />
<ns3:criterion comment="Check broadcast-address in each dhclient .conf files" test_ref="oval:ssg-test_dhcp_client_broadcast-address:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_configure_logging:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure DHCP Logging</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure rsyslog to record
DHCP daemon errors.</ns3:description>
<ns3:reference ref_id="dhcp_server_configure_logging" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check for daemon in /etc/rsyslog.conf" test_ref="oval:ssg-test_dhcp_server_configure_logging:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_deny_bootp:def:1" version="1">
<ns3:metadata>
<ns3:title>Deny BOOTP Requests</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents the DHCP from responding to
BOOTP requests.</ns3:description>
<ns3:reference ref_id="dhcp_server_deny_bootp" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check bootp /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_disable_bootp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_deny_decline:def:1" version="1">
<ns3:metadata>
<ns3:title>Deny Decline Messages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents the DHCP from responding to the
DHCPDECLINE messages.</ns3:description>
<ns3:reference ref_id="dhcp_server_deny_decline" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check deny declines /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_deny_declines:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_disable_ddns:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Dynamic DNS</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Prevents DHCP from publishing information
about their clients using Dynamic DNS.</ns3:description>
<ns3:reference ref_id="dhcp_server_disable_ddns" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criterion comment="Check ddns-update-style in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_server_disable_ddns:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dhcp_server_minimize_served_info:def:1" version="1">
<ns3:metadata>
<ns3:title>Minimize Served DHCP Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limits the amount of information that
that the DHCP server provides to clients.</ns3:description>
<ns3:reference ref_id="dhcp_server_minimize_served_info" source="ssg" /></ns3:metadata>
<ns3:criteria comment="DHCP is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="dhcp package is not installed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="Minimize DHCP served info" operator="AND">
<ns3:criterion comment="Check domain-name in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_domain-named_info:tst:1" />
<ns3:criterion comment="Check domain-name-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_domain-name-servers_info:tst:1" />
<ns3:criterion comment="Check nis-domain in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_nis-domain_info:tst:1" />
<ns3:criterion comment="Check nis-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_nis-servers_info:tst:1" />
<ns3:criterion comment="Check ntp-servers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_ntp-servers_info:tst:1" />
<ns3:criterion comment="Check routers in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_routers_info:tst:1" />
<ns3:criterion comment="Check time-offset in /etc/dhcp/dhcpd.conf" test_ref="oval:ssg-test_dhcp_time-offset_info:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_world_writable_system_owned:def:1" version="1">
<ns3:metadata>
<ns3:title>Find world writable directories not owned by a system account</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All world writable directories should be owned by a system user.</ns3:description>
<ns3:reference ref_id="dir_perms_world_writable_system_owned" source="ssg" /></ns3:metadata>
<ns3:criteria comment="check for local directories that are world writable and have uid greater than or equal to 500" negate="true">
<ns3:criterion comment="check for local directories that are world writable and have uid greater than or equal to 500" test_ref="oval:ssg-test_dir_world_writable_uid_gt_500:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_ctrlaltdel_reboot:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Ctrl-Alt-Del Reboot Activation</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, the system will reboot when the
Ctrl-Alt-Del key sequence is pressed.</ns3:description>
<ns3:reference ref_id="disable_ctrlaltdel_reboot" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Disable Ctrl-Alt-Del key sequence" test_ref="oval:ssg-test_disable_ctrlaltdel:tst:1" />
<ns3:criterion comment="Disable Ctrl-Alt-Del key sequence override exists" test_ref="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_interactive_boot:def:1" version="3">
<ns3:metadata>
<ns3:title>Disable Interactive Boot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ability for users to perform interactive startups should
be disabled.</ns3:description>
<ns3:reference ref_id="disable_interactive_boot" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check the value of PROMPT option in /etc/sysconfig/init. Fail if other than 'no'." test_ref="oval:ssg-test_interactive_boot_disabled_in_sysconfig_init:tst:1" />
<ns3:criterion comment="Check the presence of 'confirm' kernel boot argument in /etc/grub.conf. Fail if found." test_ref="oval:ssg-test_confirm_kernel_boot_argument_not_present:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-display_login_attempts:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Last Login/Access Notification</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure the system to notify users of last login/access using pam_lastlog.</ns3:description>
<ns3:reference ref_id="display_login_attempts" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions for pam_lastlog are satisfied" test_ref="oval:ssg-test_display_login_attempts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dovecot_disable_plaintext_auth:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Plaintext Authentication in Dovecot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Plaintext authentication of mail clients should be disabled.</ns3:description>
<ns3:reference ref_id="dovecot_disable_plaintext_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Disable Plaintext Authentication in Dovecot" operator="OR">
<ns3:extend_definition comment="dovecot service is disabled" definition_ref="oval:ssg-service_dovecot_disabled:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dovecot_disable_plaintext_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dovecot_enable_ssl:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SSL in Dovecot</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSL capabilities should be enabled for the mail server.</ns3:description>
<ns3:reference ref_id="dovecot_enable_ssl" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Enable SSL in Dovecot" operator="OR">
<ns3:extend_definition comment="dovecot service is disabled" definition_ref="oval:ssg-service_dovecot_disabled:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dovecot_enable_ssl:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-enable_selinux_bootloader:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SELinux in /etc/grub.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Check if selinux=0 OR enforcing=0 within /etc/grub.conf lines, fail if found.
</ns3:description>
<ns3:reference ref_id="enable_selinux_bootloader" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" test_ref="oval:ssg-test_selinux_grub:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_group_owner_grub_conf:def:1" version="1">
<ns3:metadata>
<ns3:title>File grub.conf Owned By root Group </ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub.conf file should be owned by the root group. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf</ns3:description>
<ns3:reference ref_id="file_group_owner_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion test_ref="oval:ssg-test_file_group_owner_grub_conf:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_file_group_owner_efi_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_grub_conf:def:1" version="2">
<ns3:metadata>
<ns3:title>File /boot/grub/grub.conf Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for /boot/grub/grub.conf should be set to 0600 (or stronger).</ns3:description>
<ns3:reference ref_id="file_permissions_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_sgid:def:1" version="1">
<ns3:metadata>
<ns3:title>Find setgid files system packages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files with setgid should be owned by a base system package</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_sgid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all setgid files" test_ref="oval:ssg-check_setgid_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_suid:def:1" version="1">
<ns3:metadata>
<ns3:title>Find setuid files from system packages</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files with setuid should be owned by a base system package</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_suid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all setuid files" test_ref="oval:ssg-check_setuid_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_user_owner_grub_conf:def:1" version="1">
<ns3:metadata>
<ns3:title>File grub.conf Owned By root User</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The grub.conf file should be owned by the root user. By default, this file is located at /boot/grub/grub.conf or, for EFI systems, at /boot/efi/EFI/redhat/grub.conf</ns3:description>
<ns3:reference ref_id="file_user_owner_grub_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion test_ref="oval:ssg-test_file_user_owner_grub_conf:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_file_user_owner_efi_grub_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_configure_firewall:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure the Firewall to Protect the FTP Server</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Configure the FTP connection tracking module
in iptables.</ns3:description>
<ns3:reference ref_id="ftp_configure_firewall" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Configure FTP firewall" test_ref="oval:ssg-test_ftp_configure_firewall:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_disable_uploads:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable FTP Uploads</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable FTP Uploads.</ns3:description>
<ns3:reference ref_id="ftp_disable_uploads" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Disable uploads" test_ref="oval:ssg-test_ftp_disable_uploads:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_limit_users:def:1" version="1">
<ns3:metadata>
<ns3:title>Limit Users Allowed to Access FTP</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Only authorized users should be able to access FTP.</ns3:description>
<ns3:reference ref_id="ftp_limit_users" source="ssg" /></ns3:metadata>
<ns3:criteria comment="FTP is not being used or the conditions are met" operator="OR">
<ns3:extend_definition comment="vsftp package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criteria comment="FTP configuration conditions are not set or are met" operator="AND">
<ns3:criterion comment="Enable ftp user list" test_ref="oval:ssg-test_ftp_user_list_enable:tst:1" />
<ns3:criterion comment="Set ftp user list file" test_ref="oval:ssg-test_ftp_user_list_file:tst:1" />
<ns3:criterion comment="Use ftp user list" test_ref="oval:ssg-test_ftp_user_list_deny:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_restrict_to_anon:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Anonymous Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable anonymous access to FTP.</ns3:description>
<ns3:reference ref_id="ftp_restrict_to_anon" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Disable anonymous access" test_ref="oval:ssg-test_ftp_restrict_to_anon:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_disable_user_list:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the User List</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GUI listing of all known users on the login screen.</ns3:description>
<ns3:reference ref_id="gconf_gdm_disable_user_list" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check etc settings tree" test_ref="oval:ssg-test_tree_gconf_gdm_disable_user_list:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_disable_user_list:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_enable_warning_gui_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable GUI Warning Banner</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable the GUI warning banner.</ns3:description>
<ns3:reference ref_id="gconf_gdm_enable_warning_gui_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check var settings" test_ref="oval:ssg-test_gconf_gdm_enable_warning_gui_banner:tst:1" />
<ns3:criterion comment="check etc settings tree" test_ref="oval:ssg-test_tree_gconf_gdm_enable_warning_gui_banner:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_enable_warning_gui_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gdm_set_login_banner_text:def:1" version="1">
<ns3:metadata>
<ns3:title>Set GUI Warning Banner Text</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The text to be displayed in the GUI warning banner should be set correctly.</ns3:description>
<ns3:reference ref_id="gconf_gdm_set_login_banner_text" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="check var settings" test_ref="oval:ssg-test_gconf_gdm_set_login_banner_text:tst:1" />
<ns3:criterion comment="check etc settings with tree" test_ref="oval:ssg-test_no_tree_gconf_gdm_set_login_banner_text:tst:1" />
<ns3:criterion comment="check etc settings without tree" test_ref="oval:ssg-test_tree_gconf_gdm_set_login_banner_text:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_automount:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable GNOME Automounting</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system's default desktop environment, GNOME, will mount
devices and removable media (such as DVDs, CDs and USB flash drives)
whenever they are inserted into the system. Disable automount and autorun
within GNOME.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_automount" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Disable automount in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_automount:tst:1" />
<ns3:criterion comment="Disable automount in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_automount:tst:1" />
<ns3:criterion comment="Disable autorun in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_automount_autorun:tst:1" />
<ns3:criterion comment="Disable autorun in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_automount_autorun:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_clock_temperature:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Clock Temperature Feature</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The GNOME clock temperature feature should be disabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_clock_temperature" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="temperature is disabled" test_ref="oval:ssg-test_disable_clock_temperature:tst:1" />
<ns3:criterion comment="temperature is disabled" test_ref="oval:ssg-test_gconf_tree_disable_clock_temperature:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_clock_weather:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Clock Weather Feature</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The GNOME clock weather feature should be disabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_clock_weather" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="weather is disabled" test_ref="oval:ssg-test_disable_clock_weather:tst:1" />
<ns3:criterion comment="weather is disabled" test_ref="oval:ssg-test_gconf_tree_disable_clock_weather:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_ctrlaltdel_reboot:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The Ctrl-Alt-Del reboot key sequence should be set to nothing.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_ctrlaltdel_reboot" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="set Ctrl-Alt-Del key sequence to nothing" test_ref="oval:ssg-test_gnome_disable_ctrlaltdel_reboot:tst:1" />
<ns3:criterion comment="set Ctrl-Alt-Del key sequence to nothing" test_ref="oval:ssg-test_gconf_tree_gnome_disable_ctrlaltdel_reboot:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_restart_shutdown:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the GNOME Login Restart and Shutdown Buttons</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME Login restart and shutdown buttons to prevent
users from restarting or powering off the system from the login screen.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_restart_shutdown" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="disable restart/shutdown buttons" test_ref="oval:ssg-test_disable_restart_shutdown:tst:1" />
<ns3:criterion comment="disable restart/shutdown buttons" test_ref="oval:ssg-test_gconf_tree_disable_restart_shutdown:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_thumbnailers:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable All GNOME Thumbnailers</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system's default desktop environment, GNOME, uses a
number of different thumbnailer programs to generate thumbnails for any
new or modified content in an opened folder. Disable the execution of
these thumbnail applications within GNOME.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_thumbnailers" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Disable thumbnailers in GNOME" test_ref="oval:ssg-test_gconf_gnome_disable_thumbnailers:tst:1" />
<ns3:criterion comment="Disable thumbnailers in GNOME" test_ref="oval:ssg-test_gconf_tree_gnome_disable_thumbnailers:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_create:def:1" version="1">
<ns3:metadata>
<ns3:title>>Disable WIFI Network Connection Creation in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to create a wifi connection.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_create" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="wifi creation is disabled" test_ref="oval:ssg-test_disable_wifi_create:tst:1" />
<ns3:criterion comment="wifi creation is disabled" test_ref="oval:ssg-test_gconf_tree_disable_wifi_create:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_disconnect:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable WIFI Network Disconnect Notification in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to notify users when disconnecting
from a wifi network.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_disconnect" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="disable wifi disconnect" test_ref="oval:ssg-test_disable_wifi_disconnect:tst:1" />
<ns3:criterion comment="disable wifi disconnect" test_ref="oval:ssg-test_gconf_tree_disable_wifi_disconnect:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_disable_wifi_notification:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable WIFI Network Connection Notification in GNOME</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable GNOME's ability to notify users when connecting
to a wifi network.</ns3:description>
<ns3:reference ref_id="gconf_gnome_disable_wifi_notification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="wifi connection notification is disabled" test_ref="oval:ssg-test_disable_wifi_notification:tst:1" />
<ns3:criterion comment="wifi connection notification is disabled" test_ref="oval:ssg-test_gconf_tree_disable_wifi_notification:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_idle_activation_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement idle activation of screen saver</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle activation of the screen saver should be
enabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_idle_activation_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="gnome screensaver is activated on idle" test_ref="oval:ssg-test_gnome_screensaver_idle_activated:tst:1" />
<ns3:criterion comment="gnome screensaver is activated on idle" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_idle_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_idle_delay:def:1" version="2">
<ns3:metadata>
<ns3:title>Configure GUI Screen Locking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The allowed period of inactivity before the screensaver is
activated.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_idle_delay" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="check value of idle_delay in GCONF" test_ref="oval:ssg-test_gnome_screensaver_idle_delay:tst:1" />
<ns3:criterion comment="check value of idle_delay in GCONF" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_idle_delay:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_lock_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement idle activation of screen lock</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle activation of the screen lock should be
enabled.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_lock_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="screensaver lock is enabled" test_ref="oval:ssg-test_screensaver_lock_enabled:tst:1" />
<ns3:criterion comment="screensaver lock is enabled" test_ref="oval:ssg-test_gconf_tree_screensaver_lock_enabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_max_idle_action:def:1" version="1">
<ns3:metadata>
<ns3:title>Set GNOME Login Maximum Allowed Inactivity Action</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Idle GNOME users should be logged off after a defined
period of time.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_max_idle_action" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="Force log off users" test_ref="oval:ssg-test_gnome_screensaver_max_idle_action:tst:1" />
<ns3:criterion comment="Force log off users" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_max_idle_time:def:1" version="2">
<ns3:metadata>
<ns3:title>Set GNOME Login Maximum Allowed Inactivity</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The allowed period of inactivity before a user is logged
off the system.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_max_idle_time" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="check value of max_idle_time in GCONF" test_ref="oval:ssg-test_gnome_screensaver_max_idle_time:tst:1" />
<ns3:criterion comment="check value of max_idle_time in GCONF" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_time:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gconf_gnome_screensaver_mode_blank:def:1" version="1">
<ns3:metadata>
<ns3:title>Implement blank screen saver</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The screen saver should be blank.</ns3:description>
<ns3:reference ref_id="gconf_gnome_screensaver_mode_blank" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="GConf2 installed" definition_ref="oval:ssg-package_GConf2_installed:def:1" negate="true" />
<ns3:criterion comment="gnome screensaver set to blank screen" test_ref="oval:ssg-test_gnome_screensaver_mode:tst:1" />
<ns3:criterion comment="gnome screensaver set to blank screen" test_ref="oval:ssg-test_gconf_tree_gnome_screensaver_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-grub_enable_fips_mode:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable FIPS Mode in GRUB</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Look for argument fips=1 in the kernel line in /etc/grub.conf.</ns3:description>
<ns3:reference ref_id="grub_enable_fips_mode" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="prelink disabled" definition_ref="oval:ssg-disable_prelink:def:1" />
<ns3:extend_definition comment="package dracut-fips installed" definition_ref="oval:ssg-package_dracut-fips_installed:def:1" />
<ns3:criterion comment="check for fips=1 in /etc/grub.conf" test_ref="oval:ssg-test_grub_enable_fips_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-iptables_sshd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disallow inbound firewall access to the SSH Server port.</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>If inbound SSH access is not needed, the firewall should disallow or reject access to
the SSH port (22).</ns3:description>
<ns3:reference ref_id="iptables_sshd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test ipv4 port 22 Deny" test_ref="oval:ssg-test_iptables_sshd_disabled_ipv4:tst:1" />
<ns3:criterion comment="Test ipv6 port 22 Deny" test_ref="oval:ssg-test_iptables_sshd_disabled_ipv6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_disable_entropy_contribution_for_solid_state_drives:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure solid-state drives (SSDs) not to contribute to random-number entropy pool</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The add_random sysfs variable should be set correctly for each SSD drive on the system.</ns3:description>
<ns3:reference ref_id="kernel_disable_entropy_contribution_for_solid_state_drives" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check add_random sysfs variable set to '0' for each SSD drive. Fail if not" test_ref="oval:ssg-test_kernel_disable_entropy_contribution_for_solid_state_drives:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_bluetooth_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable bluetooth Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module bluetooth should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_bluetooth_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module bluetooth disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_bluetooth_disabled:tst:1" />
<ns3:criterion comment="kernel module bluetooth disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_cramfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable cramfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module cramfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_cramfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module cramfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_cramfs_disabled:tst:1" />
<ns3:criterion comment="kernel module cramfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_dccp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable dccp Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module dccp should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_dccp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module dccp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_dccp_disabled:tst:1" />
<ns3:criterion comment="kernel module dccp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_freevxfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable freevxfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module freevxfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_freevxfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module freevxfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_freevxfs_disabled:tst:1" />
<ns3:criterion comment="kernel module freevxfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_hfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable hfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module hfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_hfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module hfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfs_disabled:tst:1" />
<ns3:criterion comment="kernel module hfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_hfsplus_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable hfsplus Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module hfsplus should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_hfsplus_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module hfsplus disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_hfsplus_disabled:tst:1" />
<ns3:criterion comment="kernel module hfsplus disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_ipv6_option_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable IPv6 Kernel Module Functionality via Disable Option</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The disable option will allow the IPv6 module to be inserted, but prevent address assignment and activation of the network stack.</ns3:description>
<ns3:reference ref_id="kernel_module_ipv6_option_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="ipv6 disabled any modprobe conf file" test_ref="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_jffs2_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable jffs2 Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module jffs2 should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_jffs2_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module jffs2 disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_jffs2_disabled:tst:1" />
<ns3:criterion comment="kernel module jffs2 disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_rds_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable rds Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module rds should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_rds_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module rds disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_rds_disabled:tst:1" />
<ns3:criterion comment="kernel module rds disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_rds_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_sctp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable sctp Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module sctp should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_sctp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module sctp disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_sctp_disabled:tst:1" />
<ns3:criterion comment="kernel module sctp disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_squashfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable squashfs Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module squashfs should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_squashfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module squashfs disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_squashfs_disabled:tst:1" />
<ns3:criterion comment="kernel module squashfs disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_tipc_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable tipc Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module tipc should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_tipc_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module tipc disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_tipc_disabled:tst:1" />
<ns3:criterion comment="kernel module tipc disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_tipc_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_udf_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable udf Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module udf should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_udf_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module udf disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_udf_disabled:tst:1" />
<ns3:criterion comment="kernel module udf disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_udf_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-kernel_module_usb-storage_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable usb-storage Kernel Module</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel module usb-storage should be disabled.</ns3:description>
<ns3:reference ref_id="kernel_module_usb-storage_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="kernel module usb-storage disabled in /etc/modprobe.d" test_ref="oval:ssg-test_kernmod_usb-storage_disabled:tst:1" />
<ns3:criterion comment="kernel module usb-storage disabled in /etc/modprobe.conf" test_ref="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ldap_client_start_tls:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure LDAP to Use TLS for All Transactions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require the use of TLS for ldap clients.</ns3:description>
<ns3:reference ref_id="ldap_client_start_tls" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pam_ldap is not present" operator="OR">
<ns3:extend_definition comment="pam_ldap not present or not in use" definition_ref="oval:ssg-package_pam_ldap_removed:def:1" />
<ns3:criterion comment="look for ssl start_tls in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_start_tls_ssl:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ldap_client_tls_cacertpath:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure LDAP CA Certificate Path</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require the use of TLS for ldap clients.</ns3:description>
<ns3:reference ref_id="ldap_client_tls_cacertpath" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pam_ldap is not present" operator="OR">
<ns3:extend_definition comment="pam_ldap not present or in use" definition_ref="oval:ssg-package_pam_ldap_removed:def:1" />
<ns3:criterion comment="look for tls_cacertdir in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_tls_cacertdir:tst:1" />
<ns3:criterion comment="look for tls_cacertfile in /etc/pam_ldap.conf" test_ref="oval:ssg-test_ldap_client_tls_cacertfile:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_default_gateway:def:1" version="1">
<ns3:metadata>
<ns3:title>Manually Assign IPv6 Router Address</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Define default gateways for IPv6 traffic</ns3:description>
<ns3:reference ref_id="network_ipv6_default_gateway" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Define default gateways" test_ref="oval:ssg-test_network_ipv6_default_gateway:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_privacy_extensions:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable Privacy Extensions for IPv6</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable privacy extensions for IPv6</ns3:description>
<ns3:reference ref_id="network_ipv6_privacy_extensions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Enable privacy extensions per interface" test_ref="oval:ssg-test_network_ipv6_privacy_extensions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_static_address:def:1" version="1">
<ns3:metadata>
<ns3:title>Manually Assign Global IPv6 Address</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Manually configure addresses for IPv6</ns3:description>
<ns3:reference ref_id="network_ipv6_static_address" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criterion comment="Set static IPv6 address on each interface" test_ref="oval:ssg-test_network_ipv6_static_address:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ntpd_specify_multiple_servers:def:1" version="2">
<ns3:metadata>
<ns3:title>Specify Multiple Remote ntpd NTP Server for Time Data</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Multiple ntpd NTP Servers for time synchronization should be specified.</ns3:description>
<ns3:reference ref_id="ntpd_specify_multiple_servers" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ntp.conf conditions are met">
<ns3:criterion test_ref="oval:ssg-test_ntpd_multiple_servers:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ntpd_specify_remote_server:def:1" version="2">
<ns3:metadata>
<ns3:title>Specify a Remote ntpd NTP Server for Time Data</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>A remote ntpd NTP Server for time synchronization should be
specified (and dependencies are met)</ns3:description>
<ns3:reference ref_id="ntpd_specify_remote_server" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ntp.conf conditions are met">
<ns3:criterion test_ref="oval:ssg-test_ntp_remote_server:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_GConf2_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package GConf2 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package GConf2 should be installed.</ns3:description>
<ns3:reference ref_id="package_GConf2_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package GConf2 is installed" test_ref="oval:ssg-test_package_GConf2_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_abrt_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package abrt Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package abrt should be removed.</ns3:description>
<ns3:reference ref_id="package_abrt_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package abrt is removed" test_ref="oval:ssg-test_package_abrt_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_at_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package at Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package at should be removed.</ns3:description>
<ns3:reference ref_id="package_at_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package at is removed" test_ref="oval:ssg-test_package_at_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_autofs_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package autofs Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package autofs should be removed.</ns3:description>
<ns3:reference ref_id="package_autofs_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package autofs is removed" test_ref="oval:ssg-test_package_autofs_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_avahi_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package avahi Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package avahi should be installed.</ns3:description>
<ns3:reference ref_id="package_avahi_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package avahi is installed" test_ref="oval:ssg-test_package_avahi_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_bluez_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package bluez Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package bluez should be removed.</ns3:description>
<ns3:reference ref_id="package_bluez_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package bluez is removed" test_ref="oval:ssg-test_package_bluez_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cpuspeed_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cpuspeed Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cpuspeed should be removed.</ns3:description>
<ns3:reference ref_id="package_cpuspeed_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cpuspeed is removed" test_ref="oval:ssg-test_package_cpuspeed_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cronie_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cronie Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cronie should be installed.</ns3:description>
<ns3:reference ref_id="package_cronie_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cronie is installed" test_ref="oval:ssg-test_package_cronie_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cups_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cups Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cups should be removed.</ns3:description>
<ns3:reference ref_id="package_cups_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cups is removed" test_ref="oval:ssg-test_package_cups_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_cyrus-sasl_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package cyrus-sasl Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package cyrus-sasl should be removed.</ns3:description>
<ns3:reference ref_id="package_cyrus-sasl_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package cyrus-sasl is removed" test_ref="oval:ssg-test_package_cyrus-sasl_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dbus_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dbus Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dbus should be removed.</ns3:description>
<ns3:reference ref_id="package_dbus_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dbus is removed" test_ref="oval:ssg-test_package_dbus_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_esc_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package esc Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package esc should be installed.</ns3:description>
<ns3:reference ref_id="package_esc_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package esc is installed" test_ref="oval:ssg-test_package_esc_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_gdm_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package gdm Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package gdm should be installed.</ns3:description>
<ns3:reference ref_id="package_gdm_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package gdm is installed" test_ref="oval:ssg-test_package_gdm_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_hal_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package hal Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package hal should be removed.</ns3:description>
<ns3:reference ref_id="package_hal_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package hal is removed" test_ref="oval:ssg-test_package_hal_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iptables-ipv6_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iptables-ipv6 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iptables-ipv6 should be installed.</ns3:description>
<ns3:reference ref_id="package_iptables-ipv6_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iptables-ipv6 is installed" test_ref="oval:ssg-test_package_iptables-ipv6_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iptables_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iptables Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iptables should be installed.</ns3:description>
<ns3:reference ref_id="package_iptables_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iptables is installed" test_ref="oval:ssg-test_package_iptables_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_iputils_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package iputils Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package iputils should be removed.</ns3:description>
<ns3:reference ref_id="package_iputils_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package iputils is removed" test_ref="oval:ssg-test_package_iputils_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_irqbalance_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package irqbalance Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package irqbalance should be installed.</ns3:description>
<ns3:reference ref_id="package_irqbalance_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package irqbalance is installed" test_ref="oval:ssg-test_package_irqbalance_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_kexec-tools_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package kexec-tools Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package kexec-tools should be removed.</ns3:description>
<ns3:reference ref_id="package_kexec-tools_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package kexec-tools is removed" test_ref="oval:ssg-test_package_kexec-tools_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_libcgroup_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package libcgroup Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package libcgroup should be removed.</ns3:description>
<ns3:reference ref_id="package_libcgroup_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package libcgroup is removed" test_ref="oval:ssg-test_package_libcgroup_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_mdadm_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package mdadm Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package mdadm should be removed.</ns3:description>
<ns3:reference ref_id="package_mdadm_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package mdadm is removed" test_ref="oval:ssg-test_package_mdadm_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_nfs-utils_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package nfs-utils Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package nfs-utils should be removed.</ns3:description>
<ns3:reference ref_id="package_nfs-utils_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package nfs-utils is removed" test_ref="oval:ssg-test_package_nfs-utils_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ntpdate_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ntpdate Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ntpdate should be removed.</ns3:description>
<ns3:reference ref_id="package_ntpdate_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ntpdate is removed" test_ref="oval:ssg-test_package_ntpdate_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_oddjob_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package oddjob Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package oddjob should be removed.</ns3:description>
<ns3:reference ref_id="package_oddjob_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package oddjob is removed" test_ref="oval:ssg-test_package_oddjob_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openswan_installed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package openswan / libreswan Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openswan / libreswan should be installed.</ns3:description>
<ns3:reference ref_id="package_openswan_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openswan is installed" test_ref="oval:ssg-test_package_openswan_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pam_ldap_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pam_ldap Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pam_ldap should be removed.</ns3:description>
<ns3:reference ref_id="package_pam_ldap_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pam_ldap is removed" test_ref="oval:ssg-test_package_pam_ldap_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pam_pkcs11_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pam_pkcs11 Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pam_pkcs11 should be installed.</ns3:description>
<ns3:reference ref_id="package_pam_pkcs11_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pam_pkcs11 is installed" test_ref="oval:ssg-test_package_pam_pkcs11_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_pcsc-lite_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package pcsc-lite Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package pcsc-lite should be installed.</ns3:description>
<ns3:reference ref_id="package_pcsc-lite_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package pcsc-lite is installed" test_ref="oval:ssg-test_package_pcsc-lite_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_policycoreutils_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package policycoreutils Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package policycoreutils should be installed.</ns3:description>
<ns3:reference ref_id="package_policycoreutils_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package policycoreutils is installed" test_ref="oval:ssg-test_package_policycoreutils_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_portreserve_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package portreserve Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package portreserve should be removed.</ns3:description>
<ns3:reference ref_id="package_portreserve_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package portreserve is removed" test_ref="oval:ssg-test_package_portreserve_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_postfix_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package postfix Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package postfix should be installed.</ns3:description>
<ns3:reference ref_id="package_postfix_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package postfix is installed" test_ref="oval:ssg-test_package_postfix_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_psacct_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package psacct Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package psacct should be installed.</ns3:description>
<ns3:reference ref_id="package_psacct_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package psacct is installed" test_ref="oval:ssg-test_package_psacct_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_qpid-cpp-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package qpid-cpp-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package qpid-cpp-server should be removed.</ns3:description>
<ns3:reference ref_id="package_qpid-cpp-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package qpid-cpp-server is removed" test_ref="oval:ssg-test_package_qpid-cpp-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_quota_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package quota Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package quota should be removed.</ns3:description>
<ns3:reference ref_id="package_quota_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package quota is removed" test_ref="oval:ssg-test_package_quota_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rhnsd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rhnsd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rhnsd should be removed.</ns3:description>
<ns3:reference ref_id="package_rhnsd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rhnsd is removed" test_ref="oval:ssg-test_package_rhnsd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rpcbind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rpcbind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rpcbind should be removed.</ns3:description>
<ns3:reference ref_id="package_rpcbind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rpcbind is removed" test_ref="oval:ssg-test_package_rpcbind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba should be removed.</ns3:description>
<ns3:reference ref_id="package_samba_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba is removed" test_ref="oval:ssg-test_package_samba_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_smartmontools_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package smartmontools Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package smartmontools should be removed.</ns3:description>
<ns3:reference ref_id="package_smartmontools_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package smartmontools is removed" test_ref="oval:ssg-test_package_smartmontools_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_subscription-manager_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package subscription-manager Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package subscription-manager should be removed.</ns3:description>
<ns3:reference ref_id="package_subscription-manager_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package subscription-manager is removed" test_ref="oval:ssg-test_package_subscription-manager_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_sysstat_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package sysstat Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package sysstat should be removed.</ns3:description>
<ns3:reference ref_id="package_sysstat_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package sysstat is removed" test_ref="oval:ssg-test_package_sysstat_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_xorg-x11-server-common_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package xorg-x11-server-common Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package xorg-x11-server-common should be removed.</ns3:description>
<ns3:reference ref_id="package_xorg-x11-server-common_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package xorg-x11-server-common is removed" test_ref="oval:ssg-test_package_xorg-x11-server-common_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-postfix_network_listening_disabled:def:1" version="2">
<ns3:metadata>
<ns3:title>Postfix network listening should be disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Postfix network listening should be disabled</ns3:description>
<ns3:reference ref_id="postfix_network_listening_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Postfix installed and configured to start" definition_ref="oval:ssg-service_postfix_enabled:def:1" negate="true" />
<ns3:criterion comment="Check inet_interfaces in /etc/postfix/main.cf" test_ref="oval:ssg-test_postfix_network_listening_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-require_singleuser_auth:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Authentication for Single-User Mode</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The requirement for a password to boot into single-user mode
should be configured correctly.</ns3:description>
<ns3:reference ref_id="require_singleuser_auth" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions are satisfied" test_ref="oval:ssg-test_require_singleuser_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_abrtd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service abrtd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The abrtd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_abrtd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package abrt removed or service abrtd is not configured to start" operator="OR">
<ns3:extend_definition comment="abrt removed" definition_ref="oval:ssg-package_abrt_removed:def:1" />
<ns3:criteria comment="service abrtd is not configured to start" operator="AND">
<ns3:criterion comment="abrtd runlevel 0" test_ref="oval:ssg-test_runlevel0_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 1" test_ref="oval:ssg-test_runlevel1_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 2" test_ref="oval:ssg-test_runlevel2_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 3" test_ref="oval:ssg-test_runlevel3_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 4" test_ref="oval:ssg-test_runlevel4_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 5" test_ref="oval:ssg-test_runlevel5_abrtd:tst:1" />
<ns3:criterion comment="abrtd runlevel 6" test_ref="oval:ssg-test_runlevel6_abrtd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_acpid_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service acpid Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The acpid service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_acpid_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service acpid is not configured to start" operator="AND">
<ns3:criterion comment="acpid runlevel 0" test_ref="oval:ssg-test_runlevel0_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 1" test_ref="oval:ssg-test_runlevel1_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 2" test_ref="oval:ssg-test_runlevel2_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 3" test_ref="oval:ssg-test_runlevel3_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 4" test_ref="oval:ssg-test_runlevel4_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 5" test_ref="oval:ssg-test_runlevel5_acpid:tst:1" />
<ns3:criterion comment="acpid runlevel 6" test_ref="oval:ssg-test_runlevel6_acpid:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_atd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service atd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The atd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_atd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package at removed or service atd is not configured to start" operator="OR">
<ns3:extend_definition comment="at removed" definition_ref="oval:ssg-package_at_removed:def:1" />
<ns3:criteria comment="service atd is not configured to start" operator="AND">
<ns3:criterion comment="atd runlevel 0" test_ref="oval:ssg-test_runlevel0_atd:tst:1" />
<ns3:criterion comment="atd runlevel 1" test_ref="oval:ssg-test_runlevel1_atd:tst:1" />
<ns3:criterion comment="atd runlevel 2" test_ref="oval:ssg-test_runlevel2_atd:tst:1" />
<ns3:criterion comment="atd runlevel 3" test_ref="oval:ssg-test_runlevel3_atd:tst:1" />
<ns3:criterion comment="atd runlevel 4" test_ref="oval:ssg-test_runlevel4_atd:tst:1" />
<ns3:criterion comment="atd runlevel 5" test_ref="oval:ssg-test_runlevel5_atd:tst:1" />
<ns3:criterion comment="atd runlevel 6" test_ref="oval:ssg-test_runlevel6_atd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_auditd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service auditd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The auditd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_auditd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package audit installed and service auditd is configured to start" operator="AND">
<ns3:extend_definition comment="audit installed" definition_ref="oval:ssg-package_audit_installed:def:1" />
<ns3:criteria comment="service auditd is configured to start" operator="OR">
<ns3:criterion comment="auditd runlevel 0" test_ref="oval:ssg-test_runlevel0_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 1" test_ref="oval:ssg-test_runlevel1_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 2" test_ref="oval:ssg-test_runlevel2_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 3" test_ref="oval:ssg-test_runlevel3_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 4" test_ref="oval:ssg-test_runlevel4_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 5" test_ref="oval:ssg-test_runlevel5_auditd:tst:1" />
<ns3:criterion comment="auditd runlevel 6" test_ref="oval:ssg-test_runlevel6_auditd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_autofs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service autofs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The autofs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_autofs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package autofs removed or service autofs is not configured to start" operator="OR">
<ns3:extend_definition comment="autofs removed" definition_ref="oval:ssg-package_autofs_removed:def:1" />
<ns3:criteria comment="service autofs is not configured to start" operator="AND">
<ns3:criterion comment="autofs runlevel 0" test_ref="oval:ssg-test_runlevel0_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 1" test_ref="oval:ssg-test_runlevel1_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 2" test_ref="oval:ssg-test_runlevel2_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 3" test_ref="oval:ssg-test_runlevel3_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 4" test_ref="oval:ssg-test_runlevel4_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 5" test_ref="oval:ssg-test_runlevel5_autofs:tst:1" />
<ns3:criterion comment="autofs runlevel 6" test_ref="oval:ssg-test_runlevel6_autofs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_avahi-daemon_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service avahi-daemon Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The avahi-daemon service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_avahi-daemon_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service avahi-daemon is not configured to start" operator="AND">
<ns3:criterion comment="avahi-daemon runlevel 0" test_ref="oval:ssg-test_runlevel0_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 1" test_ref="oval:ssg-test_runlevel1_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 2" test_ref="oval:ssg-test_runlevel2_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 3" test_ref="oval:ssg-test_runlevel3_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 4" test_ref="oval:ssg-test_runlevel4_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 5" test_ref="oval:ssg-test_runlevel5_avahi-daemon:tst:1" />
<ns3:criterion comment="avahi-daemon runlevel 6" test_ref="oval:ssg-test_runlevel6_avahi-daemon:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_bluetooth_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service bluetooth Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The bluetooth service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_bluetooth_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="rpm package bluez removed" definition_ref="oval:ssg-package_bluez_removed:def:1" />
<ns3:criteria comment="service bluetooth is not configured to start" operator="AND">
<ns3:criterion comment="bluetooth runlevel 0" test_ref="oval:ssg-test_runlevel0_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 1" test_ref="oval:ssg-test_runlevel1_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 2" test_ref="oval:ssg-test_runlevel2_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 3" test_ref="oval:ssg-test_runlevel3_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 4" test_ref="oval:ssg-test_runlevel4_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 5" test_ref="oval:ssg-test_runlevel5_bluetooth:tst:1" />
<ns3:criterion comment="bluetooth runlevel 6" test_ref="oval:ssg-test_runlevel6_bluetooth:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_certmonger_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service certmonger Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The certmonger service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_certmonger_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service certmonger is not configured to start" operator="AND">
<ns3:criterion comment="certmonger runlevel 0" test_ref="oval:ssg-test_runlevel0_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 1" test_ref="oval:ssg-test_runlevel1_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 2" test_ref="oval:ssg-test_runlevel2_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 3" test_ref="oval:ssg-test_runlevel3_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 4" test_ref="oval:ssg-test_runlevel4_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 5" test_ref="oval:ssg-test_runlevel5_certmonger:tst:1" />
<ns3:criterion comment="certmonger runlevel 6" test_ref="oval:ssg-test_runlevel6_certmonger:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cgconfig_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cgconfig Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cgconfig service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cgconfig_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package libcgroup removed or service cgconfig is not configured to start" operator="OR">
<ns3:extend_definition comment="libcgroup removed" definition_ref="oval:ssg-package_libcgroup_removed:def:1" />
<ns3:criteria comment="service cgconfig is not configured to start" operator="AND">
<ns3:criterion comment="cgconfig runlevel 0" test_ref="oval:ssg-test_runlevel0_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 1" test_ref="oval:ssg-test_runlevel1_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 2" test_ref="oval:ssg-test_runlevel2_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 3" test_ref="oval:ssg-test_runlevel3_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 4" test_ref="oval:ssg-test_runlevel4_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 5" test_ref="oval:ssg-test_runlevel5_cgconfig:tst:1" />
<ns3:criterion comment="cgconfig runlevel 6" test_ref="oval:ssg-test_runlevel6_cgconfig:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cgred_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cgred Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cgred service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cgred_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service cgred is not configured to start" operator="AND">
<ns3:criterion comment="cgred runlevel 0" test_ref="oval:ssg-test_runlevel0_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 1" test_ref="oval:ssg-test_runlevel1_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 2" test_ref="oval:ssg-test_runlevel2_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 3" test_ref="oval:ssg-test_runlevel3_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 4" test_ref="oval:ssg-test_runlevel4_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 5" test_ref="oval:ssg-test_runlevel5_cgred:tst:1" />
<ns3:criterion comment="cgred runlevel 6" test_ref="oval:ssg-test_runlevel6_cgred:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cpuspeed_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cpuspeed Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cpuspeed service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cpuspeed_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cpuspeed removed or service cpuspeed is not configured to start" operator="OR">
<ns3:extend_definition comment="cpuspeed removed" definition_ref="oval:ssg-package_cpuspeed_removed:def:1" />
<ns3:criteria comment="service cpuspeed is not configured to start" operator="AND">
<ns3:criterion comment="cpuspeed runlevel 0" test_ref="oval:ssg-test_runlevel0_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 1" test_ref="oval:ssg-test_runlevel1_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 2" test_ref="oval:ssg-test_runlevel2_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 3" test_ref="oval:ssg-test_runlevel3_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 4" test_ref="oval:ssg-test_runlevel4_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 5" test_ref="oval:ssg-test_runlevel5_cpuspeed:tst:1" />
<ns3:criterion comment="cpuspeed runlevel 6" test_ref="oval:ssg-test_runlevel6_cpuspeed:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_crond_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service crond Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The crond service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_crond_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cronie installed and service crond is configured to start" operator="AND">
<ns3:extend_definition comment="cronie installed" definition_ref="oval:ssg-package_cronie_installed:def:1" />
<ns3:criteria comment="service crond is configured to start" operator="OR">
<ns3:criterion comment="crond runlevel 0" test_ref="oval:ssg-test_runlevel0_crond:tst:1" />
<ns3:criterion comment="crond runlevel 1" test_ref="oval:ssg-test_runlevel1_crond:tst:1" />
<ns3:criterion comment="crond runlevel 2" test_ref="oval:ssg-test_runlevel2_crond:tst:1" />
<ns3:criterion comment="crond runlevel 3" test_ref="oval:ssg-test_runlevel3_crond:tst:1" />
<ns3:criterion comment="crond runlevel 4" test_ref="oval:ssg-test_runlevel4_crond:tst:1" />
<ns3:criterion comment="crond runlevel 5" test_ref="oval:ssg-test_runlevel5_crond:tst:1" />
<ns3:criterion comment="crond runlevel 6" test_ref="oval:ssg-test_runlevel6_crond:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_cups_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service cups Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The cups service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_cups_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cups removed or service cups is not configured to start" operator="OR">
<ns3:extend_definition comment="cups removed" definition_ref="oval:ssg-package_cups_removed:def:1" />
<ns3:criteria comment="service cups is not configured to start" operator="AND">
<ns3:criterion comment="cups runlevel 0" test_ref="oval:ssg-test_runlevel0_cups:tst:1" />
<ns3:criterion comment="cups runlevel 1" test_ref="oval:ssg-test_runlevel1_cups:tst:1" />
<ns3:criterion comment="cups runlevel 2" test_ref="oval:ssg-test_runlevel2_cups:tst:1" />
<ns3:criterion comment="cups runlevel 3" test_ref="oval:ssg-test_runlevel3_cups:tst:1" />
<ns3:criterion comment="cups runlevel 4" test_ref="oval:ssg-test_runlevel4_cups:tst:1" />
<ns3:criterion comment="cups runlevel 5" test_ref="oval:ssg-test_runlevel5_cups:tst:1" />
<ns3:criterion comment="cups runlevel 6" test_ref="oval:ssg-test_runlevel6_cups:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_dhcpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service dhcpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The dhcpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_dhcpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dhcp removed or service dhcpd is not configured to start" operator="OR">
<ns3:extend_definition comment="dhcp removed" definition_ref="oval:ssg-package_dhcp_removed:def:1" />
<ns3:criteria comment="service dhcpd is not configured to start" operator="AND">
<ns3:criterion comment="dhcpd runlevel 0" test_ref="oval:ssg-test_runlevel0_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 1" test_ref="oval:ssg-test_runlevel1_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 2" test_ref="oval:ssg-test_runlevel2_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 3" test_ref="oval:ssg-test_runlevel3_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 4" test_ref="oval:ssg-test_runlevel4_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 5" test_ref="oval:ssg-test_runlevel5_dhcpd:tst:1" />
<ns3:criterion comment="dhcpd runlevel 6" test_ref="oval:ssg-test_runlevel6_dhcpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_dovecot_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service dovecot Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The dovecot service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_dovecot_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dovecot removed or service dovecot is not configured to start" operator="OR">
<ns3:extend_definition comment="dovecot removed" definition_ref="oval:ssg-package_dovecot_removed:def:1" />
<ns3:criteria comment="service dovecot is not configured to start" operator="AND">
<ns3:criterion comment="dovecot runlevel 0" test_ref="oval:ssg-test_runlevel0_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 1" test_ref="oval:ssg-test_runlevel1_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 2" test_ref="oval:ssg-test_runlevel2_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 3" test_ref="oval:ssg-test_runlevel3_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 4" test_ref="oval:ssg-test_runlevel4_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 5" test_ref="oval:ssg-test_runlevel5_dovecot:tst:1" />
<ns3:criterion comment="dovecot runlevel 6" test_ref="oval:ssg-test_runlevel6_dovecot:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_haldaemon_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service haldaemon Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The haldaemon service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_haldaemon_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package hal removed or service haldaemon is not configured to start" operator="OR">
<ns3:extend_definition comment="hal removed" definition_ref="oval:ssg-package_hal_removed:def:1" />
<ns3:criteria comment="service haldaemon is not configured to start" operator="AND">
<ns3:criterion comment="haldaemon runlevel 0" test_ref="oval:ssg-test_runlevel0_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 1" test_ref="oval:ssg-test_runlevel1_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 2" test_ref="oval:ssg-test_runlevel2_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 3" test_ref="oval:ssg-test_runlevel3_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 4" test_ref="oval:ssg-test_runlevel4_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 5" test_ref="oval:ssg-test_runlevel5_haldaemon:tst:1" />
<ns3:criterion comment="haldaemon runlevel 6" test_ref="oval:ssg-test_runlevel6_haldaemon:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_httpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service httpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The httpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_httpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package httpd removed or service httpd is not configured to start" operator="OR">
<ns3:extend_definition comment="httpd removed" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criteria comment="service httpd is not configured to start" operator="AND">
<ns3:criterion comment="httpd runlevel 0" test_ref="oval:ssg-test_runlevel0_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 1" test_ref="oval:ssg-test_runlevel1_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 2" test_ref="oval:ssg-test_runlevel2_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 3" test_ref="oval:ssg-test_runlevel3_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 4" test_ref="oval:ssg-test_runlevel4_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 5" test_ref="oval:ssg-test_runlevel5_httpd:tst:1" />
<ns3:criterion comment="httpd runlevel 6" test_ref="oval:ssg-test_runlevel6_httpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ip6tables_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ip6tables Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ip6tables service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_ip6tables_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iptables-ipv6 installed and service ip6tables is configured to start" operator="AND">
<ns3:extend_definition comment="iptables-ipv6 installed" definition_ref="oval:ssg-package_iptables-ipv6_installed:def:1" />
<ns3:criteria comment="service ip6tables is configured to start" operator="OR">
<ns3:criterion comment="ip6tables runlevel 0" test_ref="oval:ssg-test_runlevel0_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 1" test_ref="oval:ssg-test_runlevel1_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 2" test_ref="oval:ssg-test_runlevel2_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 3" test_ref="oval:ssg-test_runlevel3_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 4" test_ref="oval:ssg-test_runlevel4_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 5" test_ref="oval:ssg-test_runlevel5_ip6tables:tst:1" />
<ns3:criterion comment="ip6tables runlevel 6" test_ref="oval:ssg-test_runlevel6_ip6tables:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_iptables_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service iptables Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The iptables service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_iptables_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iptables installed and service iptables is configured to start" operator="AND">
<ns3:extend_definition comment="iptables installed" definition_ref="oval:ssg-package_iptables_installed:def:1" />
<ns3:criteria comment="service iptables is configured to start" operator="OR">
<ns3:criterion comment="iptables runlevel 0" test_ref="oval:ssg-test_runlevel0_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 1" test_ref="oval:ssg-test_runlevel1_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 2" test_ref="oval:ssg-test_runlevel2_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 3" test_ref="oval:ssg-test_runlevel3_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 4" test_ref="oval:ssg-test_runlevel4_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 5" test_ref="oval:ssg-test_runlevel5_iptables:tst:1" />
<ns3:criterion comment="iptables runlevel 6" test_ref="oval:ssg-test_runlevel6_iptables:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_irqbalance_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service irqbalance Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The irqbalance service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_irqbalance_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package irqbalance installed and service irqbalance is configured to start" operator="AND">
<ns3:extend_definition comment="irqbalance installed" definition_ref="oval:ssg-package_irqbalance_installed:def:1" />
<ns3:criteria comment="service irqbalance is configured to start" operator="OR">
<ns3:criterion comment="irqbalance runlevel 0" test_ref="oval:ssg-test_runlevel0_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 1" test_ref="oval:ssg-test_runlevel1_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 2" test_ref="oval:ssg-test_runlevel2_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 3" test_ref="oval:ssg-test_runlevel3_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 4" test_ref="oval:ssg-test_runlevel4_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 5" test_ref="oval:ssg-test_runlevel5_irqbalance:tst:1" />
<ns3:criterion comment="irqbalance runlevel 6" test_ref="oval:ssg-test_runlevel6_irqbalance:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_kdump_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service kdump Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kdump service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_kdump_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package kexec-tools removed or service kdump is not configured to start" operator="OR">
<ns3:extend_definition comment="kexec-tools removed" definition_ref="oval:ssg-package_kexec-tools_removed:def:1" />
<ns3:criteria comment="service kdump is not configured to start" operator="AND">
<ns3:criterion comment="kdump runlevel 0" test_ref="oval:ssg-test_runlevel0_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 1" test_ref="oval:ssg-test_runlevel1_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 2" test_ref="oval:ssg-test_runlevel2_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 3" test_ref="oval:ssg-test_runlevel3_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 4" test_ref="oval:ssg-test_runlevel4_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 5" test_ref="oval:ssg-test_runlevel5_kdump:tst:1" />
<ns3:criterion comment="kdump runlevel 6" test_ref="oval:ssg-test_runlevel6_kdump:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_mdmonitor_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service mdmonitor Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The mdmonitor service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_mdmonitor_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package mdadm removed or service mdmonitor is not configured to start" operator="OR">
<ns3:extend_definition comment="mdadm removed" definition_ref="oval:ssg-package_mdadm_removed:def:1" />
<ns3:criteria comment="service mdmonitor is not configured to start" operator="AND">
<ns3:criterion comment="mdmonitor runlevel 0" test_ref="oval:ssg-test_runlevel0_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 1" test_ref="oval:ssg-test_runlevel1_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 2" test_ref="oval:ssg-test_runlevel2_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 3" test_ref="oval:ssg-test_runlevel3_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 4" test_ref="oval:ssg-test_runlevel4_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 5" test_ref="oval:ssg-test_runlevel5_mdmonitor:tst:1" />
<ns3:criterion comment="mdmonitor runlevel 6" test_ref="oval:ssg-test_runlevel6_mdmonitor:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_messagebus_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service messagebus Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The messagebus service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_messagebus_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package dbus removed or service messagebus is not configured to start" operator="OR">
<ns3:extend_definition comment="dbus removed" definition_ref="oval:ssg-package_dbus_removed:def:1" />
<ns3:criteria comment="service messagebus is not configured to start" operator="AND">
<ns3:criterion comment="messagebus runlevel 0" test_ref="oval:ssg-test_runlevel0_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 1" test_ref="oval:ssg-test_runlevel1_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 2" test_ref="oval:ssg-test_runlevel2_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 3" test_ref="oval:ssg-test_runlevel3_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 4" test_ref="oval:ssg-test_runlevel4_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 5" test_ref="oval:ssg-test_runlevel5_messagebus:tst:1" />
<ns3:criterion comment="messagebus runlevel 6" test_ref="oval:ssg-test_runlevel6_messagebus:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_named_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service named Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The named service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_named_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package bind removed or service named is not configured to start" operator="OR">
<ns3:extend_definition comment="bind removed" definition_ref="oval:ssg-package_bind_removed:def:1" />
<ns3:criteria comment="service named is not configured to start" operator="AND">
<ns3:criterion comment="named runlevel 0" test_ref="oval:ssg-test_runlevel0_named:tst:1" />
<ns3:criterion comment="named runlevel 1" test_ref="oval:ssg-test_runlevel1_named:tst:1" />
<ns3:criterion comment="named runlevel 2" test_ref="oval:ssg-test_runlevel2_named:tst:1" />
<ns3:criterion comment="named runlevel 3" test_ref="oval:ssg-test_runlevel3_named:tst:1" />
<ns3:criterion comment="named runlevel 4" test_ref="oval:ssg-test_runlevel4_named:tst:1" />
<ns3:criterion comment="named runlevel 5" test_ref="oval:ssg-test_runlevel5_named:tst:1" />
<ns3:criterion comment="named runlevel 6" test_ref="oval:ssg-test_runlevel6_named:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_netconsole_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service netconsole Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The netconsole service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_netconsole_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service netconsole is not configured to start" operator="AND">
<ns3:criterion comment="netconsole runlevel 0" test_ref="oval:ssg-test_runlevel0_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 1" test_ref="oval:ssg-test_runlevel1_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 2" test_ref="oval:ssg-test_runlevel2_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 3" test_ref="oval:ssg-test_runlevel3_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 4" test_ref="oval:ssg-test_runlevel4_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 5" test_ref="oval:ssg-test_runlevel5_netconsole:tst:1" />
<ns3:criterion comment="netconsole runlevel 6" test_ref="oval:ssg-test_runlevel6_netconsole:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_netfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service netfs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The netfs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_netfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service netfs is not configured to start" operator="AND">
<ns3:criterion comment="netfs runlevel 0" test_ref="oval:ssg-test_runlevel0_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 1" test_ref="oval:ssg-test_runlevel1_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 2" test_ref="oval:ssg-test_runlevel2_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 3" test_ref="oval:ssg-test_runlevel3_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 4" test_ref="oval:ssg-test_runlevel4_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 5" test_ref="oval:ssg-test_runlevel5_netfs:tst:1" />
<ns3:criterion comment="netfs runlevel 6" test_ref="oval:ssg-test_runlevel6_netfs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_nfs_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service nfs Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nfs service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_nfs_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service nfs is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service nfs is not configured to start" operator="AND">
<ns3:criterion comment="nfs runlevel 0" test_ref="oval:ssg-test_runlevel0_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 1" test_ref="oval:ssg-test_runlevel1_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 2" test_ref="oval:ssg-test_runlevel2_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 3" test_ref="oval:ssg-test_runlevel3_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 4" test_ref="oval:ssg-test_runlevel4_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 5" test_ref="oval:ssg-test_runlevel5_nfs:tst:1" />
<ns3:criterion comment="nfs runlevel 6" test_ref="oval:ssg-test_runlevel6_nfs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_nfslock_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service nfslock Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nfslock service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_nfslock_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service nfslock is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service nfslock is not configured to start" operator="AND">
<ns3:criterion comment="nfslock runlevel 0" test_ref="oval:ssg-test_runlevel0_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 1" test_ref="oval:ssg-test_runlevel1_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 2" test_ref="oval:ssg-test_runlevel2_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 3" test_ref="oval:ssg-test_runlevel3_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 4" test_ref="oval:ssg-test_runlevel4_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 5" test_ref="oval:ssg-test_runlevel5_nfslock:tst:1" />
<ns3:criterion comment="nfslock runlevel 6" test_ref="oval:ssg-test_runlevel6_nfslock:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ntpd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ntpd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ntpd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_ntpd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ntp installed and service ntpd is configured to start" operator="AND">
<ns3:extend_definition comment="ntp installed" definition_ref="oval:ssg-package_ntp_installed:def:1" />
<ns3:criteria comment="service ntpd is configured to start" operator="OR">
<ns3:criterion comment="ntpd runlevel 0" test_ref="oval:ssg-test_runlevel0_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 1" test_ref="oval:ssg-test_runlevel1_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 2" test_ref="oval:ssg-test_runlevel2_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 3" test_ref="oval:ssg-test_runlevel3_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 4" test_ref="oval:ssg-test_runlevel4_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 5" test_ref="oval:ssg-test_runlevel5_ntpd:tst:1" />
<ns3:criterion comment="ntpd runlevel 6" test_ref="oval:ssg-test_runlevel6_ntpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ntpdate_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ntpdate Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ntpdate service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_ntpdate_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ntpdate removed or service ntpdate is not configured to start" operator="OR">
<ns3:extend_definition comment="ntpdate removed" definition_ref="oval:ssg-package_ntpdate_removed:def:1" />
<ns3:criteria comment="service ntpdate is not configured to start" operator="AND">
<ns3:criterion comment="ntpdate runlevel 0" test_ref="oval:ssg-test_runlevel0_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 1" test_ref="oval:ssg-test_runlevel1_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 2" test_ref="oval:ssg-test_runlevel2_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 3" test_ref="oval:ssg-test_runlevel3_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 4" test_ref="oval:ssg-test_runlevel4_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 5" test_ref="oval:ssg-test_runlevel5_ntpdate:tst:1" />
<ns3:criterion comment="ntpdate runlevel 6" test_ref="oval:ssg-test_runlevel6_ntpdate:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_oddjobd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service oddjobd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The oddjobd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_oddjobd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package oddjob removed or service oddjobd is not configured to start" operator="OR">
<ns3:extend_definition comment="oddjob removed" definition_ref="oval:ssg-package_oddjob_removed:def:1" />
<ns3:criteria comment="service oddjobd is not configured to start" operator="AND">
<ns3:criterion comment="oddjobd runlevel 0" test_ref="oval:ssg-test_runlevel0_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 1" test_ref="oval:ssg-test_runlevel1_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 2" test_ref="oval:ssg-test_runlevel2_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 3" test_ref="oval:ssg-test_runlevel3_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 4" test_ref="oval:ssg-test_runlevel4_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 5" test_ref="oval:ssg-test_runlevel5_oddjobd:tst:1" />
<ns3:criterion comment="oddjobd runlevel 6" test_ref="oval:ssg-test_runlevel6_oddjobd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_pcscd_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service pcscd Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The pcscd service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_pcscd_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package pcsc-lite installed and service pcscd is configured to start" operator="AND">
<ns3:extend_definition comment="pcsc-lite installed" definition_ref="oval:ssg-package_pcsc-lite_installed:def:1" />
<ns3:criteria comment="service pcscd is configured to start" operator="OR">
<ns3:criterion comment="pcscd runlevel 0" test_ref="oval:ssg-test_runlevel0_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 1" test_ref="oval:ssg-test_runlevel1_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 2" test_ref="oval:ssg-test_runlevel2_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 3" test_ref="oval:ssg-test_runlevel3_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 4" test_ref="oval:ssg-test_runlevel4_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 5" test_ref="oval:ssg-test_runlevel5_pcscd:tst:1" />
<ns3:criterion comment="pcscd runlevel 6" test_ref="oval:ssg-test_runlevel6_pcscd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_portreserve_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service portreserve Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The portreserve service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_portreserve_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package portreserve removed or service portreserve is not configured to start" operator="OR">
<ns3:extend_definition comment="portreserve removed" definition_ref="oval:ssg-package_portreserve_removed:def:1" />
<ns3:criteria comment="service portreserve is not configured to start" operator="AND">
<ns3:criterion comment="portreserve runlevel 0" test_ref="oval:ssg-test_runlevel0_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 1" test_ref="oval:ssg-test_runlevel1_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 2" test_ref="oval:ssg-test_runlevel2_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 3" test_ref="oval:ssg-test_runlevel3_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 4" test_ref="oval:ssg-test_runlevel4_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 5" test_ref="oval:ssg-test_runlevel5_portreserve:tst:1" />
<ns3:criterion comment="portreserve runlevel 6" test_ref="oval:ssg-test_runlevel6_portreserve:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_postfix_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service postfix Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The postfix service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_postfix_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package postfix installed and service postfix is configured to start" operator="AND">
<ns3:extend_definition comment="postfix installed" definition_ref="oval:ssg-package_postfix_installed:def:1" />
<ns3:criteria comment="service postfix is configured to start" operator="OR">
<ns3:criterion comment="postfix runlevel 0" test_ref="oval:ssg-test_runlevel0_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 1" test_ref="oval:ssg-test_runlevel1_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 2" test_ref="oval:ssg-test_runlevel2_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 3" test_ref="oval:ssg-test_runlevel3_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 4" test_ref="oval:ssg-test_runlevel4_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 5" test_ref="oval:ssg-test_runlevel5_postfix:tst:1" />
<ns3:criterion comment="postfix runlevel 6" test_ref="oval:ssg-test_runlevel6_postfix:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_psacct_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service psacct Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The psacct service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_psacct_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package psacct installed and service psacct is configured to start" operator="AND">
<ns3:extend_definition comment="psacct installed" definition_ref="oval:ssg-package_psacct_installed:def:1" />
<ns3:criteria comment="service psacct is configured to start" operator="OR">
<ns3:criterion comment="psacct runlevel 0" test_ref="oval:ssg-test_runlevel0_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 1" test_ref="oval:ssg-test_runlevel1_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 2" test_ref="oval:ssg-test_runlevel2_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 3" test_ref="oval:ssg-test_runlevel3_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 4" test_ref="oval:ssg-test_runlevel4_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 5" test_ref="oval:ssg-test_runlevel5_psacct:tst:1" />
<ns3:criterion comment="psacct runlevel 6" test_ref="oval:ssg-test_runlevel6_psacct:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_qpidd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service qpidd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The qpidd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_qpidd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package qpid-cpp-server removed or service qpidd is not configured to start" operator="OR">
<ns3:extend_definition comment="qpid-cpp-server removed" definition_ref="oval:ssg-package_qpid-cpp-server_removed:def:1" />
<ns3:criteria comment="service qpidd is not configured to start" operator="AND">
<ns3:criterion comment="qpidd runlevel 0" test_ref="oval:ssg-test_runlevel0_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 1" test_ref="oval:ssg-test_runlevel1_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 2" test_ref="oval:ssg-test_runlevel2_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 3" test_ref="oval:ssg-test_runlevel3_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 4" test_ref="oval:ssg-test_runlevel4_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 5" test_ref="oval:ssg-test_runlevel5_qpidd:tst:1" />
<ns3:criterion comment="qpidd runlevel 6" test_ref="oval:ssg-test_runlevel6_qpidd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_quota_nld_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service quota_nld Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The quota_nld service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_quota_nld_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package quota removed or service quota_nld is not configured to start" operator="OR">
<ns3:extend_definition comment="quota removed" definition_ref="oval:ssg-package_quota_removed:def:1" />
<ns3:criteria comment="service quota_nld is not configured to start" operator="AND">
<ns3:criterion comment="quota_nld runlevel 0" test_ref="oval:ssg-test_runlevel0_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 1" test_ref="oval:ssg-test_runlevel1_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 2" test_ref="oval:ssg-test_runlevel2_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 3" test_ref="oval:ssg-test_runlevel3_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 4" test_ref="oval:ssg-test_runlevel4_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 5" test_ref="oval:ssg-test_runlevel5_quota_nld:tst:1" />
<ns3:criterion comment="quota_nld runlevel 6" test_ref="oval:ssg-test_runlevel6_quota_nld:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rdisc_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rdisc Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rdisc service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rdisc_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package iputils removed or service rdisc is not configured to start" operator="OR">
<ns3:extend_definition comment="iputils removed" definition_ref="oval:ssg-package_iputils_removed:def:1" />
<ns3:criteria comment="service rdisc is not configured to start" operator="AND">
<ns3:criterion comment="rdisc runlevel 0" test_ref="oval:ssg-test_runlevel0_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 1" test_ref="oval:ssg-test_runlevel1_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 2" test_ref="oval:ssg-test_runlevel2_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 3" test_ref="oval:ssg-test_runlevel3_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 4" test_ref="oval:ssg-test_runlevel4_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 5" test_ref="oval:ssg-test_runlevel5_rdisc:tst:1" />
<ns3:criterion comment="rdisc runlevel 6" test_ref="oval:ssg-test_runlevel6_rdisc:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_restorecond_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service restorecond Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The restorecond service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_restorecond_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package policycoreutils installed and service restorecond is configured to start" operator="AND">
<ns3:extend_definition comment="policycoreutils installed" definition_ref="oval:ssg-package_policycoreutils_installed:def:1" />
<ns3:criteria comment="service restorecond is configured to start" operator="OR">
<ns3:criterion comment="restorecond runlevel 0" test_ref="oval:ssg-test_runlevel0_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 1" test_ref="oval:ssg-test_runlevel1_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 2" test_ref="oval:ssg-test_runlevel2_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 3" test_ref="oval:ssg-test_runlevel3_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 4" test_ref="oval:ssg-test_runlevel4_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 5" test_ref="oval:ssg-test_runlevel5_restorecond:tst:1" />
<ns3:criterion comment="restorecond runlevel 6" test_ref="oval:ssg-test_runlevel6_restorecond:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rexec_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rexec Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rexec service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rexec_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rexec is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rexec disabled" test_ref="oval:ssg-test_etc_xinetd_rexec_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rhnsd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rhnsd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rhnsd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rhnsd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rhnsd removed or service rhnsd is not configured to start" operator="OR">
<ns3:extend_definition comment="rhnsd removed" definition_ref="oval:ssg-package_rhnsd_removed:def:1" />
<ns3:criteria comment="service rhnsd is not configured to start" operator="AND">
<ns3:criterion comment="rhnsd runlevel 0" test_ref="oval:ssg-test_runlevel0_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 1" test_ref="oval:ssg-test_runlevel1_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 2" test_ref="oval:ssg-test_runlevel2_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 3" test_ref="oval:ssg-test_runlevel3_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 4" test_ref="oval:ssg-test_runlevel4_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 5" test_ref="oval:ssg-test_runlevel5_rhnsd:tst:1" />
<ns3:criterion comment="rhnsd runlevel 6" test_ref="oval:ssg-test_runlevel6_rhnsd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rhsmcertd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rhsmcertd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rhsmcertd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rhsmcertd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package subscription-manager removed or service rhsmcertd is not configured to start" operator="OR">
<ns3:extend_definition comment="subscription-manager removed" definition_ref="oval:ssg-package_subscription-manager_removed:def:1" />
<ns3:criteria comment="service rhsmcertd is not configured to start" operator="AND">
<ns3:criterion comment="rhsmcertd runlevel 0" test_ref="oval:ssg-test_runlevel0_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 1" test_ref="oval:ssg-test_runlevel1_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 2" test_ref="oval:ssg-test_runlevel2_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 3" test_ref="oval:ssg-test_runlevel3_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 4" test_ref="oval:ssg-test_runlevel4_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 5" test_ref="oval:ssg-test_runlevel5_rhsmcertd:tst:1" />
<ns3:criterion comment="rhsmcertd runlevel 6" test_ref="oval:ssg-test_runlevel6_rhsmcertd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rlogin_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rlogin Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rlogin service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rlogin_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rlogin is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rlogin disabled" test_ref="oval:ssg-test_etc_xinetd_rlogin_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcbind_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcbind Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcbind service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcbind_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rpcbind removed or service rpcbind is not configured to start" operator="OR">
<ns3:extend_definition comment="rpcbind removed" definition_ref="oval:ssg-package_rpcbind_removed:def:1" />
<ns3:criteria comment="service rpcbind is not configured to start" operator="AND">
<ns3:criterion comment="rpcbind runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcbind:tst:1" />
<ns3:criterion comment="rpcbind runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcbind:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcgssd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcgssd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcgssd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcgssd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcgssd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcgssd is not configured to start" operator="AND">
<ns3:criterion comment="rpcgssd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcgssd:tst:1" />
<ns3:criterion comment="rpcgssd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcgssd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcidmapd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcidmapd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcidmapd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcidmapd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcidmapd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcidmapd is not configured to start" operator="AND">
<ns3:criterion comment="rpcidmapd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcidmapd:tst:1" />
<ns3:criterion comment="rpcidmapd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcidmapd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rpcsvcgssd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rpcsvcgssd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rpcsvcgssd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rpcsvcgssd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package nfs-utils removed or service rpcsvcgssd is not configured to start" operator="OR">
<ns3:extend_definition comment="nfs-utils removed" definition_ref="oval:ssg-package_nfs-utils_removed:def:1" />
<ns3:criteria comment="service rpcsvcgssd is not configured to start" operator="AND">
<ns3:criterion comment="rpcsvcgssd runlevel 0" test_ref="oval:ssg-test_runlevel0_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 1" test_ref="oval:ssg-test_runlevel1_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 2" test_ref="oval:ssg-test_runlevel2_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 3" test_ref="oval:ssg-test_runlevel3_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 4" test_ref="oval:ssg-test_runlevel4_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 5" test_ref="oval:ssg-test_runlevel5_rpcsvcgssd:tst:1" />
<ns3:criterion comment="rpcsvcgssd runlevel 6" test_ref="oval:ssg-test_runlevel6_rpcsvcgssd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rsh_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rsh Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rsh service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_rsh_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsh-server removed or service rsh is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg-package_rsh-server_removed:def:1" />
<ns3:criterion comment="rsh disabled" test_ref="oval:ssg-test_etc_xinetd_rsh_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_rsyslog_enabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service rsyslog Enabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The rsyslog service should be enabled if possible.</ns3:description>
<ns3:reference ref_id="service_rsyslog_enabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package rsyslog installed and service rsyslog is configured to start" operator="AND">
<ns3:extend_definition comment="rsyslog installed" definition_ref="oval:ssg-package_rsyslog_installed:def:1" />
<ns3:criteria comment="service rsyslog is configured to start" operator="OR">
<ns3:criterion comment="rsyslog runlevel 0" test_ref="oval:ssg-test_runlevel0_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 1" test_ref="oval:ssg-test_runlevel1_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 2" test_ref="oval:ssg-test_runlevel2_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 3" test_ref="oval:ssg-test_runlevel3_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 4" test_ref="oval:ssg-test_runlevel4_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 5" test_ref="oval:ssg-test_runlevel5_rsyslog:tst:1" />
<ns3:criterion comment="rsyslog runlevel 6" test_ref="oval:ssg-test_runlevel6_rsyslog:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_saslauthd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service saslauthd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The saslauthd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_saslauthd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package cyrus-sasl removed or service saslauthd is not configured to start" operator="OR">
<ns3:extend_definition comment="cyrus-sasl removed" definition_ref="oval:ssg-package_cyrus-sasl_removed:def:1" />
<ns3:criteria comment="service saslauthd is not configured to start" operator="AND">
<ns3:criterion comment="saslauthd runlevel 0" test_ref="oval:ssg-test_runlevel0_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 1" test_ref="oval:ssg-test_runlevel1_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 2" test_ref="oval:ssg-test_runlevel2_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 3" test_ref="oval:ssg-test_runlevel3_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 4" test_ref="oval:ssg-test_runlevel4_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 5" test_ref="oval:ssg-test_runlevel5_saslauthd:tst:1" />
<ns3:criterion comment="saslauthd runlevel 6" test_ref="oval:ssg-test_runlevel6_saslauthd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_smartd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service smartd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The smartd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_smartd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package smartmontools removed or service smartd is not configured to start" operator="OR">
<ns3:extend_definition comment="smartmontools removed" definition_ref="oval:ssg-package_smartmontools_removed:def:1" />
<ns3:criteria comment="service smartd is not configured to start" operator="AND">
<ns3:criterion comment="smartd runlevel 0" test_ref="oval:ssg-test_runlevel0_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 1" test_ref="oval:ssg-test_runlevel1_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 2" test_ref="oval:ssg-test_runlevel2_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 3" test_ref="oval:ssg-test_runlevel3_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 4" test_ref="oval:ssg-test_runlevel4_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 5" test_ref="oval:ssg-test_runlevel5_smartd:tst:1" />
<ns3:criterion comment="smartd runlevel 6" test_ref="oval:ssg-test_runlevel6_smartd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_smb_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service smb Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The smb service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_smb_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="service smb is not configured to start" operator="AND">
<ns3:criterion comment="smb runlevel 0" test_ref="oval:ssg-test_runlevel0_smb:tst:1" />
<ns3:criterion comment="smb runlevel 1" test_ref="oval:ssg-test_runlevel1_smb:tst:1" />
<ns3:criterion comment="smb runlevel 2" test_ref="oval:ssg-test_runlevel2_smb:tst:1" />
<ns3:criterion comment="smb runlevel 3" test_ref="oval:ssg-test_runlevel3_smb:tst:1" />
<ns3:criterion comment="smb runlevel 4" test_ref="oval:ssg-test_runlevel4_smb:tst:1" />
<ns3:criterion comment="smb runlevel 5" test_ref="oval:ssg-test_runlevel5_smb:tst:1" />
<ns3:criterion comment="smb runlevel 6" test_ref="oval:ssg-test_runlevel6_smb:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_snmpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service snmpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The snmpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_snmpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package net-snmp removed or service snmpd is not configured to start" operator="OR">
<ns3:extend_definition comment="net-snmp removed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criteria comment="service snmpd is not configured to start" operator="AND">
<ns3:criterion comment="snmpd runlevel 0" test_ref="oval:ssg-test_runlevel0_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 1" test_ref="oval:ssg-test_runlevel1_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 2" test_ref="oval:ssg-test_runlevel2_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 3" test_ref="oval:ssg-test_runlevel3_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 4" test_ref="oval:ssg-test_runlevel4_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 5" test_ref="oval:ssg-test_runlevel5_snmpd:tst:1" />
<ns3:criterion comment="snmpd runlevel 6" test_ref="oval:ssg-test_runlevel6_snmpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_squid_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service squid Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The squid service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_squid_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package squid removed or service squid is not configured to start" operator="OR">
<ns3:extend_definition comment="squid removed" definition_ref="oval:ssg-package_squid_removed:def:1" />
<ns3:criteria comment="service squid is not configured to start" operator="AND">
<ns3:criterion comment="squid runlevel 0" test_ref="oval:ssg-test_runlevel0_squid:tst:1" />
<ns3:criterion comment="squid runlevel 1" test_ref="oval:ssg-test_runlevel1_squid:tst:1" />
<ns3:criterion comment="squid runlevel 2" test_ref="oval:ssg-test_runlevel2_squid:tst:1" />
<ns3:criterion comment="squid runlevel 3" test_ref="oval:ssg-test_runlevel3_squid:tst:1" />
<ns3:criterion comment="squid runlevel 4" test_ref="oval:ssg-test_runlevel4_squid:tst:1" />
<ns3:criterion comment="squid runlevel 5" test_ref="oval:ssg-test_runlevel5_squid:tst:1" />
<ns3:criterion comment="squid runlevel 6" test_ref="oval:ssg-test_runlevel6_squid:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_sshd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service sshd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sshd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_sshd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package openssh-server removed or service sshd is not configured to start" operator="OR">
<ns3:extend_definition comment="openssh-server removed" definition_ref="oval:ssg-package_openssh-server_removed:def:1" />
<ns3:criteria comment="service sshd is not configured to start" operator="AND">
<ns3:criterion comment="sshd runlevel 0" test_ref="oval:ssg-test_runlevel0_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 1" test_ref="oval:ssg-test_runlevel1_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 2" test_ref="oval:ssg-test_runlevel2_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 3" test_ref="oval:ssg-test_runlevel3_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 4" test_ref="oval:ssg-test_runlevel4_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 5" test_ref="oval:ssg-test_runlevel5_sshd:tst:1" />
<ns3:criterion comment="sshd runlevel 6" test_ref="oval:ssg-test_runlevel6_sshd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_sysstat_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service sysstat Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sysstat service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_sysstat_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package sysstat removed or service sysstat is not configured to start" operator="OR">
<ns3:extend_definition comment="sysstat removed" definition_ref="oval:ssg-package_sysstat_removed:def:1" />
<ns3:criteria comment="service sysstat is not configured to start" operator="AND">
<ns3:criterion comment="sysstat runlevel 0" test_ref="oval:ssg-test_runlevel0_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 1" test_ref="oval:ssg-test_runlevel1_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 2" test_ref="oval:ssg-test_runlevel2_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 3" test_ref="oval:ssg-test_runlevel3_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 4" test_ref="oval:ssg-test_runlevel4_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 5" test_ref="oval:ssg-test_runlevel5_sysstat:tst:1" />
<ns3:criterion comment="sysstat runlevel 6" test_ref="oval:ssg-test_runlevel6_sysstat:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_telnetd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable telnet Service</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable telnet Service</ns3:description>
<ns3:reference ref_id="service_telnetd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package telnet-server removed or service telnetd is not configured to start" operator="OR">
<ns3:extend_definition comment="rpm package telnet-server removed" definition_ref="oval:ssg-package_telnet-server_removed:def:1" />
<ns3:criterion comment="Disable telnet Service" test_ref="oval:ssg-test_service_telnetd_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_tftp_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service tftp Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The tftp service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_tftp_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package tftp-server removed or service tftp is not configured to start" operator="OR">
<ns3:extend_definition comment="tftp-server removed" definition_ref="oval:ssg-package_tftp-server_removed:def:1" />
<ns3:criteria comment="service tftp is not configured to start" operator="AND">
<ns3:criterion comment="tftp runlevel 0" test_ref="oval:ssg-test_runlevel0_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 1" test_ref="oval:ssg-test_runlevel1_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 2" test_ref="oval:ssg-test_runlevel2_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 3" test_ref="oval:ssg-test_runlevel3_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 4" test_ref="oval:ssg-test_runlevel4_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 5" test_ref="oval:ssg-test_runlevel5_tftp:tst:1" />
<ns3:criterion comment="tftp runlevel 6" test_ref="oval:ssg-test_runlevel6_tftp:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_vsftpd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service vsftpd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The vsftpd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_vsftpd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package vsftpd removed or service vsftpd is not configured to start" operator="OR">
<ns3:extend_definition comment="vsftpd removed" definition_ref="oval:ssg-package_vsftpd_removed:def:1" />
<ns3:criteria comment="service vsftpd is not configured to start" operator="AND">
<ns3:criterion comment="vsftpd runlevel 0" test_ref="oval:ssg-test_runlevel0_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 1" test_ref="oval:ssg-test_runlevel1_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 2" test_ref="oval:ssg-test_runlevel2_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 3" test_ref="oval:ssg-test_runlevel3_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 4" test_ref="oval:ssg-test_runlevel4_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 5" test_ref="oval:ssg-test_runlevel5_vsftpd:tst:1" />
<ns3:criterion comment="vsftpd runlevel 6" test_ref="oval:ssg-test_runlevel6_vsftpd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_xinetd_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service xinetd Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The xinetd service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_xinetd_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package xinetd removed or service xinetd is not configured to start" operator="OR">
<ns3:extend_definition comment="xinetd removed" definition_ref="oval:ssg-package_xinetd_removed:def:1" />
<ns3:criteria comment="service xinetd is not configured to start" operator="AND">
<ns3:criterion comment="xinetd runlevel 0" test_ref="oval:ssg-test_runlevel0_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 1" test_ref="oval:ssg-test_runlevel1_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 2" test_ref="oval:ssg-test_runlevel2_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 3" test_ref="oval:ssg-test_runlevel3_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 4" test_ref="oval:ssg-test_runlevel4_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 5" test_ref="oval:ssg-test_runlevel5_xinetd:tst:1" />
<ns3:criterion comment="xinetd runlevel 6" test_ref="oval:ssg-test_runlevel6_xinetd:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-service_ypbind_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Service ypbind Disabled</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The ypbind service should be disabled if possible.</ns3:description>
<ns3:reference ref_id="service_ypbind_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package ypbind removed or service ypbind is not configured to start" operator="OR">
<ns3:extend_definition comment="ypbind removed" definition_ref="oval:ssg-package_ypbind_removed:def:1" />
<ns3:criteria comment="service ypbind is not configured to start" operator="AND">
<ns3:criterion comment="ypbind runlevel 0" test_ref="oval:ssg-test_runlevel0_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 1" test_ref="oval:ssg-test_runlevel1_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 2" test_ref="oval:ssg-test_runlevel2_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 3" test_ref="oval:ssg-test_runlevel3_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 4" test_ref="oval:ssg-test_runlevel4_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 5" test_ref="oval:ssg-test_runlevel5_ypbind:tst:1" />
<ns3:criterion comment="ypbind runlevel 6" test_ref="oval:ssg-test_runlevel6_ypbind:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_ip6tables_default_rule:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the INPUT built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the INPUT built-in chain.</ns3:description>
<ns3:reference ref_id="set_ip6tables_default_rule" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":INPUT DROP [0:0]" test_ref="oval:ssg-test_ip6tables_input_drop:tst:1" />
<ns3:criterion comment=":INPUT ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_ip6tables_input_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_iptables_default_rule:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the INPUT built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the INPUT built-in chain.</ns3:description>
<ns3:reference ref_id="set_iptables_default_rule" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":INPUT DROP [0:0]" test_ref="oval:ssg-test_iptables_input_drop:tst:1" />
<ns3:criterion comment=":INPUT ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_iptables_input_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_iptables_default_rule_forward:def:1" version="2">
<ns3:metadata>
<ns3:title>Change the default policy to DROP (from ACCEPT) for
the FORWARD built-in chain</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Change the default policy to DROP (from ACCEPT)
for the FORWARD built-in chain.</ns3:description>
<ns3:reference ref_id="set_iptables_default_rule_forward" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment=":FORWARD DROP [0:0]" test_ref="oval:ssg-test_iptables_forward_drop:tst:1" />
<ns3:criterion comment=":FORWARD ACCEPT [0:0]" negate="true" test_ref="oval:ssg-test_iptables_forward_accept:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-smartcard_auth:def:1" version="2">
<ns3:metadata>
<ns3:title>Enable Smart Card Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Enable Smart Card logins</ns3:description>
<ns3:reference ref_id="smartcard_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="smart card authentication is configured" operator="AND">
<ns3:extend_definition comment="pam_pkcs11 package is installed" definition_ref="oval:ssg-package_pam_pkcs11_installed:def:1" />
<ns3:extend_definition comment="esc package is installed" definition_ref="oval:ssg-package_esc_installed:def:1" />
<ns3:extend_definition comment="pcscd service is enabled" definition_ref="oval:ssg-service_pcscd_enabled:def:1" />
<ns3:criterion comment="cert_policy directive contains oscp_on" test_ref="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1" />
<ns3:criteria comment="smart card authentication is enabled or required in system-auth" operator="OR">
<ns3:criterion comment="smart card authentication is enabled in /etc/pam.d/system-auth" test_ref="oval:ssg-test_smart_card_enabled_system_auth:tst:1" />
<ns3:criterion comment="smart card is required in /etc/pam.d/system-auth" test_ref="oval:ssg-test_smart_card_required_system_auth:tst:1" />
</ns3:criteria>
<ns3:criterion comment="smart card is required in /etc/pam.d/smartcard-auth" test_ref="oval:ssg-test_smart_card_required_smartcard_auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "fs.suid_dumpable" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="fs.suid_dumpable configuration setting check" definition_ref="oval:ssg-sysctl_static_fs_suid_dumpable:def:1" />
<ns3:extend_definition comment="fs.suid_dumpable runtime setting check" definition_ref="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.dmesg_restrict" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.dmesg_restrict configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_dmesg_restrict:def:1" />
<ns3:extend_definition comment="kernel.dmesg_restrict runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_dmesg_restrict:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.exec-shield" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.exec-shield configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_exec_shield:def:1" />
<ns3:extend_definition comment="kernel.exec-shield runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_exec_shield:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "kernel.randomize_va_space" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="kernel.randomize_va_space configuration setting check" definition_ref="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1" />
<ns3:extend_definition comment="kernel.randomize_va_space runtime setting check" definition_ref="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.log_martians" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.log_martians configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.log_martians runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.all.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.all.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.all.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.rp_filter" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.rp_filter configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.rp_filter runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.secure_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.secure_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.secure_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.conf.default.send_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.conf.default.send_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1" />
<ns3:extend_definition comment="net.ipv4.conf.default.send_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.icmp_echo_ignore_broadcasts" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
<ns3:extend_definition comment="net.ipv4.icmp_echo_ignore_broadcasts runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.icmp_ignore_bogus_error_responses" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
<ns3:extend_definition comment="net.ipv4.icmp_ignore_bogus_error_responses runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.ip_forward" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.ip_forward configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1" />
<ns3:extend_definition comment="net.ipv4.ip_forward runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv4.tcp_syncookies" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv4.tcp_syncookies configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1" />
<ns3:extend_definition comment="net.ipv4.tcp_syncookies runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_ra set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_redirects set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.accept_source_route set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.all.forwarding" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.all.forwarding set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.all.forwarding configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.all.forwarding runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_ra" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_ra set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_ra configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_ra runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_redirects" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_redirects set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_redirects configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_redirects runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route:def:1" version="4">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration and Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The "net.ipv6.conf.default.accept_source_route" kernel parameter should be set to the appropriate value in both system configuration and system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria comment="IPv6 disabled or net.ipv6.conf.default.accept_source_route set correctly" operator="OR">
<ns3:extend_definition comment="is IPv6 enabled?" definition_ref="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="net.ipv6.conf.default.accept_source_route configuration setting check" definition_ref="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1" />
<ns3:extend_definition comment="net.ipv6.conf.default.accept_source_route runtime setting check" definition_ref="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter fs.suid_dumpable set to 0" test_ref="oval:ssg-test_runtime_fs_suid_dumpable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.dmesg_restrict" parameter should be set to "1" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.dmesg_restrict set to 1" test_ref="oval:ssg-test_runtime_kernel_dmesg_restrict:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.exec-shield" parameter should be set to "1" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.exec-shield set to 1" test_ref="oval:ssg-test_runtime_kernel_exec_shield:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter kernel.randomize_va_space set to 2" test_ref="oval:ssg-test_runtime_kernel_randomize_va_space:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_log_martians:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_rp_filter:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_secure_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_conf_all_send_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_rp_filter:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_secure_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_conf_default_send_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.ip_forward set to 0" test_ref="oval:ssg-test_runtime_net_ipv4_ip_forward:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv4.tcp_syncookies set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv4_tcp_syncookies:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_ra set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_ra:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_all_forwarding:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.all.forwarding set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_all_forwarding:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_ra set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_ra:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_redirects:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_runtime_net_ipv6_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Runtime Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in system runtime.</ns3:description>
<ns3:reference ref_id="sysctl_runtime_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_source_route set to the appropriate value" test_ref="oval:ssg-test_runtime_net_ipv6_conf_default_accept_source_route:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_fs_suid_dumpable:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "fs.suid_dumpable" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "fs.suid_dumpable" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_fs_suid_dumpable" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter fs.suid_dumpable set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_fs_suid_dumpable:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater fs.suid_dumpable set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_fs_suid_dumpable:tst:1" />
<ns3:criterion comment="Kernel static parameter fs.suid_dumpable not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_fs_suid_dumpable_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_dmesg_restrict:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.dmesg_restrict" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.dmesg_restrict" parameter should be set to "1" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_dmesg_restrict" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.dmesg_restrict set to 1 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_dmesg_restrict:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.dmesg_restrict set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_dmesg_restrict:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.dmesg_restrict not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_dmesg_restrict_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_exec_shield:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.exec-shield" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.exec-shield" parameter should be set to "1" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_exec_shield" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.exec-shield set to 1 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_exec_shield:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.exec-shield set to 1 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_exec_shield:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.exec-shield not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_exec_shield_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_kernel_randomize_va_space:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "kernel.randomize_va_space" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "kernel.randomize_va_space" parameter should be set to "2" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_kernel_randomize_va_space" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter kernel.randomize_va_space set to 2 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_kernel_randomize_va_space:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater kernel.randomize_va_space set to 2 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_kernel_randomize_va_space:tst:1" />
<ns3:criterion comment="Kernel static parameter kernel.randomize_va_space not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_kernel_randomize_va_space_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_log_martians:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.log_martians" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.log_martians" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_log_martians" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.log_martians set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_log_martians:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.log_martians not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.rp_filter" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.rp_filter" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_rp_filter:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.rp_filter not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.secure_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.secure_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.secure_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_all_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.all.send_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.all.send_redirects" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_all_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.all.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_send_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.all.send_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_rp_filter:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.rp_filter" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.rp_filter" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_rp_filter" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.rp_filter set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_rp_filter:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.rp_filter not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_secure_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.secure_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.secure_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_secure_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.secure_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.secure_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_conf_default_send_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.conf.default.send_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.conf.default.send_redirects" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_conf_default_send_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.conf.default.send_redirects set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_send_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.conf.default.send_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_echo_ignore_broadcasts" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_echo_ignore_broadcasts" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_icmp_echo_ignore_broadcasts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.icmp_echo_ignore_broadcasts set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_echo_ignore_broadcasts not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.icmp_ignore_bogus_error_responses" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.icmp_ignore_bogus_error_responses" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_icmp_ignore_bogus_error_responses" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.icmp_ignore_bogus_error_responses set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.icmp_ignore_bogus_error_responses not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_ip_forward:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.ip_forward" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.ip_forward" parameter should be set to "0" in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_ip_forward" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.ip_forward set to 0 in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_ip_forward:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.ip_forward set to 0 in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_ip_forward:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.ip_forward not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_ip_forward_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv4_tcp_syncookies:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv4.tcp_syncookies" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv4.tcp_syncookies" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv4_tcp_syncookies" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv4.tcp_syncookies set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv4_tcp_syncookies:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv4.tcp_syncookies not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_ra" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_ra" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_ra:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_ra not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_all_forwarding:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.all.forwarding" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.all.forwarding" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_all_forwarding" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.all.forwarding set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_forwarding:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.all.forwarding not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_ra:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_ra" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_ra" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_ra" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_ra set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_ra:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_ra not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_redirects:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_redirects" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_redirects" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_redirects" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_redirects set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_redirects not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysctl_static_net_ipv6_conf_default_accept_source_route:def:1" version="3">
<ns3:metadata>
<ns3:title>Kernel "net.ipv6.conf.default.accept_source_route" Parameter Configuration Check</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The kernel "net.ipv6.conf.default.accept_source_route" parameter should be set to the appropriate value in the system configuration.</ns3:description>
<ns3:reference ref_id="sysctl_static_net_ipv6_conf_default_accept_source_route" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.d/*" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="Kernel static paramater net.ipv6.conf.default.accept_source_route set to the appropriate value in /etc/sysctl.conf" test_ref="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:tst:1" />
<ns3:criterion comment="Kernel static parameter net.ipv6.conf.default.accept_source_route not present in some /etc/sysctl.d/* file" test_ref="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route_not_used:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-xwindows_runlevel_setting:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable X Windows Startup By Setting Runlevel</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks /etc/inittab to ensure that default runlevel is set to 3.</ns3:description>
<ns3:reference ref_id="xwindows_runlevel_setting" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="default runlevel is 3" test_ref="oval:ssg-test_etc_inittab_default_runlevel:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-account_disable_post_pw_expiration:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Accounts to Expire Following Password Expiration</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The accounts should be configured to expire automatically following password expiration.</ns3:description>
<ns3:reference ref_id="account_disable_post_pw_expiration" source="ssg" /></ns3:metadata>
<ns3:criteria comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd">
<ns3:criterion test_ref="oval:ssg-test_etc_default_useradd_inactive:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-account_unique_name:def:1" version="1">
<ns3:metadata>
<ns3:title>Set All Accounts To Have Unique Names</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>All accounts on the system should have unique names for proper accountability.</ns3:description>
<ns3:reference ref_id="account_unique_name" source="ssg" /></ns3:metadata>
<ns3:criteria comment="There should not exist duplicate user name entries in /etc/passwd">
<ns3:criterion test_ref="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_max_concurrent_login_sessions:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Maximum Number of Concurrent Login Sessions Per User</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The maximum number of concurrent login sessions per user should meet
minimum requirements.</ns3:description>
<ns3:reference ref_id="accounts_max_concurrent_login_sessions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" test_ref="oval:ssg-test_limitsd_maxlogins:tst:1" />
<ns3:criteria operator="AND">
<ns3:criterion comment="the value maxlogins should not be set at all in /etc/security/limits.d/*.conf" negate="true" test_ref="oval:ssg-test_limitsd_maxlogins_exists:tst:1" />
<ns3:criterion comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" test_ref="oval:ssg-test_maxlogins:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_maximum_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The maximum password age policy should meet minimum requirements.</ns3:description>
<ns3:reference ref_id="accounts_maximum_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria comment="The value PASS_MAX_DAYS should be set appropriately in /etc/login.defs">
<ns3:criterion test_ref="oval:ssg-test_pass_max_days:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_minimum_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The minimum password age policy should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_minimum_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs">
<ns3:criterion test_ref="oval:ssg-test_pass_min_days:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_no_uid_except_zero:def:1" version="1">
<ns3:metadata>
<ns3:title>UID 0 Belongs Only To Root</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Only the root account should be assigned a user id of 0.</ns3:description>
<ns3:reference ref_id="accounts_no_uid_except_zero" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="tests that there are no accounts with UID 0 except root in the /etc/passwd file" test_ref="oval:ssg-test_accounts_no_uid_except_root:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_all_shadowed:def:1" version="1">
<ns3:metadata>
<ns3:title>All Password Hashes Shadowed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>All password hashes should be shadowed.</ns3:description>
<ns3:reference ref_id="accounts_password_all_shadowed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="password hashes are shadowed" test_ref="oval:ssg-test_accounts_password_all_shadowed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_minlen_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The password minimum length should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_password_minlen_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_pass_min_len:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_pam_unix_remember:def:1" version="2">
<ns3:metadata>
<ns3:title>Limit Password Reuse</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The passwords to remember should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_password_pam_unix_remember" source="ssg" /></ns3:metadata>
<ns3:criteria comment="remember parameter of pam_unix.so or pam_pwhistory.so is set correctly" operator="OR">
<ns3:criterion comment="remember parameter of pam_unix.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_unix_remember:tst:1" />
<ns3:criterion comment="remember parameter of pam_pwhistory.so is set correctly" test_ref="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_password_warn_age_login_defs:def:1" version="3">
<ns3:metadata>
<ns3:title>Set Password Expiration Parameters</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The password expiration warning age should be set appropriately.</ns3:description>
<ns3:reference ref_id="accounts_password_warn_age_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_pass_warn_age:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_deny:def:1" version="4">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_deny" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="pam_faillock.so preauth silent set in system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so authfail deny value set in system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so set in account phase of system-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so preauth silent set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so authfail deny value set in password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1" />
<ns3:criterion comment="pam_faillock.so set in account phase of password-auth" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_interval:def:1" version="2">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_interval" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="preauth default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_password-auth:tst:1" />
<ns3:criterion comment="preauth default is set to 900" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_passwords_pam_faillock_unlock_time:def:1" version="2">
<ns3:metadata>
<ns3:title>Lock out account after failed login attempts</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The number of allowed failed logins should be set correctly.</ns3:description>
<ns3:reference ref_id="accounts_passwords_pam_faillock_unlock_time" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="preauth default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:tst:1" />
<ns3:criterion comment="authfail default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_password-auth:tst:1" />
<ns3:criterion comment="preauth default is set to 604800" test_ref="oval:ssg-test_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_root_path_dirs_no_write:def:1" version="2">
<ns3:metadata>
<ns3:title>Write permissions are disabled for group and other in all
directories in Root's Path</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Check each directory in root's path and make use it does
not grant write permission to group and other</ns3:description>
<ns3:reference ref_id="accounts_root_path_dirs_no_write" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Check that write permission to group and other in root's path is denied">
<ns3:criterion comment="Check for write permission to group and other in root's path" test_ref="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_tmout:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Interactive Session Timeout</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks interactive shell timeout</ns3:description>
<ns3:reference ref_id="accounts_tmout" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="TMOUT value in /etc/profile >= var_accounts_tmout" test_ref="oval:ssg-test_etc_profile_tmout:tst:1" />
<ns3:criterion comment="TMOUT value in /etc/profile.d/*.sh >= var_accounts_tmout" test_ref="oval:ssg-test_etc_profiled_tmout:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_bashrc:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values set for bash</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for users of the bash shell</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_bashrc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_bashrc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_csh_cshrc:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values set for csh</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for users of the csh shell</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_csh_cshrc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_csh_cshrc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_login_defs:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values in /etc/login.defs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for all users specified in /etc/login.defs</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_login_defs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-accounts_umask_etc_profile:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that Users Have Sensible Umask Values in /etc/profile</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The default umask for all users should be set correctly</ns3:description>
<ns3:reference ref_id="accounts_umask_etc_profile" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_accounts_user_umask_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_accounts_umask_etc_profile:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_build_database:def:1" version="2">
<ns3:metadata>
<ns3:title>Aide Database Must Exist</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>The aide database must be initialized.</ns3:description>
<ns3:reference ref_id="aide_build_database" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_aide_build_new_database_absolute_path:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_aide_operational_database_absolute_path:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_periodic_cron_checking:def:1" version="3">
<ns3:metadata>
<ns3:title>Configure Periodic Execution of AIDE</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, AIDE does not install itself for periodic
execution. Periodically running AIDE is necessary to reveal
unexpected changes in installed files.
</ns3:description>
<ns3:reference ref_id="aide_periodic_cron_checking" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_periodic_cron_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_crond_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron" test_ref="oval:ssg-test_aide_var_cron_checking:tst:1" />
<ns3:criterion comment="run aide daily with cron.(daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_checking:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_scan_notification:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure Notification of Post-AIDE Scan Details</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should notify appropriate personnel of the details
of a scan after the scan has been run.</ns3:description>
<ns3:reference ref_id="aide_scan_notification" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_scan_notification:tst:1" />
<ns3:criterion comment="notify personnel when aide completes" test_ref="oval:ssg-test_aide_var_cron_notification:tst:1" />
<ns3:criterion comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" test_ref="oval:ssg-test_aide_crontabs_notification:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_use_fips_hashes:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Use FIPS 140-2 for Validating Hashes</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to use the FIPS 140-2
cryptographic hashes.</ns3:description>
<ns3:reference ref_id="aide_use_fips_hashes" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="non-FIPS hashes are not configured" test_ref="oval:ssg-test_aide_non_fips_hashes:tst:1" />
<ns3:criterion comment="FIPS hashes are configured" test_ref="oval:ssg-test_aide_use_fips_hashes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_verify_acls:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Verify Access Control Lists (ACLs)</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to verify Access Control Lists (ACLs).</ns3:description>
<ns3:reference ref_id="aide_verify_acls" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="acl is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_acls:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-aide_verify_ext_attributes:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure AIDE to Verify Extended Attributes</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>AIDE should be configured to verify extended file attributes.</ns3:description>
<ns3:reference ref_id="aide_verify_ext_attributes" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1" />
<ns3:criterion comment="xattrs is set in /etc/aide.conf" test_ref="oval:ssg-test_aide_verify_ext_attributes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>The syslog Plugin Of the Audit Event Multiplexor (audispd) Is Activated</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>active setting in /etc/audisp/plugins.d/syslog.conf is set to 'yes'</ns3:description>
<ns3:reference ref_id="auditd_audispd_syslog_plugin_activated" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="active setting in syslog.conf" test_ref="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_conf_log_group_not_root:def:1" version="1">
<ns3:metadata>
<ns3:title>'log_group' Not Set To 'root' In /etc/audit/auditd.conf</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Verify 'log_group' is not set to 'root' in
/etc/audit/auditd.conf.</ns3:description>
<ns3:reference ref_id="auditd_conf_log_group_not_root" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Verify 'log_group' not set to 'root' in /etc/audit/auditd.conf" test_ref="oval:ssg-test_auditd_conf_log_group_not_root:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_action_mail_acct:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Email Account to Notify Upon Action</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>action_mail_acct setting in /etc/audit/auditd.conf is set to a certain account</ns3:description>
<ns3:reference ref_id="auditd_data_retention_action_mail_acct" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="action_mail_acct setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Disk is Low on Space</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_admin_space_left_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="admin_space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_flush:def:1" version="1">
<ns3:metadata>
<ns3:title>Auditd priority for flushing data to disk</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The setting for flush in /etc/audit/auditd.conf</ns3:description>
<ns3:reference ref_id="auditd_data_retention_flush" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="flush setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_flush:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Maximum Log File Size</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>max_log_file setting in /etc/audit/auditd.conf is set to at least a certain value</ns3:description>
<ns3:reference ref_id="auditd_data_retention_max_log_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="max_log_file setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_max_log_file_action:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Maximum Log Size Reached</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>max_log_file_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_max_log_file_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="max_log_file_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_num_logs:def:1" version="2">
<ns3:metadata>
<ns3:title>Auditd Maximum Number of Logs to Retain</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>num_logs setting in /etc/audit/auditd.conf is set to at least a certain value</ns3:description>
<ns3:reference ref_id="auditd_data_retention_num_logs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="num_logs setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_num_logs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_space_left_action:def:1" version="3">
<ns3:metadata>
<ns3:title>Auditd Action to Take When Disk Starting to Run Low on Space</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>space_left_action setting in /etc/audit/auditd.conf is set to a certain action</ns3:description>
<ns3:reference ref_id="auditd_data_retention_space_left_action" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="space_left_action setting in auditd.conf" test_ref="oval:ssg-test_auditd_data_retention_space_left_action:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-banner_etc_issue:def:1" version="2">
<ns3:metadata>
<ns3:title>System Login Banner Compliance</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The system login banner text should be set correctly.</ns3:description>
<ns3:reference ref_id="banner_etc_issue" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/etc/issue is set appropriately" test_ref="oval:ssg-test_banner_etc_issue:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-cups_disable_browsing:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Printer Browsing Entirely if Possible</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The CUPS print service can be configured to broadcast a list
of available printers to the network. Other machines on the network, also
running the CUPS print service, can be configured to listen to these
broadcasts and add and configure these printers for immediate use. By
disabling this browsing capability, the machine will no longer generate
or receive such broadcasts.</ns3:description>
<ns3:reference ref_id="cups_disable_browsing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Ensure remote printer browsing is off" test_ref="oval:ssg-test_cups_disable_browsing_browsing_off:tst:1" />
<ns3:criterion comment="Ensure no incoming printer information packets are allowed" test_ref="oval:ssg-test_cups_disable_browsing_browseallow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-cups_disable_printserver:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Printer Server if Possible</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>By default, locally configured printers will not be shared
over the network, but if this functionality has somehow been enabled,
these recommendations will disable it again. Be sure to disable outgoing
printer list broadcasts, or remote users will still be able to see the
locally configured printers, even if they cannot actually print to them.
To limit print serving to a particular set of users, use the Policy
directive.</ns3:description>
<ns3:reference ref_id="cups_disable_printserver" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Don't use port directive" test_ref="oval:ssg-test_cups_disable_printserver_disable_port:tst:1" />
<ns3:criterion comment="Do use the listen directive" test_ref="oval:ssg-test_cups_disable_printserver_use_listen:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_etc_httpd_conf:def:1" version="2">
<ns3:metadata>
<ns3:title>Directory /etc/httpd/conf/ Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Directory permissions for /etc/httpd/conf/ should be set to 0750 (or stronger).</ns3:description>
<ns3:reference ref_id="dir_perms_etc_httpd_conf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dir_perms_etc_httpd_conf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_var_log_httpd:def:1" version="2">
<ns3:metadata>
<ns3:title>Directory /var/log/httpd/ Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Directory permissions for /var/log/httpd should be set to 0700 (or stronger).</ns3:description>
<ns3:reference ref_id="dir_perms_var_log_httpd" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_dir_perms_var_log_httpd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that All World-Writable Directories Have Sticky Bits Set</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The sticky bit should be set for all world-writable directories.</ns3:description>
<ns3:reference ref_id="dir_perms_world_writable_sticky_bits" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="all local world writable directories have sticky bit set" negate="true" test_ref="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_host_auth:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Host-Based Authentication</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSH host-based authentication should be disabled.</ns3:description>
<ns3:reference ref_id="disable_host_auth" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check HostbasedAuthentication in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_hostbasedauthentication:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_prelink:def:1" version="3">
<ns3:metadata>
<ns3:title>Disable Prelinking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>The prelinking feature can interfere with the operation of
checksum integrity tools (e.g. AIDE), mitigates the protection provided
by ASLR, and requires additional CPU cycles by software upgrades.
</ns3:description>
<ns3:reference ref_id="disable_prelink" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Conditions for prelinking disabled are satisfied" operator="OR">
<ns3:criteria comment="System is RHEL6 with prelinking disabled" operator="AND">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:criterion comment="Prelinking is disabled" test_ref="oval:ssg-test_prelinking_disabled:tst:1" />
</ns3:criteria>
<ns3:criteria comment="System is RHEL7 or Fedora and prelink RPM is not installed or prelinking is disabled" operator="AND">
<ns3:criteria comment="System is RHEL7 or Fedora" operator="OR">
<ns3:extend_definition comment="Installed OS is RHEL7" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
<ns3:extend_definition comment="Installed OS is Fedora" definition_ref="oval:ssg-installed_OS_is_fedora:def:1" />
</ns3:criteria>
<ns3:criteria comment="prelink RPM package not installed or prelinking disabled" operator="OR">
<ns3:extend_definition comment="prelink RPM package not installed" definition_ref="oval:ssg-package_prelink_removed:def:1" />
<ns3:criterion comment="Prelinking is disabled" test_ref="oval:ssg-test_prelinking_disabled:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-disable_users_coredumps:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Core Dumps</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Core dumps for all users should be disabled</ns3:description>
<ns3:reference ref_id="disable_users_coredumps" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Are core dumps disabled" test_ref="oval:ssg-test_core_dumps_limitsconf:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_gpgcheck_globally_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Yum gpgcheck Globally Activated</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The gpgcheck option should be used to ensure that checking
of an RPM package's signature always occurs prior to its
installation.</ns3:description>
<ns3:reference ref_id="ensure_gpgcheck_globally_activated" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Fedora installed" definition_ref="oval:ssg-installed_OS_is_fedora:def:1" />
<ns3:criterion comment="check value of gpgcheck in /etc/dnf/dnf.conf" test_ref="oval:ssg-test_dnf_ensure_gpgcheck_globally_activated:tst:1" />
</ns3:criteria>
<ns3:criterion comment="check value of gpgcheck in /etc/yum.conf" test_ref="oval:ssg-test_yum_ensure_gpgcheck_globally_activated:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_gpgcheck_never_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure gpgcheck Enabled For All Yum or Dnf Package Repositories</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>Ensure all yum or dnf repositories utilize signature checking.</ns3:description>
<ns3:reference ref_id="ensure_gpgcheck_never_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria comment="ensure all yum or dnf repositories utilize signiature checking" operator="AND">
<ns3:criterion comment="verify no gpgpcheck=0 present in /etc/yum.repos.d files" test_ref="oval:ssg-test_ensure_gpgcheck_never_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_logrotate_activated:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure the logrotate utility performs the automatic rotation of log files on daily basis</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
The frequency of automatic log files rotation performed by the logrotate utility should be configured to run daily
</ns3:description>
<ns3:reference ref_id="ensure_logrotate_activated" source="ssg" /></ns3:metadata>
<ns3:criteria comment="/etc/logrotate.conf contains daily setting or /etc/cron.daily/logrotate file exists" operator="OR">
<ns3:criterion comment="Check if daily is set in /etc/logrotate.conf" test_ref="oval:ssg-test_logrotate_conf_daily_setting:tst:1" />
<ns3:criterion comment="Check if /etc/cron.daily/logrotate file exists (and calls logrotate)" test_ref="oval:ssg-test_cron_daily_logrotate_existence:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ensure_redhat_gpgkey_installed:def:1" version="2">
<ns3:metadata>
<ns3:title>Red Hat Release and Auxiliary gpg-pubkey Packages Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The Red Hat release and auxiliary key packages are required to be installed.</ns3:description>
<ns3:reference ref_id="ensure_redhat_gpgkey_installed" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Vendor GPG keys" operator="OR">
<ns3:criteria comment="Red Hat Vendor Keys" operator="AND">
<ns3:criteria comment="Red Hat Installed" operator="OR">
<ns3:extend_definition comment="RHEL6 installed" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="RHEL7 installed" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
</ns3:criteria>
<ns3:criterion comment="package gpg-pubkey-fd431d51-4ae0493b is installed" test_ref="oval:ssg-test_package_gpgkey-fd431d51-4ae0493b_installed:tst:1" />
<ns3:criterion comment="package gpg-pubkey-2fa658e0-45700c69 is installed" test_ref="oval:ssg-test_package_gpgkey-2fa658e0-45700c69_installed:tst:1" />
</ns3:criteria>
<ns3:criteria comment="CentOS Vendor Keys" operator="OR">
<ns3:criteria comment="CentOS Installed" operator="OR">
<ns3:extend_definition comment="CentOS6 installed" definition_ref="oval:ssg-installed_OS_is_centos6:def:1" />
<ns3:extend_definition comment="CentOS7 installed" definition_ref="oval:ssg-installed_OS_is_centos7:def:1" />
</ns3:criteria>
<ns3:criterion comment="package gpg-pubkey-f4a80eb5-53a7ff4b is installed" test_ref="oval:ssg-test_package_gpgkey-f4a80eb5-53a7ff4b_installed:tst:1" />
<ns3:criterion comment="package gpg-pubkey-c105b9de-4e0fd3a3 is installed" test_ref="oval:ssg-test_package_gpgkey-c105b9de-4e0fd3a3_installed:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_group:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/group file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'gshadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/gshadow file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_groupowner_etc_passwd:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify group who owns 'passwd' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/passwd file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="file_groupowner_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_groupowner_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_group:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/group file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'gshadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/gshadow file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_owner_etc_passwd:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'passwd' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/passwd file should be owned by the appropriate
user.</ns3:description>
<ns3:reference ref_id="file_owner_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_owner_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_binary_dirs:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify that System Executables Have Root Ownership</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /bin, /sbin, /usr/bin, /usr/sbin, /usr/local/bin,
/usr/local/sbin, /usr/libexec, and objects therein, are owned by root.
</ns3:description>
<ns3:reference ref_id="file_ownership_binary_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_binary_directories:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_binary_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_library_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that Shared Library Files Have Root Ownership</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
objects therein, are owned by root.
</ns3:description>
<ns3:reference ref_id="file_ownership_library_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_lib_dir:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_lib_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_ownership_var_log_audit:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify /var/log/audit Ownership</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Checks that all /var/log/audit files and directories are owned by the root user and group.</ns3:description>
<ns3:reference ref_id="file_ownership_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria comment="directories are root owned" operator="AND">
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories:tst:1" />
</ns3:criteria>
<ns3:criteria comment="log_group in auditd.conf is not root" operator="AND">
<ns3:extend_definition comment="log_group in auditd.conf is not root" definition_ref="oval:ssg-auditd_conf_log_group_not_root:def:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_binary_dirs:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify that System Executables Have Restrictive Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that binary files under /bin, /sbin, /usr/bin, /usr/sbin,
/usr/local/bin, /usr/local/sbin, and /usr/libexec are not group-writable or world-writable.
</ns3:description>
<ns3:reference ref_id="file_permissions_binary_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_perms_binary_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_group:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify permissions on 'group' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>File permissions for /etc/group should be set
correctly.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_group" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_etc_group:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_gshadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify /etc/gshadow Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/gshadow is owned by 0, group owned by 0, and has mode 0000. If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_gshadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_gshadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_passwd:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify /etc/passwd Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/passwd is owned by 0, group owned by 0, and has mode 0644 (or stronger). If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_passwd" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_passwd:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_etc_shadow:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify /etc/shadow Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>This test makes sure that /etc/shadow is owned by 0, group owned by 0, and has mode 0000. If
the target file or directory has an extended ACL then it will fail the mode check.</ns3:description>
<ns3:reference ref_id="file_permissions_etc_shadow" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_etc_shadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_home_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Proper Permissions User Home Directories</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>File permissions should be set correctly for the home directories for all user accounts.</ns3:description>
<ns3:reference ref_id="file_permissions_home_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="home directories" negate="true" test_ref="oval:ssg-test_file_permissions_home_dirs:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_httpd_server_conf_files:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify Permissions On Apache Web Server Configuration Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/httpd/conf/* files should have the appropriate permissions (0640 or stronger).</ns3:description>
<ns3:reference ref_id="file_permissions_httpd_server_conf_files" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="httpd not present or in use" definition_ref="oval:ssg-package_httpd_removed:def:1" />
<ns3:criterion test_ref="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_library_dirs:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify that Shared Library Files Have Restrictive Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>
Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and
objects therein, are not group-writable or world-writable.
</ns3:description>
<ns3:reference ref_id="file_permissions_library_dirs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_perms_lib_dir:tst:1" />
<ns3:criterion test_ref="oval:ssg-test_perms_lib_files:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_unauthorized_world_writable:def:1" version="1">
<ns3:metadata>
<ns3:title>Find Unauthorized World-Writable Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The world-write permission should be disabled for all files.</ns3:description>
<ns3:reference ref_id="file_permissions_unauthorized_world_writable" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_file_permissions_unauthorized_world_write:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_ungroupowned:def:1" version="2">
<ns3:metadata>
<ns3:title>Find files unowned by a group</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
</ns3:affected>
<ns3:description>All files should be owned by a group</ns3:description>
<ns3:reference ref_id="file_permissions_ungroupowned" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all files and make sure they are owned by a group" test_ref="oval:ssg-test_file_permissions_ungroupowned:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-file_permissions_var_log_audit:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify /var/log/audit Permissions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Checks for correct permissions for all log files in /var/log/audit.</ns3:description>
<ns3:reference ref_id="file_permissions_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion negate="true" test_ref="oval:ssg-test_file_permissions_var_log_audit:tst:1" />
<ns3:criteria comment="log_group in auditd.conf is not root" operator="AND">
<ns3:extend_definition comment="log_group in auditd.conf is not root" definition_ref="oval:ssg-auditd_conf_log_group_not_root:def:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_file_permissions_var_log_audit-non_root:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_log_transactions:def:1" version="1">
<ns3:metadata>
<ns3:title>Banner for FTP Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>To trace malicious activity facilitated by the FTP
service, it must be configured to ensure that all commands sent to
the FTP server are logged using the verbose vsftpd log format.
</ns3:description>
<ns3:reference ref_id="ftp_log_transactions" source="ssg" /></ns3:metadata>
<ns3:criteria comment="FTP is not being used or the conditions are met" operator="OR">
<ns3:extend_definition comment="vsftp package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criteria comment="FTP configuration conditions are not set or are met" operator="AND">
<ns3:criterion comment="log ftp transactions enable" test_ref="oval:ssg-test_ftp_log_transactions_enable:tst:1" />
<ns3:criterion comment="log ftp transactions format" test_ref="oval:ssg-test_ftp_log_transactions_format:tst:1" />
<ns3:criterion comment="log ftp transactions protocol" test_ref="oval:ssg-test_ftp_log_transactions_protocol:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-ftp_present_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Banner for FTP Users</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>This setting will cause the system greeting banner to be
used for FTP connections as well.</ns3:description>
<ns3:reference ref_id="ftp_present_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="vsftpd package is not installed" definition_ref="oval:ssg-package_vsftpd_installed:def:1" negate="true" />
<ns3:criterion comment="Banner for FTP Users" test_ref="oval:ssg-test_ftp_present_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gid_passwd_group_same:def:1" version="2">
<ns3:metadata>
<ns3:title>All GIDs Are Present In /etc/group</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>All GIDs referenced in /etc/passwd must be defined in /etc/group.</ns3:description>
<ns3:reference ref_id="gid_passwd_group_same" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_gid_passwd_group_same:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gnome_gdm_disable_automatic_login:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable GDM Automatic Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GNOME Display Manager (GDM) ability to allow users to
automatically login.</ns3:description>
<ns3:reference ref_id="gnome_gdm_disable_automatic_login" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="Disable GDM Automatic Login" test_ref="oval:ssg-test_disable_automatic_login:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-gnome_gdm_disable_guest_login:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable GDM Guest Login</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>Disable the GNOME Display Manager (GDM) ability to allow guest users
to login.</ns3:description>
<ns3:reference ref_id="gnome_gdm_disable_guest_login" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="gdm installed" definition_ref="oval:ssg-package_gdm_installed:def:1" negate="true" />
<ns3:criterion comment="Disable GDM Guest Login" test_ref="oval:ssg-test_disable_guest_login:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-groupowner_shadow_file:def:1" version="2">
<ns3:metadata>
<ns3:title>Verify group who owns 'shadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/shadow file should be owned by the appropriate
group.</ns3:description>
<ns3:reference ref_id="groupowner_shadow_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_groupowner_etc_shadow:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_antivirus:def:1" version="1">
<ns3:metadata>
<ns3:title>Package Antivirus Installed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Antivirus software should be installed.</ns3:description>
<ns3:reference ref_id="install_antivirus" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Antivirus is not being used or conditions are met">
<ns3:extend_definition comment="McAfee A/V Installed" definition_ref="oval:ssg-install_mcafee_antivirus:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_antivirus:def:1" version="1">
<ns3:metadata>
<ns3:title>Package McAfeeVSEForLinux Installed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>McAfee Antivirus software should be installed.</ns3:description>
<ns3:reference ref_id="install_mcafee_antivirus" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Antivirus is not being used or conditions are met" operator="AND">
<ns3:extend_definition comment="McAfee Runtime Libraries and Agent" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1" />
<ns3:criterion comment="Linuxshield AntiVirus package is installed" test_ref="oval:ssg-test_linuxshield_install_antivirus:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_cma_rt:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the McAfee Runtime Libraries and Linux Agent</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the McAfee Runtime Libraries (MFErt) and Linux Agent (MFEcma).</ns3:description>
<ns3:reference ref_id="install_mcafee_cma_rt" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="McAfee runtime library package installed" test_ref="oval:ssg-test_mcafee_runtime_installed:tst:1" />
<ns3:criterion comment="McAfee management agent package installed" test_ref="oval:ssg-test_mcafee_management_agent:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss:def:1" version="1">
<ns3:metadata>
<ns3:title>Install McAfee Host-Based Intrusion Detection Software (HBSS)</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>McAfee Host-Based Intrusion Detection Software (HBSS) software
should be installed.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_cma_rt:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_accm:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_hips:def:1" />
<ns3:extend_definition comment="McAfee HBSS" definition_ref="oval:ssg-install_mcafee_hbss_pa:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_accm:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Asset Configuration Compliance Module (ACCM)</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the Asset Configuration Compliance Module (ACCM).</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_accm" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee ACCM is installed" test_ref="oval:ssg-test_mcafee_accm_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_hips:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Host Intrusion Prevention System (HIPS) Module</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the McAfee Host Intrusion Prevention System (HIPS) Module if it is
absolutely necessary. If SELinux is enabled, do not install or enable this module.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_hips" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee IPS is installed" test_ref="oval:ssg-test_mcafee_hbss_hips_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-install_mcafee_hbss_pa:def:1" version="1">
<ns3:metadata>
<ns3:title>Install the Policy Auditor (PA) Module</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Install the Policy Auditor (PA) Module.</ns3:description>
<ns3:reference ref_id="install_mcafee_hbss_pa" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="McAfee Policy Auditor is installed" test_ref="oval:ssg-test_mcafee_auditengine_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos6:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:6" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_centos6" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS6 is installed" test_ref="oval:ssg-test_centos6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos7:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:7" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_centos7" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS7 is installed" test_ref="oval:ssg-test_centos7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-installed_OS_is_certified:def:1" version="1">
<ns3:metadata>
<ns3:title>Vendor Certified Operating System</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The operating system installed on the system is
a certified vendor operating system and meets government
requirements/certifications such as FIPS, NIAP, etc.</ns3:description>
<ns3:reference ref_id="installed_OS_is_certified" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Installed operating system is a certified operating system" operator="OR">
<ns3:extend_definition comment="Installed OS is RHEL6" definition_ref="oval:ssg-installed_OS_is_rhel6:def:1" />
<ns3:extend_definition comment="Installed OS is RHEL7" definition_ref="oval:ssg-installed_OS_is_rhel7:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_fedora:def:1" version="3">
<ns3:metadata>
<ns3:title>Installed operating system is Fedora</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:22" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:23" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:24" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:25" source="CPE" />
<ns3:description>The operating system installed on the system is Fedora</ns3:description>
<ns3:reference ref_id="installed_OS_is_fedora" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="fedora-release RPM package is installed" test_ref="oval:ssg-test_fedora_release_rpm:tst:1" />
<ns3:criterion comment="CPE vendor is 'fedoraproject' and product is 'fedora'" test_ref="oval:ssg-test_fedora_vendor_product:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
<ns3:metadata>
<ns3:title>Installed operating system is part of the Unix family</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The operating system installed on the system is part of the Unix OS family</ns3:description>
<ns3:reference ref_id="installed_OS_is_part_of_Unix_family" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_family:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel6:def:1" version="2">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_rhel6" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 6 Workstation is installed" test_ref="oval:ssg-test_rhel_workstation:tst:1" />
<ns3:criterion comment="RHEL 6 Server is installed" test_ref="oval:ssg-test_rhel_server:tst:1" />
<ns3:criterion comment="RHEL 6 Compute Node is installed" test_ref="oval:ssg-test_rhel_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel7:def:1" version="1">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:7" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_rhel7" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel7_unix_family:tst:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 7 Workstation is installed" test_ref="oval:ssg-test_rhel7_workstation:tst:1" />
<ns3:criterion comment="RHEL 7 Server is installed" test_ref="oval:ssg-test_rhel7_server:tst:1" />
<ns3:criterion comment="RHEL 7 Compute Node is installed" test_ref="oval:ssg-test_rhel7_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl6:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 6</ns3:description>
<ns3:reference ref_id="installed_OS_is_sl6" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 6 is installed" test_ref="oval:ssg-test_sl6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl7:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 7</ns3:description>
<ns3:reference ref_id="installed_OS_is_sl7" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 7 is installed" test_ref="oval:ssg-test_sl7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_wrlinux:def:1" version="1">
<ns3:metadata>
<ns3:title>WRLinux</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:windriver:wrlinux" source="CPE" />
<ns3:description>The operating system installed on the system is
Wind River Linux</ns3:description>
<ns3:reference ref_id="installed_OS_is_wrlinux" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_wrlinux:tst:1" />
<ns3:criterion comment="WRLinux is installed" test_ref="oval:ssg-test_wrlinux:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_hostlimit:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Logwatch HostLimit Configured</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Test if HostLimit line in logwatch.conf is set appropriately.</ns3:description>
<ns3:reference ref_id="logwatch_configured_hostlimit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test value of HostLimit" test_ref="oval:ssg-test_logwatch_configured_hostlimit:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_splithosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Logwatch SplitHosts Configured</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Check if SplitHosts line in logwatch.conf is set appropriately.</ns3:description>
<ns3:reference ref_id="logwatch_configured_splithosts" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Test value of SplitHosts" test_ref="oval:ssg-test_logwatch_configured_splithosts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nodev:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Legitimate character and block devices should not exist
within temporary directories like /dev/shm. The nodev mount option should
be specified for /dev/shm.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_nodev" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on /dev/shm" test_ref="oval:ssg-test_nodev_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_noexec:def:1" version="1">
<ns3:metadata>
<ns3:title>Add noexec Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>It can be dangerous to allow the execution of binaries from
world-writable temporary storage directories such as /dev/shm. The noexec
mount option prevents binaries from being executed out of
/dev/shm.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_noexec" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="noexec on /dev/shm" test_ref="oval:ssg-test_noexec_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_dev_shm_nosuid:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nosuid Option to /dev/shm</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option should be set for temporary storage
partitions such as /dev/shm. The suid/sgid permissions should not be
required in these world-writable directories.</ns3:description>
<ns3:reference ref_id="mount_option_dev_shm_nosuid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nosuid on /dev/shm" test_ref="oval:ssg-test_nosuid_dev_shm:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_nonroot_local_partitions:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to Non-Root Local Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev mount option prevents files from being interpreted
as character or block devices. Legitimate character and block devices
should exist in the /dev directory on the root partition or within chroot
jails built for system services. All other locations should not allow
character and block devices.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_nonroot_local_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on local filesystems" negate="true" test_ref="oval:ssg-test_nodev_nonroot_local_partitions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_remote_filesystems:def:1" version="1">
<ns3:metadata>
<ns3:title>Mount Remote Filesystems with nodev</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev option should be enabled for all NFS mounts in /etc/fstab.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_remote_filesystems" source="ssg" /></ns3:metadata>
<ns3:criteria operator="XOR">
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1" />
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nodev_etc_fstab:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nodev_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add nodev Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nodev mount option prevents files from being interpreted
as character or block devices. Legitimate character and block devices
should exist in the /dev directory on the root partition or within chroot
jails built for system services. All other locations should not allow
character and block devices.</ns3:description>
<ns3:reference ref_id="mount_option_nodev_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nodev' mount option in /etc/fstab" test_ref="oval:ssg-test_nodev_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nodev' mount option in runtime configuration" test_ref="oval:ssg-test_nodev_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'nodev' mount option in /etc/fstab" test_ref="oval:ssg-test_nodev_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'nodev' mount option in runtime configuration" test_ref="oval:ssg-test_nodev_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_noexec_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add noexec Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The noexec mount option prevents the direct execution of
binaries on the mounted filesystem. Users should not be allowed to
execute binaries that exist on partitions mounted from removable media
(such as a USB key). The noexec option prevents code from being executed
directly from the media itself, and may therefore provide a line of
defense against certain types of worms or malicious code.</ns3:description>
<ns3:reference ref_id="mount_option_noexec_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'noexec' mount option in /etc/fstab" test_ref="oval:ssg-test_noexec_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'noexec' mount option in runtime configuration" test_ref="oval:ssg-test_noexec_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'noexec' mount option in /etc/fstab" test_ref="oval:ssg-test_noexec_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'noexec' mount option in runtime configuration" test_ref="oval:ssg-test_noexec_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nosuid_remote_filesystems:def:1" version="1">
<ns3:metadata>
<ns3:title>Mount Remote Filesystems with nosuid</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid option should be enabled for all NFS mounts in /etc/fstab.</ns3:description>
<ns3:reference ref_id="mount_option_nosuid_remote_filesystems" source="ssg" /></ns3:metadata>
<ns3:criteria operator="XOR">
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1" />
<ns3:criterion comment="remote nfs filesystems" test_ref="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_nosuid_removable_partitions:def:1" version="4">
<ns3:metadata>
<ns3:title>Add nosuid Option to Removable Media Partitions</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option prevents set-user-identifier (suid)
and set-group-identifier (sgid) permissions from taking effect. These
permissions allow users to execute binaries with the same permissions as
the owner and group of the file respectively. Users should not be allowed
to introduce suid and guid files into the system via partitions mounted
from removeable media.</ns3:description>
<ns3:reference ref_id="mount_option_nosuid_removable_partitions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Check if removable partition really exists on the system" definition_ref="oval:ssg-removable_partition_doesnt_exist:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Check if removable partition value represents CD/DVD drive" definition_ref="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nosuid' mount option in /etc/fstab" test_ref="oval:ssg-test_nosuid_etc_fstab_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if at least one from CD/DVD drive alternative names is using 'nosuid' mount option in runtime configuration" test_ref="oval:ssg-test_nosuid_runtime_cd_dvd_drive:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Check if removable partition is using 'nosuid' mount option in /etc/fstab" test_ref="oval:ssg-test_nosuid_etc_fstab_not_cd_dvd_drive:tst:1" />
<ns3:criterion comment="Check if removable partition is using 'nosuid' mount option in runtime configuration" test_ref="oval:ssg-test_nosuid_runtime_not_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_smb_client_signing:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Client SMB Packet Signing, if using
mount.cifs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require packet signing of clients who mount
Samba shares using the mount.cifs program (e.g., those who
specify shares in /etc/fstab). To do so, ensure that signing
options (either sec=krb5i or sec=ntlmv2i) are
used.</ns3:description>
<ns3:reference ref_id="mount_option_smb_client_signing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:extend_definition comment="samba-common installed" definition_ref="oval:ssg-package_samba-common_installed:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="check for no cifs in /etc/fstab" test_ref="oval:ssg-test_20340111:tst:1" />
<ns3:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" test_ref="oval:ssg-test_20340112:tst:1" />
</ns3:criteria>
<ns3:criteria operator="OR">
<ns3:criterion comment="check for no cifs in /etc/mtab" test_ref="oval:ssg-test_20340113:tst:1" />
<ns3:criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" test_ref="oval:ssg-test_20340114:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_nodev:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nodev Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Legitimate character and block devices should not exist
within temporary directories like /tmp. The nodev mount option should be
specified for /tmp.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_nodev" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nodev on /tmp" test_ref="oval:ssg-test_nodev_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_noexec:def:1" version="1">
<ns3:metadata>
<ns3:title>Add noexec Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>It can be dangerous to allow the execution of binaries from
world-writable temporary storage directories such as /tmp. The noexec
mount option prevents binaries from being executed out of
/tmp.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_noexec" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="noexec on /tmp" test_ref="oval:ssg-test_noexec_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_tmp_nosuid:def:1" version="1">
<ns3:metadata>
<ns3:title>Add nosuid Option to /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The nosuid mount option should be set for temporary storage
partitions such as /tmp. The suid/sgid permissions should not be required
in these world-writable directories.</ns3:description>
<ns3:reference ref_id="mount_option_tmp_nosuid" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="nosuid on /tmp" test_ref="oval:ssg-test_nosuid_tmp:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-mount_option_var_tmp_bind:def:1" version="1">
<ns3:metadata>
<ns3:title>Bind Mount /var/tmp To /tmp</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /var/tmp directory should be bind mounted to /tmp in
order to consolidate temporary storage into one location protected by the
same techniques as /tmp.</ns3:description>
<ns3:reference ref_id="mount_option_var_tmp_bind" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Ensure /var/tmp is mounted" test_ref="oval:ssg-test_mount_option_var_tmp:tst:1" />
<ns3:criterion comment="Ensure /tmp is bind mounted" test_ref="oval:ssg-test_mount_option_var_tmp_bind:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_disable_zeroconf:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Zeroconf Networking</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable Zeroconf automatic route assignment in the
169.254.0.0 subnet.</ns3:description>
<ns3:reference ref_id="network_disable_zeroconf" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Look for NOZEROCONF=yes in /etc/sysconfig/network" test_ref="oval:ssg-test_sysconfig_nozeroconf_yes:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_ipv6_disable_rpc:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Support for RPC IPv6</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable ipv6 based rpc services</ns3:description>
<ns3:reference ref_id="network_ipv6_disable_rpc" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Disable udp6" test_ref="oval:ssg-test_network_ipv6_disable_rpc_udp6:tst:1" />
<ns3:criterion comment="Disable tcp6" test_ref="oval:ssg-test_network_ipv6_disable_rpc_tcp6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-network_sniffer_disabled:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable the network sniffer</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Disable the network sniffer</ns3:description>
<ns3:reference ref_id="network_sniffer_disabled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="promisc interfaces" negate="true" test_ref="oval:ssg-test_promisc_interfaces:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_direct_root_logins:def:1" version="1">
<ns3:metadata>
<ns3:title>Direct root Logins Not Allowed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root logins help ensure accountability for actions
taken on the system using the root account.</ns3:description>
<ns3:reference ref_id="no_direct_root_logins" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_no_direct_root_logins:tst:1" />
<ns3:criterion comment="serial ports /etc/securetty" test_ref="oval:ssg-test_etc_securetty_exists:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_empty_passwords:def:1" version="1">
<ns3:metadata>
<ns3:title>No nullok Option in /etc/pam.d/system-auth</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The file /etc/pam.d/system-auth should not contain the nullok option</ns3:description>
<ns3:reference ref_id="no_empty_passwords" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="make sure the nullok option is not used in /etc/pam.d/system-auth" test_ref="oval:ssg-test_no_empty_passwords:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_files_unowned_by_user:def:1" version="1">
<ns3:metadata>
<ns3:title>Find files unowned by a user</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All files should be owned by a user</ns3:description>
<ns3:reference ref_id="no_files_unowned_by_user" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check all files and make sure they are owned by a user" test_ref="oval:ssg-no_files_unowned_by_user_test:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_insecure_locks_exports:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure insecure_locks is disabled</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Allowing insecure file locking could allow for sensitive
data to be viewed or edited by an unauthorized user.</ns3:description>
<ns3:reference ref_id="no_insecure_locks_exports" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check for insecure NFS locks in /etc/exports" test_ref="oval:ssg-test_no_insecure_locks_exports:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_netrc_files:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify No netrc Files Exist</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The .netrc files contain login information used to auto-login into FTP servers and reside in the user's home directory. Any .netrc files should be removed.</ns3:description>
<ns3:reference ref_id="no_netrc_files" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_netrc_files_home:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_rsh_trust_files:def:1" version="1">
<ns3:metadata>
<ns3:title>No Legacy .rhosts Or hosts.equiv Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>There should not be any .rhosts or hosts.equiv files on the system.</ns3:description>
<ns3:reference ref_id="no_rsh_trust_files" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_root:tst:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_home:tst:1" />
<ns3:criterion negate="true" test_ref="oval:ssg-test_no_rsh_trust_files_etc:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-no_shelllogin_for_systemaccounts:def:1" version="2">
<ns3:metadata>
<ns3:title>System Accounts Do Not Run a Shell</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The root account is the only system account that should have
a login shell.</ns3:description>
<ns3:reference ref_id="no_shelllogin_for_systemaccounts" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criteria operator="AND">
<ns3:criterion comment="Test SYS_UID_MIN not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1" />
<ns3:criterion comment="Test SYS_UID_MAX not defined in /etc/login.defs" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1" />
<ns3:criterion comment="Test shell defined for UID from <0, UID_MIN -1>" test_ref="oval:ssg-test_shell_defined_default_uid_range:tst:1" />
</ns3:criteria>
<ns3:criteria operator="AND">
<ns3:criterion comment="Test SYS_UID_MIN defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_min_not_defined:tst:1" />
<ns3:criterion comment="Test SYS_UID_MAX defined in /etc/login.defs" negate="true" test_ref="oval:ssg-test_sys_uid_max_not_defined:tst:1" />
<ns3:criterion comment="Test shell defined for reserved system UIDs" test_ref="oval:ssg-test_shell_defined_reserved_uid_range:tst:1" />
<ns3:criterion comment="Test shell defined for dynamically allocated system UIDs" test_ref="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_aide_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package aide Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package aide should be installed.</ns3:description>
<ns3:reference ref_id="package_aide_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package aide is installed" test_ref="oval:ssg-test_package_aide_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_audit_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package audit Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package audit should be installed.</ns3:description>
<ns3:reference ref_id="package_audit_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package audit is installed" test_ref="oval:ssg-test_package_audit_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_bind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package bind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package bind should be removed.</ns3:description>
<ns3:reference ref_id="package_bind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package bind is removed" test_ref="oval:ssg-test_package_bind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dhcp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dhcp Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dhcp should be removed.</ns3:description>
<ns3:reference ref_id="package_dhcp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dhcp is removed" test_ref="oval:ssg-test_package_dhcp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dovecot_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dovecot Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dovecot should be removed.</ns3:description>
<ns3:reference ref_id="package_dovecot_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package dovecot is removed" test_ref="oval:ssg-test_package_dovecot_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_dracut-fips_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package dracut-fips Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package dracut-fips should be installed.</ns3:description>
<ns3:reference ref_id="package_dracut-fips_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criterion comment="package dracut-fips is installed" test_ref="oval:ssg-test_package_dracut-fips_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_httpd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package httpd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package httpd should be removed.</ns3:description>
<ns3:reference ref_id="package_httpd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package httpd is removed" test_ref="oval:ssg-test_package_httpd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_mcstrans_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package mcstrans Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package mcstrans should be removed.</ns3:description>
<ns3:reference ref_id="package_mcstrans_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package mcstrans is removed" test_ref="oval:ssg-test_package_mcstrans_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_net-snmp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package net-snmp Removed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The RPM package net-snmp should be removed.</ns3:description>
<ns3:reference ref_id="package_net-snmp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package net-snmp is removed" test_ref="oval:ssg-test_package_net-snmp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ntp_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ntp Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>CentOS 4</ns3:platform>
<ns3:platform>CentOS 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 4</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 5</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ntp should be installed.</ns3:description>
<ns3:reference ref_id="package_ntp_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ntp is installed" test_ref="oval:ssg-test_package_ntp_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openldap-servers_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package openldap-servers Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openldap-servers should be removed.</ns3:description>
<ns3:reference ref_id="package_openldap-servers_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openldap-servers is removed" test_ref="oval:ssg-test_package_openldap-servers_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_openssh-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package openssh-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>SUSE Linux Enterprise 12</ns3:platform>
<ns3:platform>SUSE Linux Enterprise 11</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package openssh-server should be removed.</ns3:description>
<ns3:reference ref_id="package_openssh-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package openssh-server is removed" test_ref="oval:ssg-test_package_openssh-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_prelink_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package prelink Removed</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The RPM package prelink should be removed.</ns3:description>
<ns3:reference ref_id="package_prelink_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package prelink is removed" test_ref="oval:ssg-test_package_prelink_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsh-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsh-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsh-server should be removed.</ns3:description>
<ns3:reference ref_id="package_rsh-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsh-server is removed" test_ref="oval:ssg-test_package_rsh-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsh_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsh Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsh should be removed.</ns3:description>
<ns3:reference ref_id="package_rsh_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsh is removed" test_ref="oval:ssg-test_package_rsh_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_rsyslog_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package rsyslog Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package rsyslog should be installed.</ns3:description>
<ns3:reference ref_id="package_rsyslog_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package rsyslog is installed" test_ref="oval:ssg-test_package_rsyslog_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba-common_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba-common Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba-common should be installed.</ns3:description>
<ns3:reference ref_id="package_samba-common_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba-common is installed" test_ref="oval:ssg-test_package_samba-common_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_samba-common_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package samba-common Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package samba-common should be removed.</ns3:description>
<ns3:reference ref_id="package_samba-common_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package samba-common is removed" test_ref="oval:ssg-test_package_samba-common_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_screen_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package screen Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package screen should be installed.</ns3:description>
<ns3:reference ref_id="package_screen_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package screen is installed" test_ref="oval:ssg-test_package_screen_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_sendmail_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package sendmail Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package sendmail should be removed.</ns3:description>
<ns3:reference ref_id="package_sendmail_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package sendmail is removed" test_ref="oval:ssg-test_package_sendmail_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_setroubleshoot_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package setroubleshoot Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package setroubleshoot should be removed.</ns3:description>
<ns3:reference ref_id="package_setroubleshoot_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package setroubleshoot is removed" test_ref="oval:ssg-test_package_setroubleshoot_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_squid_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package squid Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package squid should be removed.</ns3:description>
<ns3:reference ref_id="package_squid_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package squid is removed" test_ref="oval:ssg-test_package_squid_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_talk-server_removed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package talk-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package talk-server should be removed.</ns3:description>
<ns3:reference ref_id="package_talk-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package talk-server is removed" test_ref="oval:ssg-test_package_talk-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_talk_removed:def:1" version="2">
<ns3:metadata>
<ns3:title>Package talk Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package talk should be removed.</ns3:description>
<ns3:reference ref_id="package_talk_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package talk is removed" test_ref="oval:ssg-test_package_talk_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_telnet-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package telnet-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package telnet-server should be removed.</ns3:description>
<ns3:reference ref_id="package_telnet-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package telnet-server is removed" test_ref="oval:ssg-test_package_telnet-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_telnet_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package telnet Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package telnet should be removed.</ns3:description>
<ns3:reference ref_id="package_telnet_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package telnet is removed" test_ref="oval:ssg-test_package_telnet_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_tftp-server_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package tftp-server Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package tftp-server should be removed.</ns3:description>
<ns3:reference ref_id="package_tftp-server_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package tftp-server is removed" test_ref="oval:ssg-test_package_tftp-server_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_tftp_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package tftp Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package tftp should be removed.</ns3:description>
<ns3:reference ref_id="package_tftp_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package tftp is removed" test_ref="oval:ssg-test_package_tftp_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_vsftpd_installed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package vsftpd Installed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package vsftpd should be installed.</ns3:description>
<ns3:reference ref_id="package_vsftpd_installed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package vsftpd is installed" test_ref="oval:ssg-test_package_vsftpd_installed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_vsftpd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package vsftpd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package vsftpd should be removed.</ns3:description>
<ns3:reference ref_id="package_vsftpd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package vsftpd is removed" test_ref="oval:ssg-test_package_vsftpd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_xinetd_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package xinetd Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package xinetd should be removed.</ns3:description>
<ns3:reference ref_id="package_xinetd_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package xinetd is removed" test_ref="oval:ssg-test_package_xinetd_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ypbind_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ypbind Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ypbind should be removed.</ns3:description>
<ns3:reference ref_id="package_ypbind_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ypbind is removed" test_ref="oval:ssg-test_package_ypbind_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-package_ypserv_removed:def:1" version="1">
<ns3:metadata>
<ns3:title>Package ypserv Removed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The RPM package ypserv should be removed.</ns3:description>
<ns3:reference ref_id="package_ypserv_removed" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="package ypserv is removed" test_ref="oval:ssg-test_package_ypserv_removed:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_home:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /home Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>If user home directories will be stored locally, create a
separate partition for /home. If /home will be mounted from another
system such as an NFS server, then creating a separate partition is not
necessary at this time, and the mountpoint can instead be configured
later.</ns3:description>
<ns3:reference ref_id="partition_for_home" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/home on own partition" test_ref="oval:ssg-test_home_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_tmp:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /tmp Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /tmp directory is a world-writable directory used for
temporary file storage. Verify that it has its own partition or logical
volume.</ns3:description>
<ns3:reference ref_id="partition_for_tmp" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/tmp on own partition" test_ref="oval:ssg-test_tmp_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Ensuring that /var is mounted on its own partition enables
the setting of more restrictive mount options, which is used as temporary
storage by many program, particularly system services such as daemons. It
is not uncommon for the /var directory to contain world-writable
directories, installed by other software packages.</ns3:description>
<ns3:reference ref_id="partition_for_var" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var on own partition" test_ref="oval:ssg-test_var_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var_log:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var/log Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>System logs are stored in the /var/log directory. Ensure
that it has its own partition or logical volume.</ns3:description>
<ns3:reference ref_id="partition_for_var_log" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var/log on own partition" test_ref="oval:ssg-test_var_log_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-partition_for_var_log_audit:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure /var/log/audit Located On Separate Partition</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Audit logs are stored in the /var/log/audit directory.
Ensure that it has its own partition or logical volume. Make absolutely
certain that it is large enough to store all audit logs that will be
created by the auditing daemon.</ns3:description>
<ns3:reference ref_id="partition_for_var_log_audit" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="/var/log/audit on own partition" test_ref="oval:ssg-test_var_log_audit_partition:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-postfix_server_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Configure Postfix Against Unnecessary Release of Information</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Protect against unnecessary release of information.</ns3:description>
<ns3:reference ref_id="postfix_server_banner" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="Limit release of information" test_ref="oval:ssg-test_postfix_server_banner:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-removable_partition_doesnt_exist:def:1" version="1">
<ns3:metadata>
<ns3:title>Device Files for Removable Media Partitions Does Not Exist on the System</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify if device file representing removable partitions
exist on the system</ns3:description>
<ns3:reference ref_id="removable_partition_doesnt_exist" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if removable partition really exists on the system" test_ref="oval:ssg-test_removable_partition_doesnt_exist:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-require_smb_client_signing:def:1" version="1">
<ns3:metadata>
<ns3:title>Require Client SMB Packet Signing in smb.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Require samba clients which use smb.conf, such as smbclient,
to use packet signing. A Samba client should only communicate with
servers who can support SMB packet signing.</ns3:description>
<ns3:reference ref_id="require_smb_client_signing" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="package samba-common is not installed" definition_ref="oval:ssg-package_samba-common_removed:def:1" />
<ns3:criteria operator="AND">
<ns3:extend_definition comment="samba-common installed" definition_ref="oval:ssg-package_samba-common_installed:def:1" />
<ns3:criterion comment="check for client signing = mandatory in /etc/samba/smb.conf" test_ref="oval:ssg-test_require_smb_client_signing:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-restrict_serial_port_logins:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Serial Port Root Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root login to serial port interfaces helps
ensure accountability for actions taken on the system using the root
account.</ns3:description>
<ns3:reference ref_id="restrict_serial_port_logins" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="serial ports /etc/securetty" negate="true" test_ref="oval:ssg-test_serial_ports_etc_securetty:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-root_path_no_dot:def:1" version="2">
<ns3:metadata>
<ns3:title>Ensure that No Dangerous Directories Exist in Root's Path</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The environment variable PATH should be set correctly for
the root user.</ns3:description>
<ns3:reference ref_id="root_path_no_dot" source="ssg" /></ns3:metadata>
<ns3:criteria comment="environment variable PATH contains dangerous path" operator="AND">
<ns3:criterion comment="environment variable PATH starts with : or ." test_ref="oval:ssg-test_env_var_begins:tst:1" />
<ns3:criterion comment="environment variable PATH contains : twice in a row" test_ref="oval:ssg-test_env_var_contains_doublecolon:tst:1" />
<ns3:criterion comment="environment variable PATH contains . twice in a row" test_ref="oval:ssg-test_env_var_contains_doubleperiod:tst:1" />
<ns3:criterion comment="environment variable PATH ends with : or ." test_ref="oval:ssg-test_env_var_ends:tst:1" />
<ns3:criterion comment="environment variable PATH doesn't begin with a /" test_ref="oval:ssg-test_env_var_begins_slash:tst:1" />
<ns3:criterion comment="environment variable PATH doesn't contain relative paths" test_ref="oval:ssg-test_env_var_contains_relative_path:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rpm_verify_hashes:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify File Hashes with RPM</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
</ns3:affected>
<ns3:description>Verify the RPM digests of system binaries using the RPM database.</ns3:description>
<ns3:reference ref_id="rpm_verify_hashes" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="verify file md5 hashes" test_ref="oval:ssg-test_files_fail_md5_hash:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rpm_verify_permissions:def:1" version="3">
<ns3:metadata>
<ns3:title>Verify File Ownership And Permissions Using RPM</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify the integrity of installed packages
by comparing the installed files with information about the
files taken from the package metadata stored in the RPM
database.</ns3:description>
<ns3:reference ref_id="rpm_verify_permissions" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="user ownership of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_user_ownership:tst:1" />
<ns3:criterion comment="group ownership of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_group_ownership:tst:1" />
<ns3:criterion comment="mode of all files matches local rpm database" test_ref="oval:ssg-test_verify_all_rpms_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_nolisten:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable Rsyslogd from Accepting Remote Messages on Loghosts
Only</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>rsyslogd should reject remote messages</ns3:description>
<ns3:reference ref_id="rsyslog_nolisten" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Conditions are satisfied" test_ref="oval:ssg-test_rsyslog_nolisten:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-rsyslog_remote_loghost:def:1" version="1">
<ns3:metadata>
<ns3:title>Send Logs to a Remote Loghost</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Syslog logs should be sent to a remote loghost</ns3:description>
<ns3:reference ref_id="rsyslog_remote_loghost" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Remote logging set within /etc/rsyslog.conf" test_ref="oval:ssg-test_remote_rsyslog_conf:tst:1" />
<ns3:criterion comment="Remote logging set within /etc/rsyslog.d" test_ref="oval:ssg-test_remote_rsyslog_d:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-securetty_root_login_console_only:def:1" version="1">
<ns3:metadata>
<ns3:title>Restrict Virtual Console Root Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Preventing direct root login to virtual console devices
helps ensure accountability for actions taken on the system using the
root account.</ns3:description>
<ns3:reference ref_id="securetty_root_login_console_only" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="virtual consoles /etc/securetty" test_ref="oval:ssg-test_virtual_consoles_etc_securetty:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_all_devicefiles_labeled:def:1" version="1">
<ns3:metadata>
<ns3:title>Device Files Have Proper SELinux Context</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
</ns3:affected>
<ns3:description>All device files in /dev should be assigned an SELinux security context other than 'device_t'.</ns3:description>
<ns3:reference ref_id="selinux_all_devicefiles_labeled" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="device_t in /dev" test_ref="oval:ssg-test_selinux_all_devicefiles_labeled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_confinement_of_daemons:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure No Daemons are Unconfined by SELinux</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Wind River Linux 8</ns3:platform>
</ns3:affected>
<ns3:description>All pids in /proc should be assigned an SELinux security context other than 'initrc_t'.</ns3:description>
<ns3:reference ref_id="selinux_confinement_of_daemons" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="device_t in /dev" test_ref="oval:ssg-test_selinux_confinement_of_daemons:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_policytype:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable SELinux</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The SELinux policy should be set appropriately.</ns3:description>
<ns3:reference ref_id="selinux_policytype" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion test_ref="oval:ssg-test_selinux_policy:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-selinux_state:def:1" version="1">
<ns3:metadata>
<ns3:title>SELinux Enforcing</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The SELinux state should be enforcing the local policy.</ns3:description>
<ns3:reference ref_id="selinux_state" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion comment="enforce is disabled" test_ref="oval:ssg-test_etc_selinux_config:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_libuserconf:def:1" version="1">
<ns3:metadata>
<ns3:title>Set SHA512 Password Hashing Algorithm in /etc/libuser.conf</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/libuser.conf.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_libuserconf" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_etc_libuser_conf_cryptstyle:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" version="2">
<ns3:metadata>
<ns3:title>Set SHA512 Password Hashing Algorithm in /etc/login.defs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Fedora 23</ns3:platform>
<ns3:platform>Fedora 24</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/login.defs.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_logindefs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_etc_login_defs_encrypt_method:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" version="1">
<ns3:metadata>
<ns3:title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.</ns3:description>
<ns3:reference ref_id="set_password_hashing_algorithm_systemauth" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_pam_unix_sha512:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-snmpd_not_default_password:def:1" version="2">
<ns3:metadata>
<ns3:title>SNMP default communities disabled</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SNMP default communities must be removed.</ns3:description>
<ns3:reference ref_id="snmpd_not_default_password" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criterion comment="SNMP communities" test_ref="oval:ssg-test_snmp_default_communities:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-snmpd_use_newer_protocol:def:1" version="2">
<ns3:metadata>
<ns3:title>SNMP use newer protocols</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SNMP version 1 and 2c must not be enabled.</ns3:description>
<ns3:reference ref_id="snmpd_use_newer_protocol" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="SMNP installed" definition_ref="oval:ssg-package_net-snmp_removed:def:1" />
<ns3:criterion comment="SNMP protocols" test_ref="oval:ssg-test_snmp_versions:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_allow_only_protocol2:def:1" version="1">
<ns3:metadata>
<ns3:title>Ensure Only Protocol 2 Connections Allowed</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Ubuntu 1604</ns3:platform>
<ns3:platform>Debian 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The OpenSSH daemon should be running protocol 2.</ns3:description>
<ns3:reference ref_id="sshd_allow_only_protocol2" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:extend_definition comment="rpm package openssh-server removed" definition_ref="oval:ssg-package_openssh-server_removed:def:1" />
<ns3:criterion comment="Check Protocol in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_allow_only_protocol2:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_empty_passwords:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable Empty Passwords</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Remote connections from accounts with empty passwords should
be disabled (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_disable_empty_passwords" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitEmptyPasswords in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitemptypasswords_no:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_rhosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable .rhosts Files</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Emulation of the rsh command through the ssh server should
be disabled (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_disable_rhosts" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check IgnoreRhosts in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_rsh_emulation_disabled:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_rhosts_rsa:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable SSH Support for Rhosts RSA Authentication</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SSH can allow authentication through the obsolete rsh command
through the use of the authenticating user's SSH keys. This should be disabled.</ns3:description>
<ns3:reference ref_id="sshd_disable_rhosts_rsa" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check RhostsRSAAuthentication in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_root_login:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable root Login via SSH</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Root login via SSH should be disabled (and dependencies are
met)</ns3:description>
<ns3:reference ref_id="sshd_disable_root_login" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitRootLogin in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_permitrootlogin_no:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_disable_user_known_hosts:def:1" version="1">
<ns3:metadata>
<ns3:title>Disable SSH Support for User Known Hosts</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>SSH can allow system users host-based authentication
to connect to systems if a cache of the remote systems public keys are available.
This should be disabled.</ns3:description>
<ns3:reference ref_id="sshd_disable_user_known_hosts" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check IgnoreUserKnownHosts in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_disable_user_known_hosts:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_do_not_permit_user_env:def:1" version="1">
<ns3:metadata>
<ns3:title>Do Not Allow Users to Set Environment Options</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>PermitUserEnvironment should be disabled</ns3:description>
<ns3:reference ref_id="sshd_do_not_permit_user_env" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check PermitUserEnvironment in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg-test_sshd_no_user_envset:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_enable_warning_banner:def:1" version="1">
<ns3:metadata>
<ns3:title>Enable a Warning Banner</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>SSH warning banner should be enabled (and dependencies are
met)</ns3:description>
<ns3:reference ref_id="sshd_enable_warning_banner" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check Banner in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_banner_set:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_set_idle_timeout:def:1" version="1">
<ns3:metadata>
<ns3:title>Set OpenSSH Idle Timeout Interval</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The SSH idle timeout interval should be set to an
appropriate value.</ns3:description>
<ns3:reference ref_id="sshd_set_idle_timeout" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check ClientAliveInterval in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_idle_timeout:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_set_keepalive:def:1" version="1">
<ns3:metadata>
<ns3:title>Set ClientAliveCountMax for User Logins</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The SSH ClientAliveCountMax should be set to an appropriate
value (and dependencies are met)</ns3:description>
<ns3:reference ref_id="sshd_set_keepalive" source="ssg" /></ns3:metadata>
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check ClientAliveCountMax in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_clientalivecountmax:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_use_approved_ciphers:def:1" version="1">
<ns3:metadata>
<ns3:title>Use Only Approved Ciphers</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the ciphers to those which are FIPS-approved and only
use ciphers in counter (CTR) mode.</ns3:description>
<ns3:reference ref_id="sshd_use_approved_ciphers" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check the Cipers list in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_ciphers:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sshd_use_approved_macs:def:1" version="1">
<ns3:metadata>
<ns3:title>Use Only FIPS MACs</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Limit the Message Authentication Codes (MACs) to those which are FIPS-approved.</ns3:description>
<ns3:reference ref_id="sshd_use_approved_macs" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is certified" definition_ref="oval:ssg-installed_OS_is_certified:def:1" />
<ns3:criteria comment="SSH is not being used or conditions are met" operator="OR">
<ns3:extend_definition comment="sshd service is disabled" definition_ref="oval:ssg-service_sshd_disabled:def:1" />
<ns3:criterion comment="Check MACs in /etc/ssh/sshd_config" test_ref="oval:ssg-test_sshd_use_approved_macs:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-sysconfig_networking_bootproto_ifcfg:def:1" version="2">
<ns3:metadata>
<ns3:title>Disable DHCP Client</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>DHCP configuration should be static for all
interfaces.</ns3:description>
<ns3:reference ref_id="sysconfig_networking_bootproto_ifcfg" source="ssg" /></ns3:metadata>
<ns3:criteria comment="Test for BOOTPROTO=(static|none) across all interfaces">
<ns3:criterion test_ref="oval:ssg-test_sysconfig_networking_bootproto_ifcfg:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_64bit:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for 64-bit Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for 64-bit architectures to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_64bit" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:extend_definition comment="Generic test for x86_64 architecture" definition_ref="oval:ssg-system_info_architecture_x86_64:def:1" />
<ns3:extend_definition comment="Generic test for ppc64 architecture" definition_ref="oval:ssg-system_info_architecture_ppc_64:def:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_ppc_64:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for PPC and PPCLE Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for PPC PPC64LE architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_ppc_64" source="ssg" /></ns3:metadata>
<ns3:criteria operator="OR">
<ns3:criterion comment="Generic test for ppc64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppc_64:tst:1" />
<ns3:criterion comment="Generic test for ppcle64 architecture" test_ref="oval:ssg-test_system_info_architecture_ppcle_64:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_x86:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for x86 Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for x86 architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_x86" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Generic test for x86 architecture" test_ref="oval:ssg-test_system_info_architecture_x86:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-system_info_architecture_x86_64:def:1" version="1">
<ns3:metadata>
<ns3:title>Test for x86_64 Architecture</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>Generic test for x86_64 architecture to be used by other tests</ns3:description>
<ns3:reference ref_id="system_info_architecture_x86_64" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Generic test for x86_64 architecture" test_ref="oval:ssg-test_system_info_architecture_x86_64:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-tftpd_uses_secure_mode:def:1" version="1">
<ns3:metadata>
<ns3:title>TFTP Daemon Uses Secure Mode</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The TFTP daemon should use secure mode.</ns3:description>
<ns3:reference ref_id="tftpd_uses_secure_mode" source="ssg" /></ns3:metadata>
<ns3:criteria comment="package tftp-server removed or /etc/xinetd.d/tftp configured correctly" operator="OR">
<ns3:extend_definition comment="rpm package tftp-server removed" definition_ref="oval:ssg-package_tftp-server_removed:def:1" />
<ns3:criterion comment="tftpd secure mode" test_ref="oval:ssg-test_tftpd_uses_secure_mode:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-umask_for_daemons:def:1" version="2">
<ns3:metadata>
<ns3:title>Set Daemon umask</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The daemon umask should be set as appropriate</ns3:description>
<ns3:reference ref_id="umask_for_daemons" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Get value of var_accounts_user_umask variable as octal number" definition_ref="oval:ssg-var_umask_for_daemons_as_number:def:1" />
<ns3:criterion test_ref="oval:ssg-tst_umask_for_daemons:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-userowner_shadow_file:def:1" version="1">
<ns3:metadata>
<ns3:title>Verify user who owns 'shadow' file</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>The /etc/shadow file should be owned by the
appropriate user.</ns3:description>
<ns3:reference ref_id="userowner_shadow_file" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check file ownership of /etc/shadow" test_ref="oval:ssg-test_userowner_shadow_file:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_accounts_user_umask_as_number:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_accounts_user_umask' variable represented as octal number</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Wind River Linux 8</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Value of 'var_accounts_user_umask' variable represented as octal number</ns3:description>
<ns3:reference ref_id="var_accounts_user_umask_as_number" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_removable_partition_is_cd_dvd_drive:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_removable_partition' variable is set to '/dev/cdrom'</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Verify if value of 'var_removable_partition' variable is set
to '/dev/cdrom'</ns3:description>
<ns3:reference ref_id="var_removable_partition_is_cd_dvd_drive" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Check if removable partition value represents CD/DVD drive" test_ref="oval:ssg-test_var_removable_partition_is_cd_dvd_drive:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-var_umask_for_daemons_as_number:def:1" version="1">
<ns3:metadata>
<ns3:title>Value of 'var_umask_for_daemons' variable represented as octal number</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>Value of 'var_umask_for_daemons' variable represented as octal number</ns3:description>
<ns3:reference ref_id="var_umask_for_daemons_as_number" source="ssg" /></ns3:metadata>
<ns3:criteria operator="AND">
<ns3:criterion test_ref="oval:ssg-test_existence_of_var_umask_for_daemons_as_number_variable:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="compliance" id="oval:ssg-wireless_disable_interfaces:def:1" version="1">
<ns3:metadata>
<ns3:title>Deactivate Wireless Interfaces</ns3:title>
<ns3:affected family="unix">
<ns3:platform>Red Hat Enterprise Linux 7</ns3:platform>
<ns3:platform>Red Hat Enterprise Linux 6</ns3:platform>
</ns3:affected>
<ns3:description>All wireless interfaces should be disabled.</ns3:description>
<ns3:reference ref_id="wireless_disable_interfaces" source="ssg" /></ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="query /proc/net/wireless" test_ref="oval:ssg-test_wireless_disable_interfaces:tst:1" />
</ns3:criteria>
</ns3:definition>
</ns3:definitions>
<ns3:tests>
<ns6:file_test check="all" check_existence="all_exist" comment="System log files are owned by root group" id="oval:ssg-test_rsyslog_files_groupownership:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_groupownership:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_groupownership:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="System log files are owned by root" id="oval:ssg-test_rsyslog_files_ownership:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_ownership:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_ownership:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Permissions of system log files are 0600" id="oval:ssg-test_rsyslog_files_permissions:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_rsyslog_files_permissions:obj:1" />
<ns6:state state_ref="oval:ssg-state_rsyslog_files_permissions:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_dcredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_dcredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_dcredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_difok:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_difok:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_difok:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_lcredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_lcredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_lcredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_maxrepeat:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_maxrepeat:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_maxrepeat:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_minclass:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_password_pam_cracklib_minclass:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_minclass:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth cracklib" id="oval:ssg-test_password_pam_minlen:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_minlen:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_minlen:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_ocredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_ocredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_ocredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_retry:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_retry:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_retry:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_password_pam_cracklib_ucredit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_password_pam_cracklib_ucredit:obj:1" />
<ns7:state state_ref="oval:ssg-state_password_pam_cracklib_ucredit:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chmod x32" id="oval:ssg-test_audit_rules_dac_modification_chmod_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chmod_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chmod x64" id="oval:ssg-test_audit_rules_dac_modification_chmod_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chmod_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chown x32" id="oval:ssg-test_audit_rules_dac_modification_chown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification chown x64" id="oval:ssg-test_audit_rules_dac_modification_chown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_chown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmod x32" id="oval:ssg-test_audit_rules_dac_modification_fchmod_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmod_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmod x64" id="oval:ssg-test_audit_rules_dac_modification_fchmod_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmod_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmodat x32" id="oval:ssg-test_audit_rules_dac_modification_fchmodat_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmodat_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchmodat x64" id="oval:ssg-test_audit_rules_dac_modification_fchmodat_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchmodat_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchown x32" id="oval:ssg-test_audit_rules_dac_modification_fchown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchown x64" id="oval:ssg-test_audit_rules_dac_modification_fchown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchownat x32" id="oval:ssg-test_audit_rules_dac_modification_fchownat_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchownat_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fchownat x64" id="oval:ssg-test_audit_rules_dac_modification_fchownat_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fchownat_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fremovexattr x32" id="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fremovexattr x64" id="oval:ssg-test_audit_rules_dac_modification_fremovexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fsetxattr x32" id="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification fsetxattr x64" id="oval:ssg-test_audit_rules_dac_modification_fsetxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lchown x32" id="oval:ssg-test_audit_rules_dac_modification_lchown_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lchown_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lchown x64" id="oval:ssg-test_audit_rules_dac_modification_lchown_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lchown_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lremovexattr x32" id="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lremovexattr x64" id="oval:ssg-test_audit_rules_dac_modification_lremovexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lsetxattr x32" id="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification lsetxattr x64" id="oval:ssg-test_audit_rules_dac_modification_lsetxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification removexattr x32" id="oval:ssg-test_audit_rules_dac_modification_removexattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_removexattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification removexattr x64" id="oval:ssg-test_audit_rules_dac_modification_removexattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_removexattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification setxattr x32" id="oval:ssg-test_audit_rules_dac_modification_setxattr_x32:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_setxattr_x32:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="dac modification setxattr x64" id="oval:ssg-test_audit_rules_dac_modification_setxattr_x64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_dac_modification_setxattr_x64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit file delete" id="oval:ssg-test_audit_rules_file_deletion_events:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_file_deletion_events:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="immutable" id="oval:ssg-test_audit_rules_immutable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_immutable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit insmod" id="oval:ssg-test_audit_rule_kernel_module_loading_insmod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_insmod:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit rmmod" id="oval:ssg-test_audit_rule_kernel_module_loading_rmmod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_rmmod:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit modprobe" id="oval:ssg-test_audit_rule_kernel_module_loading_modprobe:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_modprobe:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit module syscalls" id="oval:ssg-test_audit_rule_kernel_module_loading_syscall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rule_kernel_module_loading_syscall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="tallylog" id="oval:ssg-test_audit_rules_login_events_tallylog:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_tallylog:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="faillock" id="oval:ssg-test_audit_rules_login_events_faillock:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_faillock:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="lastlog" id="oval:ssg-test_audit_rules_login_events_lastlog:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_login_events_lastlog:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit changes selinux" id="oval:ssg-test_audit_rules_mac_modification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_mac_modification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit mount" id="oval:ssg-test_audit_rules_media_export:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_media_export:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="network modification syscall" id="oval:ssg-test_audit_rules_networkconfig_modification_syscall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_syscall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/issue modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/issue.net modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_issue_net:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue_net:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/hosts modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_hosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_hosts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="/etc/sysconfig/network modification" id="oval:ssg-test_audit_rules_networkconfig_modification_etc_sysconfig_network:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_networkconfig_modification_etc_sysconfig_network:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/etc/audit/audit.rules contains -a always,exit -F path=path_to_binary -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged for each setuid or setgid binary on the system" id="oval:ssg-test_audit_rules_privileged_commands:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_privileged_commands:obj:1" />
<ns7:state state_ref="oval:ssg-state_audit_rules_privileged_commands:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="check if count of found privileged commands on the system is equal to count of audit.rules privileged commands definitions" id="oval:ssg-test_sets_dimension_match:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_dimension_of_object_system_privileged_commands:obj:1" />
<ns7:state state_ref="oval:ssg-state_set_dimension_match:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" comment="utmp" id="oval:ssg-test_audit_rules_session_events_utmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_utmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="btmp" id="oval:ssg-test_audit_rules_session_events_btmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_btmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="wtmp" id="oval:ssg-test_audit_rules_session_events_wtmp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_session_events_wtmp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit sudoers" id="oval:ssg-test_audit_rules_sysadmin_actions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_sysadmin_actions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S adjtime and key" id="oval:ssg-test_audit_rules_time_adjtimex_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_adjtimex_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S adjtime and key" id="oval:ssg-test_audit_rules_time_adjtimex_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_adjtimex_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S clock_settime and key" id="oval:ssg-test_audit_rules_time_clock_settime_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_clock_settime_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S clock_settime and key" id="oval:ssg-test_audit_rules_time_clock_settime_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_clock_settime_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S settimeofday and key" id="oval:ssg-test_audit_rules_time_settimeofday_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_settimeofday_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S settimeofday and key" id="oval:ssg-test_audit_rules_time_settimeofday_x86_64:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_settimeofday_x86_64:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S stime and key" id="oval:ssg-test_audit_rules_time_stime_x86:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_stime_x86:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence etc localtime file in the rules file" id="oval:ssg-test_audit_rules_time_watch_localtime:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_audit_rules_time_watch_localtime:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="32-bit audit file eacces" id="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="32-bit audit file eperm" id="oval:ssg-test_32bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="64-bit audit file eacces" id="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eacces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="64-bit audit file eperm" id="oval:ssg-test_64bit_audit_rules_unsuccessful_file_modification_eperm:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/group" id="oval:ssg-test_audit_rules_usergroup_modification_etc_group:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_group:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/passwd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_passwd:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/gshadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_gshadow:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/shadow" id="oval:ssg-test_audit_rules_usergroup_modification_etc_shadow:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audit /etc/security/opasswd" id="oval:ssg-test_audit_rules_usergroup_modification_etc_security_opasswd:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi TTL setting" id="oval:ssg-test_avahi_ttl_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ttl_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi disable publishing" id="oval:ssg-test_avahi_disable_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_disable_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi IPv4 setting" id="oval:ssg-test_avahi_ipv4_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ipv4_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi IPv6 setting" id="oval:ssg-test_avahi_ipv6_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_ipv6_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Prevent Avahi Port Sharing" id="oval:ssg-test_avahi_port_sharing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_port_sharing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict User Publishing" id="oval:ssg-test_avahi_restrict_user_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_user_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Address Publishing" id="oval:ssg-test_avahi_restrict_address_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_address_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict HW Publishing" id="oval:ssg-test_avahi_restrict_CPU_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_CPU_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Workstation Publishing" id="oval:ssg-test_avahi_restrict_workstation_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_workstation_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Avahi Restrict Domain Publishing" id="oval:ssg-test_avahi_restrict_domain_publishing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_avahi_restrict_domain_publishing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check for audit=1 in /etc/grub.conf" id="oval:ssg-test_bootloader_audit_argument:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_audit_argument:obj:1" />
<ns7:state state_ref="oval:ssg-state_bootloader_audit_argument:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="look for argument 'nousb' in the kernel line in /etc/grub.conf" id="oval:ssg-test_bootloader_nousb_argument:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_nousb_argument:obj:1" />
<ns7:state state_ref="oval:ssg-state_bootloader_nousb_argument:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /etc/grub.conf" id="oval:ssg-test_bootloader_password:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_bootloader_password:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the domain-name settings" id="oval:ssg-test_dhcp_client_domain-named:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_domain-named:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the domain-name-servers settings" id="oval:ssg-test_dhcp_client_domain-name-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_domain-name-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the clients nis-domain settings" id="oval:ssg-test_dhcp_client_nis-domain:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_nis-domain:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client nis-servers settings" id="oval:ssg-test_dhcp_client_nis-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_nis-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client ntp-servers settings" id="oval:ssg-test_dhcp_client_ntp-servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_ntp-servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client routers settings" id="oval:ssg-test_dhcp_client_routers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_routers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client time-offset settings" id="oval:ssg-test_dhcp_client_time-offset:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_time-offset:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client subnet-mask settings" id="oval:ssg-test_dhcp_client_subnet-mask:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_subnet-mask:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Checks the client broadcast-address settings" id="oval:ssg-test_dhcp_client_broadcast-address:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_client_broadcast-address:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that rsyslog is logging dhcp" id="oval:ssg-test_dhcp_server_configure_logging:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_configure_logging:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that bootp is disabled" id="oval:ssg-test_dhcp_server_disable_bootp:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_disable_bootp:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that deny is set to declines" id="oval:ssg-test_dhcp_server_deny_declines:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_deny_declines:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that ddns-update-style is set to none" id="oval:ssg-test_dhcp_server_disable_ddns:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_server_disable_ddns:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that domain-name is not set" id="oval:ssg-test_dhcp_domain-named_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_domain-named_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that domain-name-servers is not set" id="oval:ssg-test_dhcp_domain-name-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_domain-name-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that nis-domain is not set" id="oval:ssg-test_dhcp_nis-domain_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_nis-domain_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that nis-servers is not set" id="oval:ssg-test_dhcp_nis-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_nis-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that ntp-servers is not set" id="oval:ssg-test_dhcp_ntp-servers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_ntp-servers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that routers is not set" id="oval:ssg-test_dhcp_routers_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_routers_info:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests that time-offset is not set" id="oval:ssg-test_dhcp_time-offset_info:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dhcp_time-offset_info:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" comment="check for local directories that are world writable and have uid greater than or equal to 500" id="oval:ssg-test_dir_world_writable_uid_gt_500:tst:1" version="1">
<ns6:object object_ref="oval:ssg-all_local_directories:obj:1" />
<ns6:state state_ref="oval:ssg-state_gid_is_user_and_world_writable:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable Ctrl-Alt-Del key sequence" id="oval:ssg-test_disable_ctrlaltdel:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_disable_ctrlaltdel:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_test_disable_ctrlaltdel_exists:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that PROMPT=no in /etc/sysconfig/init" id="oval:ssg-test_interactive_boot_disabled_in_sysconfig_init:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_interactive_boot_disabled_in_sysconfig_init:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check the presence of 'confirm' kernel boot argument in /etc/grub.conf. Fail if found." id="oval:ssg-test_confirm_kernel_boot_argument_not_present:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_confirm_kernel_boot_argument_not_present:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg-test_display_login_attempts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_display_login_attempts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the disable_plaintext_auth[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file" id="oval:ssg-test_dovecot_disable_plaintext_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dovecot_disable_plaintext_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ssl[\s]*(<:nocomment:>*) setting in the /etc/dovecot.conf file" id="oval:ssg-test_dovecot_enable_ssl:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_dovecot_enable_ssl:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" id="oval:ssg-test_selinux_grub:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_selinux_grub:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg-test_file_group_owner_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_group_owner_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_group_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/efi/EFI/redhat/grub.conf owned by root" id="oval:ssg-test_file_group_owner_efi_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_group_owner_efi_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_group_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing file permissions" id="oval:ssg-test_file_permissions_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_permissions_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="setgid files outside system RPMs" id="oval:ssg-check_setgid_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_sgid:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="setuid files outside system RPMs" id="oval:ssg-check_setuid_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_suid:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg-test_file_user_owner_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_user_owner_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_user_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/boot/efi/EFI/redhat/grub.conf owned by root" id="oval:ssg-test_file_user_owner_efi_grub_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_user_owner_efi_grub_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_user_owner_grub_conf:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Configure FTP firewall" id="oval:ssg-test_ftp_configure_firewall:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_configure_firewall:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable uploads" id="oval:ssg-test_ftp_disable_uploads:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_disable_uploads:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Enable ftp user list" id="oval:ssg-test_ftp_user_list_enable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_enable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set ftp user list file" id="oval:ssg-test_ftp_user_list_file:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_file:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Use ftp user list" id="oval:ssg-test_ftp_user_list_deny:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_user_list_deny:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable anonymous access" id="oval:ssg-test_ftp_restrict_to_anon:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_ftp_restrict_to_anon:obj:1" />
</ns7:textfilecontent54_test>
<ns7:xmlfilecontent_test check="all" comment="checks for gconf-tree file" id="oval:ssg-test_tree_gconf_gdm_disable_user_list:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_disable_user_list_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for absent gconf-tree file" id="oval:ssg-test_no_tree_gconf_gdm_disable_user_list:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_disable_user_list_no_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="stuff" id="oval:ssg-test_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for gconf-tree file" id="oval:ssg-test_tree_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="checks for absent gconf-tree file" id="oval:ssg-test_no_tree_gconf_gdm_enable_warning_gui_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_message_enable_no_tree:obj:1" />
<ns7:state state_ref="oval:ssg-state_banner_message_enable:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_no_tree_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_tree_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="test screensaver timeout period" id="oval:ssg-test_tree_gconf_gdm_set_login_banner_text:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_tree_gconf_gdm_set_login_banner_text:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable automount in GNOME" id="oval:ssg-test_gconf_gnome_disable_automount:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_automount:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable automount in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_automount:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_automount:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable autorun in GNOME" id="oval:ssg-test_gconf_gnome_disable_automount_autorun:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_automount_autorun:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable autorun in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_automount_autorun:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_automount_autorun:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="temperature is disabled" id="oval:ssg-test_disable_clock_temperature:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_clock_temperature:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_temperature:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="temperature is disabled" id="oval:ssg-test_gconf_tree_disable_clock_temperature:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_clock_temperature:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_temperature:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="weather is disabled" id="oval:ssg-test_disable_clock_weather:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_clock_weather:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_weather:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="weather is disabled" id="oval:ssg-test_gconf_tree_disable_clock_weather:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_clock_weather:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_clock_weather:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="set Ctrl-Alt-Del key sequence to nothing" id="oval:ssg-test_gnome_disable_ctrlaltdel_reboot:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_disable_ctrlaltdel_reboot:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="set Ctrl-Alt-Del key sequence to nothing" id="oval:ssg-test_gconf_tree_gnome_disable_ctrlaltdel_reboot:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_disable_ctrlaltdel_reboot:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable restart/shutdown buttons" id="oval:ssg-test_disable_restart_shutdown:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_restart_shutdown:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_restart_shutdown:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable restart/shutdown buttons" id="oval:ssg-test_gconf_tree_disable_restart_shutdown:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_restart_shutdown:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_restart_shutdown:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable thumbnailers in GNOME" id="oval:ssg-test_gconf_gnome_disable_thumbnailers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_gnome_disable_thumbnailers:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" check_existence="all_exist" comment="Disable thumbnailers in GNOME" id="oval:ssg-test_gconf_tree_gnome_disable_thumbnailers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_gconf_tree_gnome_disable_thumbnailers:obj:1" />
<ns7:state state_ref="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi creation is disabled" id="oval:ssg-test_disable_wifi_create:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_create:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_create:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi creation is disabled" id="oval:ssg-test_gconf_tree_disable_wifi_create:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_create:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_create:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable wifi disconnect" id="oval:ssg-test_disable_wifi_disconnect:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_disconnect:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_disconnect:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="disable wifi disconnect" id="oval:ssg-test_gconf_tree_disable_wifi_disconnect:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_disconnect:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_disconnect:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi connection notification is disabled" id="oval:ssg-test_disable_wifi_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_wifi_notification:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_notification:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="wifi connection notification is disabled" id="oval:ssg-test_gconf_tree_disable_wifi_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_disable_wifi_notification:obj:1" />
<ns7:state state_ref="oval:ssg-state_disable_wifi_notification:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver is activated on idle" id="oval:ssg-test_gnome_screensaver_idle_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_idle_activated:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver is activated on idle" id="oval:ssg-test_gconf_tree_gnome_screensaver_idle_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_idle_activated:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="test screensaver timeout period" id="oval:ssg-test_gnome_screensaver_idle_delay:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_idle_delay:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="test screensaver timeout period" id="oval:ssg-test_gconf_tree_gnome_screensaver_idle_delay:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_idle_delay:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="screensaver lock is enabled" id="oval:ssg-test_screensaver_lock_enabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_screensaver_lock_enabled:obj:1" />
<ns7:state state_ref="oval:ssg-state_screensaver_lock_enabled:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="screensaver lock is enabled" id="oval:ssg-test_gconf_tree_screensaver_lock_enabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_screensaver_lock_enabled:obj:1" />
<ns7:state state_ref="oval:ssg-state_screensaver_lock_enabled:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="Force log off users" id="oval:ssg-test_gnome_screensaver_max_idle_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_max_idle_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="Force log off users" id="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="check value of max_idle_time in GCONF" id="oval:ssg-test_gnome_screensaver_max_idle_time:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_max_idle_time:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="check value of max_idle_time in GCONF" id="oval:ssg-test_gconf_tree_gnome_screensaver_max_idle_time:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_time:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver set to blank screen" id="oval:ssg-test_gnome_screensaver_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gnome_screensaver_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_mode:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:xmlfilecontent_test check="all" comment="gnome screensaver set to blank screen" id="oval:ssg-test_gconf_tree_gnome_screensaver_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gconf_tree_gnome_screensaver_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_gnome_screensaver_mode:ste:1" />
</ns7:xmlfilecontent_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check for fips=1 in /etc/grub.conf" id="oval:ssg-test_grub_enable_fips_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_grub_enable_fips_mode:obj:1" />
<ns7:state state_ref="oval:ssg-state_grub_enable_fips_mode:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv4" id="oval:ssg-test_iptables_sshd_disabled_ipv4:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_sshd_disabled_ipv4:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv6" id="oval:ssg-test_iptables_sshd_disabled_ipv6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_sshd_disabled_ipv6:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Verify there doesn't exist SSD drive on system with 'add_random' set to '1'" id="oval:ssg-test_kernel_disable_entropy_contribution_for_solid_state_drives:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_kernel_disable_entropy_contribution_for_solid_state_drives:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module bluetooth disabled" id="oval:ssg-test_kernmod_bluetooth_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module bluetooth disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_bluetooth_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module cramfs disabled" id="oval:ssg-test_kernmod_cramfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_cramfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module cramfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_cramfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module dccp disabled" id="oval:ssg-test_kernmod_dccp_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_dccp_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module dccp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_dccp_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module freevxfs disabled" id="oval:ssg-test_kernmod_freevxfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module freevxfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_freevxfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfs disabled" id="oval:ssg-test_kernmod_hfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfsplus disabled" id="oval:ssg-test_kernmod_hfsplus_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module hfsplus disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_hfsplus_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="ipv6 disabled any modprobe conf file" id="oval:ssg-test_kernel_module_ipv6_option_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module jffs2 disabled" id="oval:ssg-test_kernmod_jffs2_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_jffs2_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module jffs2 disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_jffs2_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module rds disabled" id="oval:ssg-test_kernmod_rds_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_rds_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module rds disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_rds_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_rds_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module sctp disabled" id="oval:ssg-test_kernmod_sctp_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_sctp_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module sctp disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_sctp_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module squashfs disabled" id="oval:ssg-test_kernmod_squashfs_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_squashfs_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module squashfs disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_squashfs_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module tipc disabled" id="oval:ssg-test_kernmod_tipc_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_tipc_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module tipc disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_tipc_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_tipc_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module udf disabled" id="oval:ssg-test_kernmod_udf_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_udf_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module udf disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_udf_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module usb-storage disabled" id="oval:ssg-test_kernmod_usb-storage_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="kernel module usb-storage disabled in /etc/modprobe.conf" id="oval:ssg-test_kernmod_usb-storage_modprobeconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the ssl start_tls setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_start_tls_ssl:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_start_tls_ssl:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertdir setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_tls_cacertdir:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_tls_cacertdir:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertfile setting in the /etc/pam_ldap.conf file" id="oval:ssg-test_ldap_client_tls_cacertfile:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ldap_client_tls_cacertfile:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Define default gateways" id="oval:ssg-test_network_ipv6_default_gateway:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_default_gateway:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Enable privacy extensions on each interface" id="oval:ssg-test_network_ipv6_privacy_extensions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_privacy_extensions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set static IPv6 address on each interface" id="oval:ssg-test_network_ipv6_static_address:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_static_address:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensure more than one ntpd NTP server is set" id="oval:ssg-test_ntpd_multiple_servers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ntpd_multiple_servers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure at least one ntpd NTP server is set" id="oval:ssg-test_ntp_remote_server:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ntp_remote_server:obj:1" />
</ns7:textfilecontent54_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package GConf2 is installed" id="oval:ssg-test_package_GConf2_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_GConf2_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package abrt is removed" id="oval:ssg-test_package_abrt_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_abrt_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package at is removed" id="oval:ssg-test_package_at_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_at_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package autofs is removed" id="oval:ssg-test_package_autofs_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_autofs_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package avahi is installed" id="oval:ssg-test_package_avahi_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_avahi_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package bluez is removed" id="oval:ssg-test_package_bluez_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_bluez_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cpuspeed is removed" id="oval:ssg-test_package_cpuspeed_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cpuspeed_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package cronie is installed" id="oval:ssg-test_package_cronie_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cronie_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cups is removed" id="oval:ssg-test_package_cups_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cups_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package cyrus-sasl is removed" id="oval:ssg-test_package_cyrus-sasl_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_cyrus-sasl_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dbus is removed" id="oval:ssg-test_package_dbus_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dbus_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package esc is installed" id="oval:ssg-test_package_esc_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_esc_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package gdm is installed" id="oval:ssg-test_package_gdm_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_gdm_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package hal is removed" id="oval:ssg-test_package_hal_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_hal_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package iptables-ipv6 is installed" id="oval:ssg-test_package_iptables-ipv6_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iptables-ipv6_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package iptables is installed" id="oval:ssg-test_package_iptables_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iptables_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package iputils is removed" id="oval:ssg-test_package_iputils_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_iputils_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package irqbalance is installed" id="oval:ssg-test_package_irqbalance_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_irqbalance_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package kexec-tools is removed" id="oval:ssg-test_package_kexec-tools_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_kexec-tools_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package libcgroup is removed" id="oval:ssg-test_package_libcgroup_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_libcgroup_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package mdadm is removed" id="oval:ssg-test_package_mdadm_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_mdadm_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package nfs-utils is removed" id="oval:ssg-test_package_nfs-utils_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_nfs-utils_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ntpdate is removed" id="oval:ssg-test_package_ntpdate_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ntpdate_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package oddjob is removed" id="oval:ssg-test_package_oddjob_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_oddjob_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package openswan is installed" id="oval:ssg-test_package_openswan_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openswan_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package pam_ldap is removed" id="oval:ssg-test_package_pam_ldap_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pam_ldap_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package pam_pkcs11 is installed" id="oval:ssg-test_package_pam_pkcs11_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pam_pkcs11_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package pcsc-lite is installed" id="oval:ssg-test_package_pcsc-lite_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_pcsc-lite_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package policycoreutils is installed" id="oval:ssg-test_package_policycoreutils_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_policycoreutils_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package portreserve is removed" id="oval:ssg-test_package_portreserve_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_portreserve_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package postfix is installed" id="oval:ssg-test_package_postfix_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_postfix_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package psacct is installed" id="oval:ssg-test_package_psacct_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_psacct_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package qpid-cpp-server is removed" id="oval:ssg-test_package_qpid-cpp-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package quota is removed" id="oval:ssg-test_package_quota_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_quota_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rhnsd is removed" id="oval:ssg-test_package_rhnsd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rhnsd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rpcbind is removed" id="oval:ssg-test_package_rpcbind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rpcbind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package samba is removed" id="oval:ssg-test_package_samba_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package smartmontools is removed" id="oval:ssg-test_package_smartmontools_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_smartmontools_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package subscription-manager is removed" id="oval:ssg-test_package_subscription-manager_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_subscription-manager_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package sysstat is removed" id="oval:ssg-test_package_sysstat_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_sysstat_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package xorg-x11-server-common is removed" id="oval:ssg-test_package_xorg-x11-server-common_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_xorg-x11-server-common_removed:obj:1" />
</ns8:rpminfo_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="inet_interfaces in /etc/postfix/main.cf should be set correctly" id="oval:ssg-test_postfix_network_listening_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_postfix_network_listening_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests that the SINGLE variable in the /etc/sysconfig/init file is set to /sbin/sulogin, to ensure that a password must be entered to access single user mode" id="oval:ssg-test_require_singleuser_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_require_singleuser_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_abrtd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_abrtd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_abrtd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_acpid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_acpid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_acpid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_atd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_atd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_atd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_auditd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_auditd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_auditd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_autofs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_autofs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_autofs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_avahi-daemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_avahi-daemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_avahi-daemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_bluetooth:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_bluetooth:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_bluetooth_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_certmonger:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_certmonger:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_certmonger_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cgconfig:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cgconfig:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgconfig_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cgred:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cgred:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cgred_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cpuspeed:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cpuspeed:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cpuspeed_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_crond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_crond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_crond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_cups:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_cups:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_cups_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_dhcpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_dhcpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dhcpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_dovecot:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_dovecot:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_dovecot_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_haldaemon:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_haldaemon:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_haldaemon_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_httpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_httpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ip6tables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ip6tables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ip6tables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_iptables:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_iptables:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_iptables_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_irqbalance:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_irqbalance:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_irqbalance_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_kdump:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_kdump:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_kdump_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_mdmonitor:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_mdmonitor:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_mdmonitor_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_messagebus:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_messagebus:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_messagebus_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_named:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_named:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_named_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_netconsole:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_netconsole:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netconsole_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_netfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_netfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_netfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_nfs:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_nfs:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfs_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_nfslock:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_nfslock:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_nfslock_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ntpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ntpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ntpdate:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ntpdate:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ntpdate_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_oddjobd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_oddjobd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_oddjobd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_pcscd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_pcscd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_pcscd_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_portreserve:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_portreserve:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_portreserve_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_postfix:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_postfix:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_postfix_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_psacct:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_psacct:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_psacct_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_qpidd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_qpidd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_qpidd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_quota_nld:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_quota_nld:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_quota_nld_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rdisc:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rdisc:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rdisc_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_restorecond:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_restorecond:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_restorecond_on:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rexec disabled" id="oval:ssg-test_etc_xinetd_rexec_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rexec_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rhnsd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rhnsd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhnsd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rhsmcertd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rhsmcertd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rhsmcertd_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rlogin disabled" id="oval:ssg-test_etc_xinetd_rlogin_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rlogin_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcidmapd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcidmapd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcidmapd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rpcsvcgssd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rpcsvcgssd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rpcsvcgssd_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" comment="rsh disabled" id="oval:ssg-test_etc_xinetd_rsh_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_xinetd_rsh_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_rsyslog:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_rsyslog:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_rsyslog_on:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_saslauthd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_saslauthd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_saslauthd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_smartd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_smartd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smartd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_smb:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_smb:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_smb_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_snmpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_snmpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_snmpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_squid:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_squid:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_squid_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_sshd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_sshd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sshd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_sysstat:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_sysstat:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_sysstat_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable Telnet Service" id="oval:ssg-test_service_telnetd_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_service_telnetd_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_tftp:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_tftp:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_tftp_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_vsftpd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_vsftpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_vsftpd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_xinetd:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_xinetd:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_xinetd_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel0_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel0_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel1_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel1_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel2_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel2_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel3_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel3_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel4_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel4_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel5_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel5_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns6:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg-test_runlevel6_ypbind:tst:1" version="2">
<ns6:object object_ref="oval:ssg-obj_runlevel6_ypbind:obj:1" />
<ns6:state state_ref="oval:ssg-state_service_ypbind_off:ste:1" />
</ns6:runlevel_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/ip6tables for line :INPUT DROP [0:0]" id="oval:ssg-test_ip6tables_input_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ip6tables_input_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/ip6tables for line :INPUT ACCEPT [0:0]" id="oval:ssg-test_ip6tables_input_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ip6tables_input_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT DROP [0:0]" id="oval:ssg-test_iptables_input_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_input_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT ACCEPT [0:0]" id="oval:ssg-test_iptables_input_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_input_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :FORWARD DROP [0:0]" id="oval:ssg-test_iptables_forward_drop:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_forward_drop:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :FORWARD ACCEPT [0:0]" id="oval:ssg-test_iptables_forward_accept:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_iptables_forward_accept:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="at least one" check_existence="at_least_one_exists" comment="Test ocsp_on in /etc/pam_pkcs11/pkcs11.conf" id="oval:ssg-test_pam_pkcs11_cert_policy_ocsp_on:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1" />
<ns7:state state_ref="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is enabled in /etc/pam.d/system-auth file" id="oval:ssg-test_smart_card_enabled_system_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_enabled_system_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is required in /etc/pam.d/system-auth file" id="oval:ssg-test_smart_card_required_system_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_required_system_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test smartcard authentication is required in /etc/pam.d/smartcard-auth file" id="oval:ssg-test_smart_card_required_smartcard_auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_smart_card_required_smartcard_auth:obj:1" />
</ns7:textfilecontent54_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check fs.suid_dumpable kernel runtime parameter" id="oval:ssg-test_runtime_fs_suid_dumpable:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_fs_suid_dumpable:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_fs_suid_dumpable:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.dmesg_restrict kernel runtime parameter" id="oval:ssg-test_runtime_kernel_dmesg_restrict:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_dmesg_restrict:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_dmesg_restrict:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.exec-shield kernel runtime parameter" id="oval:ssg-test_runtime_kernel_exec_shield:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_exec_shield:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_exec_shield:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check kernel.randomize_va_space kernel runtime parameter" id="oval:ssg-test_runtime_kernel_randomize_va_space:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_kernel_randomize_va_space:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_kernel_randomize_va_space:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.log_martians kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_log_martians:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_log_martians:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.rp_filter kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_rp_filter:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_rp_filter:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.secure_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.all.send_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_all_send_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_all_send_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.rp_filter kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_rp_filter:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_rp_filter:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.secure_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.conf.default.send_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_conf_default_send_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_conf_default_send_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.icmp_echo_ignore_broadcasts kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.icmp_ignore_bogus_error_responses kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.ip_forward kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_ip_forward:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_ip_forward:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_ip_forward:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv4.tcp_syncookies kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv4_tcp_syncookies:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv4_tcp_syncookies:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_ra kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_ra:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_ra:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.all.forwarding kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_all_forwarding:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_all_forwarding:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_ra kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_ra:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_ra:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_redirects kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns6:sysctl_test>
<ns6:sysctl_test check="all" check_existence="all_exist" comment="Check net.ipv6.conf.default.accept_source_route kernel runtime parameter" id="oval:ssg-test_runtime_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_runtime_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns6:state state_ref="oval:ssg-state_runtime_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns6:sysctl_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check fs.suid_dumpable static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_fs_suid_dumpable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check fs.suid_dumpable static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_fs_suid_dumpable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_fs_suid_dumpable:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check fs.suid_dumpable is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_fs_suid_dumpable_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.dmesg_restrict static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_dmesg_restrict:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.dmesg_restrict static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_dmesg_restrict:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_dmesg_restrict:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.dmesg_restrict is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_dmesg_restrict_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.exec-shield static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_exec_shield:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.exec-shield static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_exec_shield:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_exec_shield:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.exec-shield is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_exec_shield_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check kernel.randomize_va_space static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_kernel_randomize_va_space:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check kernel.randomize_va_space static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_kernel_randomize_va_space:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_kernel_randomize_va_space:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check kernel.randomize_va_space is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_kernel_randomize_va_space_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.log_martians static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_log_martians:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_log_martians:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.log_martians is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_log_martians_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.rp_filter static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.rp_filter is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_rp_filter_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.secure_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.secure_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_secure_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.all.send_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_all_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.all.send_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_all_send_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.rp_filter static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_rp_filter:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_rp_filter:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.rp_filter is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_rp_filter_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.secure_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.secure_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_secure_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.conf.default.send_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_conf_default_send_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_send_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.conf.default.send_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_conf_default_send_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.icmp_echo_ignore_broadcasts static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.icmp_echo_ignore_broadcasts is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.icmp_ignore_bogus_error_responses static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.icmp_ignore_bogus_error_responses is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.ip_forward static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_ip_forward:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.ip_forward static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_ip_forward:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_ip_forward:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.ip_forward is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_ip_forward_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv4.tcp_syncookies static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv4.tcp_syncookies static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv4_tcp_syncookies:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv4_tcp_syncookies:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv4.tcp_syncookies is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv4_tcp_syncookies_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_ra static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_ra is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_ra_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.all.forwarding static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_all_forwarding:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_forwarding:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.all.forwarding is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_all_forwarding_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_ra static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_ra:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_ra:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_ra is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_ra_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_redirects static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_redirects is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_redirects_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="only_one_exists" comment="Check net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.d/*" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Check net.ipv6.conf.default.accept_source_route static configuration in /etc/sysctl.conf" id="oval:ssg-test_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:obj:1" />
<ns7:state state_ref="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check net.ipv6.conf.default.accept_source_route is not used in some file from /etc/sysctl.d/* location" id="oval:ssg-test_static_sysctld_net_ipv6_conf_default_accept_source_route_not_used:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="default runlevel is 3" id="oval:ssg-test_etc_inittab_default_runlevel:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_inittab_default_runlevel:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd" id="oval:ssg-test_etc_default_useradd_inactive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_default_useradd_inactive:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_default_useradd_inactive:ste:1" />
<ns7:state state_ref="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="There should not exist duplicate user name entries in /etc/passwd" id="oval:ssg-test_etc_passwd_no_duplicate_user_names:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" id="oval:ssg-test_maxlogins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1" />
<ns7:state state_ref="oval:ssg-state_maxlogins:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1" />
<ns7:state state_ref="oval:ssg-state_maxlogins:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.d/*.conf" id="oval:ssg-test_limitsd_maxlogins_exists:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of PASS_MAX_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_max_days:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_max_days_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_max_days_instance_value:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="The value of PASS_MIN_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_days:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_min_days_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_min_days_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="test that there are no accounts with UID 0 except root in the /etc/passwd file" id="oval:ssg-test_accounts_no_uid_except_root:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_no_uid_except_root:obj:1" />
</ns7:textfilecontent54_test>
<ns6:password_test check="all" comment="password hashes are shadowed" id="oval:ssg-test_accounts_password_all_shadowed:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_accounts_password_all_shadowed:obj:1" />
<ns6:state state_ref="oval:ssg-state_accounts_password_all_shadowed:ste:1" />
</ns6:password_test>
<ns7:variable_test check="all" comment="The value of PASS_MIN_LEN should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_min_len:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_min_len_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_min_len_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if remember attribute of pam_unix.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_unix_remember:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_password_pam_unix_remember:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test if remember attribute of pam_pwhistory.so is set correctly in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_password_pam_pwhistory_remember:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of PASS_WARN_AGE should be set appropriately in /etc/login.defs" id="oval:ssg-test_pass_warn_age:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_pass_warn_age_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_pass_warn_age_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check maximum failed login attempts allowed in /etc/pam.d/system-auth (authfail)" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock_so is called in account phase of /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_system-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check pam_faillock.so preauth silent present in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_silent_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check maximum failed login attempts allowed in /etc/pam.d/password-auth (authfail)" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_deny_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Check if pam_faillock_so is called in account phase of /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_account_phase_password-auth:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum preauth fail_interval allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum authfail fail_interval allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum authfail fail_interval allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_fail_interval_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum preauth fail_interval allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check preauth maximum failed login attempts allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check authfail maximum failed login attempts allowed in /etc/pam.d/system-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check authfail maximum failed login attempts allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_unlock_time_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check preauth maximum failed login attempts allowed in /etc/pam.d/password-auth" id="oval:ssg-test_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:obj:1" />
<ns7:state state_ref="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check if there aren't directories in root's path having write permission set for group or other" id="oval:ssg-test_accounts_root_path_dirs_no_group_other_write:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile" id="oval:ssg-test_etc_profile_tmout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_profile_tmout:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="TMOUT in /etc/profile.d/*.sh" id="oval:ssg-test_etc_profiled_tmout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_profiled_tmout:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_profile_tmout:ste:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/bashrc umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_bashrc:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_bashrc:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_bashrc:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/csh.cshrc umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_csh_cshrc:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_csh_cshrc:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_csh_cshrc:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/login.defs umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_login_defs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/profile umask value(s) match the var_accounts_user_umask requirement" id="oval:ssg-tst_accounts_umask_etc_profile:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_accounts_umask_etc_profile:obj:1" />
<ns7:state state_ref="oval:ssg-ste_accounts_umask_etc_profile:ste:1" />
</ns7:variable_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing existence of new aide database file" id="oval:ssg-test_aide_build_new_database_absolute_path:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_aide_build_new_database_absolute_path:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing existence of operational aide database file" id="oval:ssg-test_aide_operational_database_absolute_path:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_aide_operational_database_absolute_path:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_periodic_cron_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_periodic_cron_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_crond_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_crond_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron" id="oval:ssg-test_aide_var_cron_checking:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_var_cron_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="run aide daily with cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_checking:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_aide_crontabs_checking:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_scan_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_aide_scan_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes" id="oval:ssg-test_aide_var_cron_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_var_cron_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="notify personnel when aide completes in cron.(daily|weekly|monthly)" id="oval:ssg-test_aide_crontabs_notification:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_crontabs_notification:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Verify non-FIPS hashes are not configured in /etc/aide.conf" id="oval:ssg-test_aide_non_fips_hashes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_non_fips_hashes:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify FIPS hashes are configured in /etc/aide.conf" id="oval:ssg-test_aide_use_fips_hashes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_use_fips_hashes:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_use_fips_hashes:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="acl is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_acls:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_verify_acls:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_verify_acls:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="xattrs is set in /etc/aide.conf" id="oval:ssg-test_aide_verify_ext_attributes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_aide_verify_ext_attributes:obj:1" />
<ns7:state state_ref="oval:ssg-state_aide_verify_ext_attributes:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="audispd syslog plugin activated" id="oval:ssg-test_auditd_audispd_syslog_plugin_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="log_group = root" id="oval:ssg-test_auditd_conf_log_group_not_root:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_conf_log_group_root:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="email account for actions" id="oval:ssg-test_auditd_data_retention_action_mail_acct:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_admin_space_left_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="test the value of flush parameter in /etc/audit/auditd.conf" id="oval:ssg-test_auditd_data_retention_flush:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_flush:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_flush:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="max log file size" id="oval:ssg-test_auditd_data_retention_max_log_file:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_max_log_file_action:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg-test_auditd_data_retention_num_logs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_num_logs:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_num_logs:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="space left action" id="oval:ssg-test_auditd_data_retention_space_left_action:tst:1" version="2">
<ns7:object object_ref="oval:ssg-object_auditd_data_retention_space_left_action:obj:1" />
<ns7:state state_ref="oval:ssg-state_auditd_data_retention_space_left_action:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/issue" id="oval:ssg-test_banner_etc_issue:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_banner_etc_issue:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable Browsing" id="oval:ssg-test_cups_disable_browsing_browsing_off:tst:1" version="2">
<ns7:object object_ref="oval:ssg-obj_cups_disable_browsing_browsing_off:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Do not allow incoming printer information packets" id="oval:ssg-test_cups_disable_browsing_browseallow:tst:1" version="2">
<ns7:object object_ref="oval:ssg-obj_cups_disable_browsing_browseallow:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable the more general port directive" id="oval:ssg-test_cups_disable_printserver_disable_port:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_cups_disable_printserver_disable_port:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Listen only at the localhost level" id="oval:ssg-test_cups_disable_printserver_use_listen:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_cups_disable_printserver_use_listen:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg-test_dir_perms_etc_httpd_conf:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_dir_perms_etc_httpd_conf:obj:1" />
<ns6:state state_ref="oval:ssg-state_dir_perms_etc_httpd_conf:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg-test_dir_perms_var_log_httpd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_dir_perms_var_log_httpd:obj:1" />
<ns6:state state_ref="oval:ssg-state_dir_perms_var_log_httpd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="all local world-writable directories have sticky bit set" id="oval:ssg-test_dir_perms_world_writable_sticky_bits:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_only_local_directories:obj:1" />
<ns6:state state_ref="oval:ssg-state_world_writable_and_not_sticky:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="sshd HostbasedAuthentication" id="oval:ssg-test_sshd_hostbasedauthentication:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_hostbasedauthentication:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests whether prelinking is disabled" id="oval:ssg-test_prelinking_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_prelinking_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="Tests the value of the ^[\s]*\*[\s]+(hard|-)[\s]+core[\s]+([\d]+) setting in the /etc/security/limits.conf file" id="oval:ssg-test_core_dumps_limitsconf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_core_dumps_limitsconf:obj:1" />
<ns7:state state_ref="oval:ssg-state_core_dumps_limitsconf:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/yum.conf" id="oval:ssg-test_yum_ensure_gpgcheck_globally_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_yum_ensure_gpgcheck_globally_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/dnf/dnf.conf" id="oval:ssg-test_dnf_ensure_gpgcheck_globally_activated:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_dnf_ensure_gpgcheck_globally_activated:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for existence of gpgcheck=0 in /etc/yum.repos.d/ files" id="oval:ssg-test_ensure_gpgcheck_never_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_ensure_gpgcheck_never_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the presence of daily setting in /etc/logrotate.conf file" id="oval:ssg-test_logrotate_conf_daily_setting:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logrotate_conf_daily_setting:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the existence of /etc/cron.daily/logrotate file (and verify it actually calls logrotate utility)" id="oval:ssg-test_cron_daily_logrotate_existence:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_cron_daily_logrotate_existence:obj:1" />
</ns7:textfilecontent54_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="Red Hat release key package is installed" id="oval:ssg-test_package_gpgkey-fd431d51-4ae0493b_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-fd431d51-4ae0493b:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="Red Hat auxiliary key package is installed" id="oval:ssg-test_package_gpgkey-2fa658e0-45700c69_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-2fa658e0-45700c69:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="CentOS7 key package is installed" id="oval:ssg-test_package_gpgkey-f4a80eb5-53a7ff4b_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-f4a80eb5-53a7ff4b:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="only one" check_existence="at_least_one_exists" comment="CentOS6 key package is installed" id="oval:ssg-test_package_gpgkey-c105b9de-4e0fd3a3_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_package_gpg-pubkey:obj:1" />
<ns8:state state_ref="oval:ssg-state_package_gpg-pubkey-c105b9de-4e0fd3a3:ste:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership" id="oval:ssg-test_file_groupowner_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg-test_file_groupowner_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_gshadow:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/passwd" id="oval:ssg-test_file_groupowner_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_groupowner_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_groupowner_etc_passwd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg-test_file_owner_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg-test_file_owner_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_gshadow:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg-test_file_owner_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_owner_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_owner_etc_passwd:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary directories uid root" id="oval:ssg-test_ownership_binary_directories:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_binary_directories:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary files uid root" id="oval:ssg-test_ownership_binary_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_binary_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library directories uid root" id="oval:ssg-test_ownership_lib_dir:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_lib_dir:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library files uid root" id="oval:ssg-test_ownership_lib_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_ownership_lib_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_directories:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg-test_ownership_var_log_audit_directories-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg-test_ownership_var_log_audit_files-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="binary files go-w" id="oval:ssg-test_perms_binary_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_binary_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing /etc/group permissions" id="oval:ssg-test_file_permissions_etc_group:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_etc_group:obj:1" />
<ns6:state state_ref="oval:ssg-state_file_permissions_etc_group:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/gshadow mode and ownership" id="oval:ssg-test_etc_gshadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_gshadow:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_gshadow_state_mode_0000:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/passwd mode and ownership" id="oval:ssg-test_etc_passwd:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_passwd:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_passwd_state_mode_0644_or_stronger:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/shadow mode and ownership" id="oval:ssg-test_etc_shadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_etc_shadow:obj:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_uid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_gid_0:ste:1" />
<ns6:state state_ref="oval:ssg-_etc_shadow_state_mode_0000:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="home directories" id="oval:ssg-test_file_permissions_home_dirs:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_home_dirs:obj:1" />
<ns6:state state_ref="oval:ssg-state_home_dirs_wrong_perm:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="all_exist" comment="/etc/httpd/conf/* permissions" id="oval:ssg-test_file_permissions_httpd_server_conf_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1" />
<ns6:state state_ref="oval:ssg-state_wrong_file_permissions_httpd_server_conf_files:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library directories go-w" id="oval:ssg-test_perms_lib_dir:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_lib_dir:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="library files go-w" id="oval:ssg-test_perms_lib_files:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_lib_files:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="world writable files" id="oval:ssg-test_file_permissions_unauthorized_world_write:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_unauthorized_world_write:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="none_exist" comment="files with no group owner" id="oval:ssg-test_file_permissions_ungroupowned:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_permissions_ungroupowned:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="/var/log/audit files mode 0640" id="oval:ssg-test_file_permissions_var_log_audit-non_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_var_log_audit_files-non_root:obj:1" />
<ns6:state state_ref="oval:ssg-state_not_mode_0640:ste:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="/var/log/audit files mode 0600" id="oval:ssg-test_file_permissions_var_log_audit:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_var_log_audit_files:obj:1" />
<ns6:state state_ref="oval:ssg-state_not_mode_0600:ste:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_enable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_enable:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_format:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_format:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="log ftp transactions" id="oval:ssg-test_ftp_log_transactions_protocol:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_log_transactions_protocol:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Banner for FTP Users" id="oval:ssg-test_ftp_present_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_test_ftp_present_banner:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Verify all GIDs referenced in /etc/passwd are defined in /etc/group" id="oval:ssg-test_gid_passwd_group_same:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_gid_passwd_group_same:obj:1" />
<ns7:state state_ref="oval:ssg-state_gid_passwd_group_same:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable GDM Automatic Login" id="oval:ssg-test_disable_automatic_login:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_disable_automatic_login:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable GDM Guest Login" id="oval:ssg-test_disable_guest_login:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_disable_guest_login:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing group ownership /etc/shadow" id="oval:ssg-test_groupowner_etc_shadow:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_groupowner_shadow_file:obj:1" />
<ns6:state state_ref="oval:ssg-state_groupowner_shadow_file:ste:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="AntiVirus package is installed" id="oval:ssg-test_linuxshield_install_antivirus:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_linuxshield_install_antivirus:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="Runtime Libraries package is installed" id="oval:ssg-test_mcafee_runtime_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_runtime_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="Agent package is installed" id="oval:ssg-test_mcafee_management_agent:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_management_agent:obj:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="McAfee ACCM installed" id="oval:ssg-test_mcafee_accm_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_mcafee_accm_exists:obj:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="McAfee IPS is installed" id="oval:ssg-test_mcafee_hbss_hips_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1" />
</ns8:rpminfo_test>
<ns6:file_test check="all" check_existence="all_exist" comment="McAfee Policy Auditor installed" id="oval:ssg-test_mcafee_auditengine_exists:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_mcafee_auditengine_exists:obj:1" />
</ns6:file_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 6" id="oval:ssg-test_centos6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos6:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 7" id="oval:ssg-test_centos7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos7:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos7:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="only_one_exists" comment="fedora-release RPM package is installed" id="oval:ssg-test_fedora_release_rpm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_fedora_release_rpm:obj:1" />
</ns8:rpminfo_test>
<ns7:textfilecontent54_test check="all" comment="CPE vendor is 'fedoraproject' and 'product' is fedora" id="oval:ssg-test_fedora_vendor_product:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_fedora_vendor_product:obj:1" />
</ns7:textfilecontent54_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="Test installed OS is part of the unix family" id="oval:ssg-test_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 6" id="oval:ssg-test_rhel_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 6" id="oval:ssg-test_rhel_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 6" id="oval:ssg-test_rhel_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_computenode:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel7_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_rhel7_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_rhel7_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 7" id="oval:ssg-test_rhel7_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 7" id="oval:ssg-test_rhel7_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 7" id="oval:ssg-test_rhel7_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_computenode:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 6" id="oval:ssg-test_sl6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl6:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 7" id="oval:ssg-test_sl7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl7:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl7:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_unix_wrlinux:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_unix_wrlinux:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_wrlinux:ste:1" />
</ns7:family_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="Test presence of /etc/wrlinux-release." id="oval:ssg-test_wrlinux:tst:1" version="1">
<ns6:object object_ref="oval:ssg-obj_test_wrlinux:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test HostLimit" id="oval:ssg-test_logwatch_configured_hostlimit:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logwatch_configured_hostlimit:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Test SplitHosts" id="oval:ssg-test_logwatch_configured_splithosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_logwatch_configured_splithosts:obj:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on /dev/shm" id="oval:ssg-test_nodev_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_nodev:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_nodev:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="noexec on /dev/shm" id="oval:ssg-test_noexec_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_noexec:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_noexec:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nosuid on /dev/shm" id="oval:ssg-test_nosuid_dev_shm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_dev_shm_partition_nosuid:obj:1" />
<ns8:state state_ref="oval:ssg-state_dev_shm_nosuid:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on local filesystems" id="oval:ssg-test_nodev_nonroot_local_partitions:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_non_root_partitions:obj:1" />
<ns8:state state_ref="oval:ssg-state_local_nodev:ste:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nodev" id="oval:ssg-test_nfs_nodev_etc_fstab:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nfs_nodev_etc_fstab:obj:1" />
<ns7:state state_ref="oval:ssg-state_remote_filesystem_nodev:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nodev:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="'nodev' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_nodev_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nodev_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nodev_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'nodev' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_nodev_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nodev_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'nodev' mount option in /etc/fstab" id="oval:ssg-test_nodev_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nodev_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nodev_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'nodev' mount option used for removable partition in runtime configuration" id="oval:ssg-test_nodev_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nodev_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" comment="'noexec' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_noexec_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_noexec_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_noexec_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'noexec' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_noexec_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_noexec_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'noexec' mount option in /etc/fstab" id="oval:ssg-test_noexec_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_noexec_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_noexec_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'noexec' mount option used for removable partition in runtime configuration" id="oval:ssg-test_noexec_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_noexec_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nosuid" id="oval:ssg-test_nfs_nosuid_etc_fstab:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1" />
<ns7:state state_ref="oval:ssg-state_remote_filesystem_nosuid:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg-test_no_nfs_defined_etc_fstab_nosuid:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" comment="'nosuid' mount option used for at least one CD / DVD drive alternative names in /etc/fstab" id="oval:ssg-test_nosuid_etc_fstab_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nosuid_etc_fstab_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nosuid_etc_fstab_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" comment="'nosuid' mount option used for at least one CD / DVD drive alternative names in runtime configuration" id="oval:ssg-test_nosuid_runtime_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nosuid_runtime_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="at least one" check_existence="all_exist" comment="Check if removable partition is configured with 'nosuid' mount option in /etc/fstab" id="oval:ssg-test_nosuid_etc_fstab_not_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_nosuid_etc_fstab_not_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_nosuid_etc_fstab_not_cd_dvd_drive:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="'nosuid' mount option used for removable partition in runtime configuration" id="oval:ssg-test_nosuid_runtime_not_cd_dvd_drive:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_nosuid_runtime_not_cd_dvd_drive:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/fstab" id="oval:ssg-test_20340111:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340111:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" id="oval:ssg-test_20340112:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340111:obj:1" />
<ns7:state state_ref="oval:ssg-state_20340112:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/mtab" id="oval:ssg-test_20340113:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340112:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" id="oval:ssg-test_20340114:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_20340112:obj:1" />
<ns7:state state_ref="oval:ssg-state_20340112:ste:1" />
</ns7:textfilecontent54_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nodev on /tmp" id="oval:ssg-test_nodev_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_nodev_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_nodev:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="noexec on /tmp" id="oval:ssg-test_noexec_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_noexec_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_noexec:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="nosuid on /tmp" id="oval:ssg-test_nosuid_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_tmp_nosuid_partition:obj:1" />
<ns8:state state_ref="oval:ssg-state_tmp_nosuid:ste:1" />
</ns8:partition_test>
<ns8:partition_test check="all" comment="Ensure /var/tmp is mounted" id="oval:ssg-test_mount_option_var_tmp:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_option_var_tmp:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Ensure bind mount option is on /var/tmp" id="oval:ssg-test_mount_option_var_tmp_bind:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_mount_option_var_tmp_bind:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check NOZEROCONF=yes in /etc/sysconfig/network" id="oval:ssg-test_sysconfig_nozeroconf_yes:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sysconfig_nozeroconf_yes:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for udp6 based rpc services" id="oval:ssg-test_network_ipv6_disable_rpc_udp6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_disable_rpc_udp6:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for tcp6 based rpc services" id="oval:ssg-test_network_ipv6_disable_rpc_tcp6:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_network_ipv6_disable_rpc_tcp6:obj:1" />
</ns7:textfilecontent54_test>
<ns6:interface_test check="all" check_existence="at_least_one_exists" comment="random" id="oval:ssg-test_promisc_interfaces:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_promisc_interfaces:obj:1" />
<ns6:state state_ref="oval:ssg-state_promisc:ste:1" />
</ns6:interface_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/etc/securetty file exists" id="oval:ssg-test_etc_securetty_exists:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_securetty_exists:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="no entries in /etc/securetty" id="oval:ssg-test_no_direct_root_logins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_direct_root_logins:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="make sure nullok is not used in /etc/pam.d/system-auth" id="oval:ssg-test_no_empty_passwords:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_no_empty_passwords:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check user ids on all files on the system" id="oval:ssg-no_files_unowned_by_user_test:tst:1" version="1">
<ns6:object object_ref="oval:ssg-file_permissions_unowned_object:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the insecure locks in /etc/exports" id="oval:ssg-test_no_insecure_locks_exports:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_no_insecure_locks_exports:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .netrc in /home" id="oval:ssg-test_no_netrc_files_home:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_netrc_files_home:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /root" id="oval:ssg-test_no_rsh_trust_files_root:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_root:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /home" id="oval:ssg-test_no_rsh_trust_files_home:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_home:obj:1" />
</ns6:file_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg-test_no_rsh_trust_files_etc:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_no_rsh_trust_files_etc:obj:1" />
</ns6:file_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<0, UID_MIN - 1> system UIDs having shell set" id="oval:ssg-test_shell_defined_default_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_default_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_default_uid_range:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MIN not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_min_not_defined:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="SYS_UID_MAX not defined in /etc/login.defs" id="oval:ssg-test_sys_uid_max_not_defined:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<0, SYS_UID_MIN> system UIDs having shell set" id="oval:ssg-test_shell_defined_reserved_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_reserved_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_reserved_uid_range:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" check_existence="all_exist" comment="<SYS_UID_MIN, SYS_UID_MAX> system UIDS having shell set" id="oval:ssg-test_shell_defined_dynalloc_uid_range:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1" />
<ns7:state state_ref="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1" />
</ns7:variable_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package aide is installed" id="oval:ssg-test_package_aide_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_aide_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package audit is installed" id="oval:ssg-test_package_audit_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_audit_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package bind is removed" id="oval:ssg-test_package_bind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_bind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dhcp is removed" id="oval:ssg-test_package_dhcp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dhcp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package dovecot is removed" id="oval:ssg-test_package_dovecot_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dovecot_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package dracut-fips is installed" id="oval:ssg-test_package_dracut-fips_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_dracut-fips_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package httpd is removed" id="oval:ssg-test_package_httpd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_httpd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package mcstrans is removed" id="oval:ssg-test_package_mcstrans_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_mcstrans_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package net-snmp is removed" id="oval:ssg-test_package_net-snmp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_net-snmp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package ntp is installed" id="oval:ssg-test_package_ntp_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ntp_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package openldap-servers is removed" id="oval:ssg-test_package_openldap-servers_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openldap-servers_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package openssh-server is removed" id="oval:ssg-test_package_openssh-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_openssh-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package prelink is removed" id="oval:ssg-test_package_prelink_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_prelink_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rsh-server is removed" id="oval:ssg-test_package_rsh-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsh-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package rsh is removed" id="oval:ssg-test_package_rsh_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsh_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package rsyslog is installed" id="oval:ssg-test_package_rsyslog_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_rsyslog_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package samba-common is installed" id="oval:ssg-test_package_samba-common_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba-common_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package samba-common is removed" id="oval:ssg-test_package_samba-common_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_samba-common_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package screen is installed" id="oval:ssg-test_package_screen_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_screen_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package sendmail is removed" id="oval:ssg-test_package_sendmail_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_sendmail_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package setroubleshoot is removed" id="oval:ssg-test_package_setroubleshoot_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_setroubleshoot_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package squid is removed" id="oval:ssg-test_package_squid_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_squid_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package talk-server is removed" id="oval:ssg-test_package_talk-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_talk-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package talk is removed" id="oval:ssg-test_package_talk_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_talk_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package telnet-server is removed" id="oval:ssg-test_package_telnet-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_telnet-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package telnet is removed" id="oval:ssg-test_package_telnet_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_telnet_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package tftp-server is removed" id="oval:ssg-test_package_tftp-server_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_tftp-server_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package tftp is removed" id="oval:ssg-test_package_tftp_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_tftp_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="all_exist" comment="package vsftpd is installed" id="oval:ssg-test_package_vsftpd_installed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_vsftpd_installed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package vsftpd is removed" id="oval:ssg-test_package_vsftpd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_vsftpd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package xinetd is removed" id="oval:ssg-test_package_xinetd_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_xinetd_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ypbind is removed" id="oval:ssg-test_package_ypbind_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ypbind_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="none_exist" comment="package ypserv is removed" id="oval:ssg-test_package_ypserv_removed:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_package_ypserv_removed:obj:1" />
</ns8:rpminfo_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/home on own partition" id="oval:ssg-test_home_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_home_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/tmp on own partition" id="oval:ssg-test_tmp_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_own_tmp_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/var on own partition" id="oval:ssg-test_var_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="/var/log on own partition" id="oval:ssg-test_var_log_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_log_own_partition:obj:1" />
</ns8:partition_test>
<ns8:partition_test check="all" check_existence="all_exist" comment="check for /var/log/audit partition" id="oval:ssg-test_var_log_audit_partition:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_mount_var_log_audit_own_partition:obj:1" />
</ns8:partition_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Set banner" id="oval:ssg-test_postfix_server_banner:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_postfix_server_banner:obj:1" />
</ns7:textfilecontent54_test>
<ns6:file_test check="all" check_existence="none_exist" comment="Check if expected removable partitions truly exist on the system" id="oval:ssg-test_removable_partition_doesnt_exist:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_removable_partition_doesnt_exist:obj:1" />
</ns6:file_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for client signing = mandatory in /etc/samba/smb.conf" id="oval:ssg-test_require_smb_client_signing:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_require_smb_client_signing:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="serial ports /etc/securetty" id="oval:ssg-test_serial_ports_etc_securetty:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_serial_ports_etc_securetty:obj:1" />
</ns7:textfilecontent54_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with : or ." id="oval:ssg-test_env_var_begins:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_begins_colon_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH doesn't contain : twice in a row" id="oval:ssg-test_env_var_contains_doublecolon:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_double_colon:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH doesn't contain . twice in a row" id="oval:ssg-test_env_var_contains_doubleperiod:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_double_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH ends with : or ." id="oval:ssg-test_env_var_ends:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_ends_colon_period:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with an absolute path /" id="oval:ssg-test_env_var_begins_slash:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_begins_slash:ste:1" />
</ns7:environmentvariable58_test>
<ns7:environmentvariable58_test check="none satisfy" comment="environment variable PATH contains relative paths" id="oval:ssg-test_env_var_contains_relative_path:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_root_path_no_dot:obj:1" />
<ns7:state state_ref="oval:ssg-state_contains_relative_path:ste:1" />
</ns7:environmentvariable58_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="verify file md5 hashes" id="oval:ssg-test_files_fail_md5_hash:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_md5_hash:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="user ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_user_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_user_ownership:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="group ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_group_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_group_ownership:obj:1" />
</ns8:rpmverifyfile_test>
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="mode of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_mode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_mode:obj:1" />
</ns8:rpmverifyfile_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Ensure that the /etc/rsyslog.conf does not contain $InputTCPServerRun | $UDPServerRun | $InputRELPServerRun" id="oval:ssg-test_rsyslog_nolisten:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_rsyslog_nolisten:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_conf:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Ensures system configured to export logs to remote host" id="oval:ssg-test_remote_rsyslog_d:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_remote_loghost_rsyslog_d:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="virtual consoles /etc/securetty" id="oval:ssg-test_virtual_consoles_etc_securetty:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_virtual_consoles_etc_securetty:obj:1" />
</ns7:textfilecontent54_test>
<ns8:selinuxsecuritycontext_test check="none satisfy" check_existence="any_exist" comment="device_t in /dev" id="oval:ssg-test_selinux_all_devicefiles_labeled:tst:1" version="2">
<ns8:object object_ref="oval:ssg-object_selinux_all_devicefiles_labeled:obj:1" />
<ns8:state state_ref="oval:ssg-state_selinux_all_devicefiles_labeled:ste:1" />
</ns8:selinuxsecuritycontext_test>
<ns8:selinuxsecuritycontext_test check="none satisfy" check_existence="any_exist" comment="device_t in /dev" id="oval:ssg-test_selinux_confinement_of_daemons:tst:1" version="2">
<ns8:object object_ref="oval:ssg-object_selinux_confinement_of_daemons:obj:1" />
<ns8:state state_ref="oval:ssg-state_selinux_confinement_of_daemons:ste:1" />
</ns8:selinuxsecuritycontext_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*SELINUXTYPE[\s]*=[\s]*([^#]*) expression in the /etc/selinux/config file" id="oval:ssg-test_selinux_policy:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_selinux_policy:obj:1" />
<ns7:state state_ref="oval:ssg-state_selinux_policy:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="/selinux/enforce is 1" id="oval:ssg-test_etc_selinux_config:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_selinux_config:obj:1" />
<ns7:state state_ref="oval:ssg-state_etc_selinux_config:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg-test_etc_libuser_conf_cryptstyle:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_etc_libuser_conf_cryptstyle:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="The value of ENCRYPT_METHOD should be set appropriately in /etc/login.defs" id="oval:ssg-test_etc_login_defs_encrypt_method:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_last_encrypt_method_instance_value:obj:1" />
<ns7:state state_ref="oval:ssg-state_last_encrypt_method_instance_value:ste:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-test_pam_unix_sha512:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_pam_unix_sha512:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_default_communities:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_snmp_default_communities:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check snmpd configuration" id="oval:ssg-test_snmp_versions:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_snmp_versions:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="sshd uses protocol 2" id="oval:ssg-test_sshd_allow_only_protocol2:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_allow_only_protocol2:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitEmptyPasswords[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitemptypasswords_no:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the IgnoreRhosts[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_rsh_emulation_disabled:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_rsh_emulation_disabled:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the RhostsRSAAuthentication[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_rhosts_rsa:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitRootLogin[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_permitrootlogin_no:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_permitrootlogin_no:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the IgnoreUserKnownHosts[\s]*(<:nocomment:>*) setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_disable_user_known_hosts:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="Check value of PermitUserEnvironment in /etc/ssh/sshd_config" id="oval:ssg-test_sshd_no_user_envset:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_no_user_envset:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the Banner[\s]+/etc/issue setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_banner_set:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_banner_set:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="timeout is configured" id="oval:ssg-test_sshd_idle_timeout:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_sshd_idle_timeout:obj:1" />
<ns7:state state_ref="oval:ssg-state_timeout_value_upper_bound:ste:1" />
<ns7:state state_ref="oval:ssg-state_timeout_value_lower_bound:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ClientAliveCountMax setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_clientalivecountmax:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_clientalivecountmax:obj:1" />
<ns7:state state_ref="oval:ssg-state_sshd_clientalivecountmax:ste:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of Ciphers setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_ciphers:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_use_approved_ciphers:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of MACs setting in the /etc/ssh/sshd_config file" id="oval:ssg-test_sshd_use_approved_macs:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sshd_use_approved_macs:obj:1" />
</ns7:textfilecontent54_test>
<ns7:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*BOOTPROTO[\s]*=[\s]*([^#]*) expression in the /etc/sysconfig/network-scripts/ifcfg-.* file" id="oval:ssg-test_sysconfig_networking_bootproto_ifcfg:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_sysconfig_networking_bootproto_ifcfg:obj:1" />
<ns7:state state_ref="oval:ssg-state_sysconfig_networking_bootproto_ifcfg:ste:1" />
</ns7:textfilecontent54_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppc_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_ppc_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_ppc_64:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_ppcle_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_ppcle_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_ppcle_64:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="32 bit architecture" id="oval:ssg-test_system_info_architecture_x86:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_x86:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_x86:ste:1" />
</ns6:uname_test>
<ns6:uname_test check="all" comment="64 bit architecture" id="oval:ssg-test_system_info_architecture_x86_64:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_system_info_architecture_x86_64:obj:1" />
<ns6:state state_ref="oval:ssg-state_system_info_architecture_x86_64:ste:1" />
</ns6:uname_test>
<ns7:textfilecontent54_test check="all" comment="tftpd secure mode" id="oval:ssg-test_tftpd_uses_secure_mode:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_tftpd_uses_secure_mode:obj:1" />
</ns7:textfilecontent54_test>
<ns7:variable_test check="all" comment="Test the retrieved /etc/init.d/functions umask value(s) match the var_umask_for_daemons requirement" id="oval:ssg-tst_umask_for_daemons:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_umask_for_daemons:obj:1" />
<ns7:state state_ref="oval:ssg-ste_umask_for_daemons:ste:1" />
</ns7:variable_test>
<ns6:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/shadow" id="oval:ssg-test_userowner_shadow_file:tst:1" version="1">
<ns6:object object_ref="oval:ssg-object_file_etc_shadow:obj:1" />
<ns6:state state_ref="oval:ssg-state_etc_shadow_uid_root:ste:1" />
</ns6:file_test>
<ns7:variable_test check="all" check_existence="at_least_one_exists" comment="Verify the existence of var_accounts_user_umask_as_number variable" id="oval:ssg-test_existence_of_var_accounts_user_umask_as_number_variable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1" />
</ns7:variable_test>
<ns7:variable_test check="all" comment="Check if removable partition variable value represents CD/DVD drive" id="oval:ssg-test_var_removable_partition_is_cd_dvd_drive:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_removable_partition_is_cd_dvd_drive:obj:1" />
<ns7:state state_ref="oval:ssg-state_var_removable_partition_is_cd_dvd_drive:ste:1" />
</ns7:variable_test>
<ns7:variable_test check="all" check_existence="at_least_one_exists" comment="Verify the existence of var_umask_for_daemons_as_number variable" id="oval:ssg-test_existence_of_var_umask_for_daemons_as_number_variable:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_var_umask_for_daemons_umask_as_number:obj:1" />
</ns7:variable_test>
<ns7:textfilecontent54_test check="all" check_existence="none_exist" comment="query /proc/net/wireless" id="oval:ssg-test_wireless_disable_interfaces:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_wireless_disable_interfaces:obj:1" />
</ns7:textfilecontent54_test>
</ns3:tests>
<ns3:objects>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfg_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfg_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfg_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_groupownership:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfg_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfo_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfo_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfo_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_ownership:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfo_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="rsyslog's $IncludeConfig directive value" id="oval:ssg-object_rfp_rsyslog_include_config_value:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\$IncludeConfig[\s]+([^\s;]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="All rsyslog configuration files" id="oval:ssg-object_rfp_log_files_paths:obj:1" version="1">
<ns7:filepath operation="pattern match" var_check="at least one" var_ref="oval:ssg-var_rfp_all_log_files_as_collection:var:1" />
<ns7:pattern operation="pattern match">^[^(\s|#|\$)]+[\s]+.*[\s]+-?(/+[^:;\s]+);*.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Various system log files" id="oval:ssg-object_rsyslog_files_permissions:obj:1" version="1">
<ns6:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-var_rfp_log_files_paths:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_dcredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*dcredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_difok:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*difok=(\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_lcredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*lcredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_maxrepeat:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*maxrepeat=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_password_pam_cracklib_minclass:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]minclass=(\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_minlen:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*minlen=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_ocredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*ocredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_retry:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*retry=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_password_pam_cracklib_ucredit:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*ucredit=(-?\d+)(?:[\s]|$)</ns7:pattern>
<ns7:instance datatype="int" operation="less than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chmod_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chmod_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_chown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmod_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmod_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmodat_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchmodat_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchownat_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fchownat_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fremovexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_fsetxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lchown_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lchown_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lremovexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_lsetxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_removexattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_removexattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_setxattr_x32:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_dac_modification_setxattr_x64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid>=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_file_deletion_events:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+rmdir\s+\-S\s+unlink\s+\-S\s+unlinkat\s+\-S\s+rename\s+\-S\s+renameat\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_immutable:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-e\s+2\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_insmod:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/sbin/insmod[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_rmmod:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/sbin/rmmod[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_modprobe:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/sbin/modprobe[\s]+\-p[\s]+\b([raw]*x[raw]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rule_kernel_module_loading_syscall:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+init_module\s+\-S\s+delete_module\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_tallylog:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/tallylog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_faillock:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/run/faillock/\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_login_events_lastlog:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/lastlog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_mac_modification:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/selinux/[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_media_export:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+mount\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_syscall:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+sethostname\s+\-S\s+setdomainname\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/issue[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_issue_net:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/issue\.net[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_hosts:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/hosts[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_networkconfig_modification_etc_sysconfig_network:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/sysconfig/network[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="system files with setuid or setgid permission set" id="oval:ssg-object_system_privileged_commands:obj:1" version="1">
<ns6:behaviors recurse_file_system="local" />
<ns6:path operation="pattern match">\/(?:(?!dev|proc|sys).)+</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_setuid_or_setgid_set:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_privileged_commands:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(-a always,exit -F path=[^\n]+ -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged)[\s]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
<ns3:filter action="exclude">oval:ssg-state_proper_always_exit_rule_but_for_unprivileged_command:ste:1</ns3:filter>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_dimension_of_object_system_privileged_commands:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_dimension_of_object_system_privileged_commands:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_utmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/run/utmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_btmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/btmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_session_events_wtmp:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w\s+/var/log/wtmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_sysadmin_actions:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/sudoers[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+[-\w]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_adjtimex_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_adjtimex_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_clock_settime_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32[\s]+-S[\s]+clock_settime[\s]+-F[\s]+a0=(?:0x)?0[\s]+(?:-F[\s]+key=|-k[\s]+)time-change[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_clock_settime_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64[\s]+-S[\s]+clock_settime[\s]+-F[\s]+a0=(?:0x)?0[\s]+(?:-F[\s]+key=|-k[\s]+)time-change[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_settimeofday_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_settimeofday_x86_64:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b64.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_stime_x86:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-a[\s]+always,exit[\s]+-F[\s]+arch=b32.*-S[\s]+stime[\s]+.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_audit_rules_time_watch_localtime:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*-w[\s]+\/etc\/localtime[\s]+-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b.*-k[\s]+[\S]+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b32\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_32bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b32\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eacces:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b64\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_64bit_audit_rules_unsuccessful_file_modification_eperm:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-a\s+always,exit\s+\-F\s+arch=b64\s+?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+open_by_handle_at\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid>=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_group:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/group[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s+]\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_passwd:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/passwd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_gshadow:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/gshadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_shadow:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/shadow[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_audit_rules_usergroup_modification_etc_security_opasswd:obj:1" version="1">
<ns7:filepath>/etc/audit/audit.rules</ns7:filepath>
<ns7:pattern operation="pattern match">^\-w[\s]+/etc/security/opasswd[\s]+\-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b[\s]+\-k[\s]+\w+[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi TTL setting" id="oval:ssg-object_avahi_ttl_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*check\-response\-ttl=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi disable publishing" id="oval:ssg-object_avahi_disable_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable\-publishing=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi IPv4 setting" id="oval:ssg-object_avahi_ipv4_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*use\-ipv4=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi IPv6 setting" id="oval:ssg-object_avahi_ipv6_setting:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*use\-ipv6=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Prevent Avahi Port Sharing" id="oval:ssg-object_avahi_port_sharing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disallow\-other\-stacks=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict User Publishing" id="oval:ssg-object_avahi_restrict_user_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable\-user\-service\-publishing=yes$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Address Publishing" id="oval:ssg-object_avahi_restrict_address_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-addresses=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict HW Publishing" id="oval:ssg-object_avahi_restrict_CPU_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-hinfo=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Workstation Publishing" id="oval:ssg-object_avahi_restrict_workstation_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-workstation=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Avahi Restrict Domain Publishing" id="oval:ssg-object_avahi_restrict_domain_publishing:obj:1" version="1">
<ns7:filepath>/etc/avahi/avahi-daemon.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*publish\-domain=no$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_audit_argument:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_nousb_argument:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_bootloader_password:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+--encrypted[\s]+.*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_domain-named:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+domain\-name[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_domain-name-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+domain\-name\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_nis-domain:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+nis\-domain[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_nis-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+nis\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_ntp-servers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+ntp\-servers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_routers:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+routers[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_time-offset:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+time\-offset[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_subnet-mask:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+subnet\-mask[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_client_broadcast-address:obj:1" version="1">
<ns7:filepath operation="pattern match">/etc/dhcp/dhclient.*\.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(request|require|supersede)[\s]+broadcast\-address[\s]*.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_configure_logging:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*daemon\.\*[\s]+\/var\/log\/daemon\.log$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_disable_bootp:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*deny[\s]+bootp\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_deny_declines:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*deny[\s]+declines\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_server_disable_ddns:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ddns\-update\-style[\s]+none\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_domain-named_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+domain\-name[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_domain-name-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+domain\-name\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_nis-domain_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+nis\-domain[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_nis-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+nis\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_ntp-servers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+ntp\-servers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_routers_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+routers[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dhcp_time-offset_info:obj:1" version="1">
<ns7:filepath>/etc/dhcp/dhcpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*option[\s]+time\-offset[\s]+.*\;[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="all local directories" id="oval:ssg-all_local_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_gid_is_user_and_world_writable:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object comment="Disable Ctrl-Alt-Del key sequence" id="oval:ssg-object_test_disable_ctrlaltdel:obj:1" version="1">
<ns7:filepath>/etc/init/control-alt-delete.override</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*exec[\s]*/sbin/shutdown[\s]*\-r[\s]*now.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-object_test_disable_ctrlaltdel_exists:obj:1" version="1">
<ns6:filepath>/etc/init/control-alt-delete.override</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_interactive_boot_disabled_in_sysconfig_init:obj:1" version="2">
<ns7:filepath>/etc/sysconfig/init</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*PROMPT=no[\s]+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_confirm_kernel_boot_argument_not_present:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*kernel[\s]+.*confirm.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_display_login_attempts:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+showfailed</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dovecot_disable_plaintext_auth:obj:1" version="1">
<ns7:filepath>/etc/dovecot/conf.d/10-auth.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*disable_plaintext_auth[\s]*=[\s]*yes[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_dovecot_enable_ssl:obj:1" version="1">
<ns7:filepath>/etc/dovecot/conf.d/10-ssl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ssl[\s]*=[\s]*(yes|required)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="check value selinux|enforcing=0 in /etc/grub.conf, fail if found" id="oval:ssg-object_selinux_grub:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*kernel[\s]+.*(selinux|enforcing)=0.*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_group_owner_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/efi/EFI/redhat/grub.conf" id="oval:ssg-object_file_group_owner_efi_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/efi/EFI/redhat/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_permissions_grub_conf:obj:1" version="2">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="files with sgid set" id="oval:ssg-object_file_permissions_unauthorized_sgid:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_sgid:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_sgid_whitelist:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="files with suid set" id="oval:ssg-object_file_permissions_unauthorized_suid:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_suid:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_suid_whitelist:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/boot/grub/grub.conf" id="oval:ssg-object_file_user_owner_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/grub/grub.conf</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/boot/efi/EFI/redhat/grub.conf" id="oval:ssg-object_file_user_owner_efi_grub_conf:obj:1" version="1">
<ns6:filepath>/boot/efi/EFI/redhat/grub.conf</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object comment="Configure FTP firewall" id="oval:ssg-object_configure_firewall:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables-config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*IPTABLES_MODULES=\".*ip_conntrack_ftp.*\"$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Disable uploads" id="oval:ssg-object_ftp_disable_uploads:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*write_enable=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Enable ftp user list" id="oval:ssg-object_ftp_user_list_enable:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_enable=YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Set ftp user list file" id="oval:ssg-object_ftp_user_list_file:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_file=\/etc\/vsftp\.ftpusers$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Use ftp user list" id="oval:ssg-object_ftp_user_list_deny:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*userlist_deny=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Disable anonymous access" id="oval:ssg-object_ftp_restrict_to_anon:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*local_enable=NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_disable_user_list_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_user_list']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_disable_user_list_no_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_user_list']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable:obj:1" version="1">
<ns7:filepath>/var/lib/gdm/.gconf/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_banner_message_enable_no_tree:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_enable']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/var/lib/gdm/.gconf/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_no_tree_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_tree_gconf_gdm_set_login_banner_text:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='banner_message_text']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_automount:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='media_automount']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_automount:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='media_automount']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_automount_autorun:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='media_autorun_never']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_automount_autorun:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='media_autorun_never']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_clock_temperature:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/panel/applets/clock/prefs/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='show_temperature']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_clock_temperature:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/dir/dir/entry[@name='show_temperature']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_clock_weather:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/panel/applets/clock/prefs/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='show_weather']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_clock_weather:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/dir/dir/entry[@name='show_weather']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_disable_ctrlaltdel_reboot:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome_settings_daemon/keybindings/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='power']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_disable_ctrlaltdel_reboot:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='power']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_restart_shutdown:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_restart_buttons']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_restart_shutdown:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_restart_buttons']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_gnome_disable_thumbnailers:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/thumbnailers/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable_all']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-obj_gconf_tree_gnome_disable_thumbnailers:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='disable_all']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_create:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-wifi-create']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_create:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-wifi-create']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_disconnect:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-disconnected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_disconnect:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-disconnected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_disable_wifi_notification:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/nm-applet/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='disable-connected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_disable_wifi_notification:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='disable-connected-notifications']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_idle_activated:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='idle_activation_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_idle_activated:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='idle_activation_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_idle_delay:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='idle_delay']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_idle_delay:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='idle_delay']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_screensaver_lock_enabled:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='lock_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_screensaver_lock_enabled:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='lock_enabled']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_max_idle_action:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='max_idle_action']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_action:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='max_idle_action']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_max_idle_time:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/desktop/gnome/session/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='max_idle_time']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_max_idle_time:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/dir/entry[@name='max_idle_time']/@value</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gnome_screensaver_mode:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/apps/gnome-screensaver/%gconf.xml</ns7:filepath>
<ns7:xpath>/gconf/entry[@name='mode']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:xmlfilecontent_object id="oval:ssg-object_gconf_tree_gnome_screensaver_mode:obj:1" version="1">
<ns7:filepath>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</ns7:filepath>
<ns7:xpath>/gconf/dir/dir/entry[@name='mode']/stringvalue[1]/text()</ns7:xpath>
</ns7:xmlfilecontent_object>
<ns7:textfilecontent54_object id="oval:ssg-object_grub_enable_fips_mode:obj:1" version="1">
<ns7:filepath>/etc/grub.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*kernel\s/vmlinuz(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for port 22 access over ipv4" id="oval:ssg-obj_iptables_sshd_disabled_ipv4:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for port 22 access over ipv6" id="oval:ssg-obj_iptables_sshd_disabled_ipv6:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="Block device names on the system" id="oval:ssg-object_system_block_devices:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/sys/block/</ns6:path>
<ns6:filename operation="pattern match">[^\/]+</ns6:filename>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_system_ssd_drives:obj:1" version="1">
<ns7:filepath var_check="at least one" var_ref="oval:ssg-variable_system_block_devices_rotational_paths:var:1" />
<ns7:pattern operation="pattern match">^0$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_kernel_disable_entropy_contribution_for_solid_state_drives:obj:1" version="1">
<ns7:filepath datatype="string" var_check="at least one" var_ref="oval:ssg-variable_system_solid_state_drives_paths:var:1" />
<ns7:pattern operation="pattern match">^1$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module bluetooth disabled" id="oval:ssg-obj_kernmod_bluetooth_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of bluetooth" id="oval:ssg-obj_kernmod_bluetooth_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+bluetooth\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module cramfs disabled" id="oval:ssg-obj_kernmod_cramfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of cramfs" id="oval:ssg-obj_kernmod_cramfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+cramfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module dccp disabled" id="oval:ssg-obj_kernmod_dccp_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of dccp" id="oval:ssg-obj_kernmod_dccp_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+dccp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module freevxfs disabled" id="oval:ssg-obj_kernmod_freevxfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of freevxfs" id="oval:ssg-obj_kernmod_freevxfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+freevxfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module hfs disabled" id="oval:ssg-obj_kernmod_hfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of hfs" id="oval:ssg-obj_kernmod_hfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+hfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module hfsplus disabled" id="oval:ssg-obj_kernmod_hfsplus_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of hfsplus" id="oval:ssg-obj_kernmod_hfsplus_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+hfsplus\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="ipv6 disabled any modprobe conf file" id="oval:ssg-object_kernel_module_ipv6_option_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*options\s+ipv6\s+.*disable=1.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module jffs2 disabled" id="oval:ssg-obj_kernmod_jffs2_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of jffs2" id="oval:ssg-obj_kernmod_jffs2_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+jffs2\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module rds disabled" id="oval:ssg-obj_kernmod_rds_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+rds\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of rds" id="oval:ssg-obj_kernmod_rds_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+rds\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module sctp disabled" id="oval:ssg-obj_kernmod_sctp_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check deprecated /etc/modprobe.conf for disablement of sctp" id="oval:ssg-obj_kernmod_sctp_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+sctp\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module squashfs disabled" id="oval:ssg-obj_kernmod_squashfs_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of squashfs" id="oval:ssg-obj_kernmod_squashfs_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+squashfs\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module tipc disabled" id="oval:ssg-obj_kernmod_tipc_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+tipc\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of tipc" id="oval:ssg-obj_kernmod_tipc_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+tipc\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module udf disabled" id="oval:ssg-obj_kernmod_udf_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of udf" id="oval:ssg-obj_kernmod_udf_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+udf\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="kernel module usb-storage disabled" id="oval:ssg-obj_kernmod_usb-storage_disabled:obj:1" version="1">
<ns7:path>/etc/modprobe.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Check depricated /etc/modprobe.conf for disablement of usb-storage" id="oval:ssg-obj_kernmod_usb-storage_modprobeconf:obj:1" version="1">
<ns7:filepath>/etc/modprobe.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*install\s+usb-storage\s+(/bin/false|/bin/true)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_start_tls_ssl:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*ssl[\s]+start_tls[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_tls_cacertdir:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*tls_cacertdir[\s]+/etc/pki/tls/CA$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ldap_client_tls_cacertfile:obj:1" version="1">
<ns7:filepath>/etc/pam_ldap.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*tls_cacertfile[\s]+/etc/pki/tls/CA/.*\.(pem|crt)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Define default gateways" id="oval:ssg-obj_network_ipv6_default_gateway:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6_DEFAULTGW=.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Enable privacy extensions on each interface" id="oval:ssg-obj_network_ipv6_privacy_extensions:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6_PRIVACY=rfc3041$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Set static IPv6 address on each interface" id="oval:ssg-obj_network_ipv6_static_address:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^IPV6ADDR=.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Ensure more than one ntpd NTP server is set" id="oval:ssg-obj_ntpd_multiple_servers:obj:1" version="1">
<ns7:filepath>/etc/ntp.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^([\s]*server[\s]+.+$){2,}$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Ensure at least one ntpd NTP server is set" id="oval:ssg-obj_ntp_remote_server:obj:1" version="1">
<ns7:filepath>/etc/ntp.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*server[\s]+.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_GConf2_installed:obj:1" version="1">
<ns8:name>GConf2</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_abrt_removed:obj:1" version="1">
<ns8:name>abrt</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_at_removed:obj:1" version="1">
<ns8:name>at</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_autofs_removed:obj:1" version="1">
<ns8:name>autofs</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_avahi_installed:obj:1" version="1">
<ns8:name>avahi</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_bluez_removed:obj:1" version="1">
<ns8:name>bluez</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cpuspeed_removed:obj:1" version="1">
<ns8:name>cpuspeed</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cronie_installed:obj:1" version="1">
<ns8:name>cronie</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cups_removed:obj:1" version="1">
<ns8:name>cups</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_cyrus-sasl_removed:obj:1" version="1">
<ns8:name>cyrus-sasl</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dbus_removed:obj:1" version="1">
<ns8:name>dbus</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_esc_installed:obj:1" version="1">
<ns8:name>esc</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_gdm_installed:obj:1" version="1">
<ns8:name>gdm</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_hal_removed:obj:1" version="1">
<ns8:name>hal</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iptables-ipv6_installed:obj:1" version="1">
<ns8:name>iptables-ipv6</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iptables_installed:obj:1" version="1">
<ns8:name>iptables</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_iputils_removed:obj:1" version="1">
<ns8:name>iputils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_irqbalance_installed:obj:1" version="1">
<ns8:name>irqbalance</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_kexec-tools_removed:obj:1" version="1">
<ns8:name>kexec-tools</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_libcgroup_removed:obj:1" version="1">
<ns8:name>libcgroup</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_mdadm_removed:obj:1" version="1">
<ns8:name>mdadm</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_nfs-utils_removed:obj:1" version="1">
<ns8:name>nfs-utils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ntpdate_removed:obj:1" version="1">
<ns8:name>ntpdate</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_oddjob_removed:obj:1" version="1">
<ns8:name>oddjob</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openswan_installed:obj:1" version="1">
<ns8:name operation="pattern match">^(open|libre)swan$</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pam_ldap_removed:obj:1" version="1">
<ns8:name>pam_ldap</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pam_pkcs11_installed:obj:1" version="1">
<ns8:name>pam_pkcs11</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_pcsc-lite_installed:obj:1" version="1">
<ns8:name>pcsc-lite</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_policycoreutils_installed:obj:1" version="1">
<ns8:name>policycoreutils</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_portreserve_removed:obj:1" version="1">
<ns8:name>portreserve</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_postfix_installed:obj:1" version="1">
<ns8:name>postfix</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_psacct_installed:obj:1" version="1">
<ns8:name>psacct</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_qpid-cpp-server_removed:obj:1" version="1">
<ns8:name>qpid-cpp-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_quota_removed:obj:1" version="1">
<ns8:name>quota</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rhnsd_removed:obj:1" version="1">
<ns8:name>rhnsd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rpcbind_removed:obj:1" version="1">
<ns8:name>rpcbind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba_removed:obj:1" version="1">
<ns8:name>samba</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_smartmontools_removed:obj:1" version="1">
<ns8:name>smartmontools</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_subscription-manager_removed:obj:1" version="1">
<ns8:name>subscription-manager</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_sysstat_removed:obj:1" version="1">
<ns8:name>sysstat</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_xorg-x11-server-common_removed:obj:1" version="1">
<ns8:name>xorg-x11-server-common</ns8:name>
</ns8:rpminfo_object>
<ns7:textfilecontent54_object comment="inet_interfaces in /etc/postfix/main.cf should be set correctly" id="oval:ssg-obj_postfix_network_listening_disabled:obj:1" version="1">
<ns7:filepath>/etc/postfix/main.cf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*inet_interfaces[\s]*=[\s]*localhost[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_require_singleuser_auth:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/init</ns7:filepath>
<ns7:pattern operation="pattern match">^SINGLE=/sbin/sulogin[\s]*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_abrtd:obj:1" version="1">
<ns6:service_name>abrtd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_acpid:obj:1" version="1">
<ns6:service_name>acpid</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_atd:obj:1" version="1">
<ns6:service_name>atd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_auditd:obj:1" version="1">
<ns6:service_name>auditd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_autofs:obj:1" version="1">
<ns6:service_name>autofs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_avahi-daemon:obj:1" version="1">
<ns6:service_name>avahi-daemon</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_bluetooth:obj:1" version="1">
<ns6:service_name>bluetooth</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_certmonger:obj:1" version="1">
<ns6:service_name>certmonger</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cgconfig:obj:1" version="1">
<ns6:service_name>cgconfig</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cgred:obj:1" version="1">
<ns6:service_name>cgred</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cpuspeed:obj:1" version="1">
<ns6:service_name>cpuspeed</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_crond:obj:1" version="1">
<ns6:service_name>crond</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_cups:obj:1" version="1">
<ns6:service_name>cups</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_dhcpd:obj:1" version="1">
<ns6:service_name>dhcpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_dovecot:obj:1" version="1">
<ns6:service_name>dovecot</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_haldaemon:obj:1" version="1">
<ns6:service_name>haldaemon</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_httpd:obj:1" version="1">
<ns6:service_name>httpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ip6tables:obj:1" version="1">
<ns6:service_name>ip6tables</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_iptables:obj:1" version="1">
<ns6:service_name>iptables</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_irqbalance:obj:1" version="1">
<ns6:service_name>irqbalance</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_kdump:obj:1" version="1">
<ns6:service_name>kdump</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_mdmonitor:obj:1" version="1">
<ns6:service_name>mdmonitor</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_messagebus:obj:1" version="1">
<ns6:service_name>messagebus</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_named:obj:1" version="1">
<ns6:service_name>named</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_netconsole:obj:1" version="1">
<ns6:service_name>netconsole</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_netfs:obj:1" version="1">
<ns6:service_name>netfs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_nfs:obj:1" version="1">
<ns6:service_name>nfs</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_nfslock:obj:1" version="1">
<ns6:service_name>nfslock</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ntpd:obj:1" version="1">
<ns6:service_name>ntpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ntpdate:obj:1" version="1">
<ns6:service_name>ntpdate</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_oddjobd:obj:1" version="1">
<ns6:service_name>oddjobd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_pcscd:obj:1" version="1">
<ns6:service_name>pcscd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_portreserve:obj:1" version="1">
<ns6:service_name>portreserve</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_postfix:obj:1" version="1">
<ns6:service_name>postfix</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_psacct:obj:1" version="1">
<ns6:service_name>psacct</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_qpidd:obj:1" version="1">
<ns6:service_name>qpidd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_quota_nld:obj:1" version="1">
<ns6:service_name>quota_nld</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rdisc:obj:1" version="1">
<ns6:service_name>rdisc</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_restorecond:obj:1" version="1">
<ns6:service_name>restorecond</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rexec_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rexec</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rhnsd:obj:1" version="1">
<ns6:service_name>rhnsd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rhsmcertd:obj:1" version="1">
<ns6:service_name>rhsmcertd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rlogin_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rlogin</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcbind:obj:1" version="1">
<ns6:service_name>rpcbind</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcgssd:obj:1" version="1">
<ns6:service_name>rpcgssd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcidmapd:obj:1" version="1">
<ns6:service_name>rpcidmapd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rpcsvcgssd:obj:1" version="1">
<ns6:service_name>rpcsvcgssd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_xinetd_rsh_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/rsh</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_rsyslog:obj:1" version="1">
<ns6:service_name>rsyslog</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_saslauthd:obj:1" version="1">
<ns6:service_name>saslauthd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_smartd:obj:1" version="1">
<ns6:service_name>smartd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_smb:obj:1" version="1">
<ns6:service_name>smb</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_snmpd:obj:1" version="1">
<ns6:service_name>snmpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_squid:obj:1" version="1">
<ns6:service_name>squid</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_sshd:obj:1" version="1">
<ns6:service_name>sshd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_sysstat:obj:1" version="1">
<ns6:service_name>sysstat</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object comment="Disable Telnet Service" id="oval:ssg-obj_service_telnetd_disabled:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/telnet</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*disable\s+=\s+no\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_tftp:obj:1" version="1">
<ns6:service_name>tftp</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_vsftpd:obj:1" version="1">
<ns6:service_name>vsftpd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_xinetd:obj:1" version="1">
<ns6:service_name>xinetd</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel0_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">0</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel1_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">1</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel2_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">2</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel3_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">3</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel4_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">4</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel5_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">5</ns6:runlevel>
</ns6:runlevel_object>
<ns6:runlevel_object id="oval:ssg-obj_runlevel6_ypbind:obj:1" version="1">
<ns6:service_name>ypbind</ns6:service_name>
<ns6:runlevel operation="equals">6</ns6:runlevel>
</ns6:runlevel_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ip6tables_input_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ip6tables_input_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/ip6tables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_input_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_input_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:INPUT\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_forward_drop:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:FORWARD\sDROP\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_iptables_forward_accept:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/iptables</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*:FORWARD\sACCEPT\s\[0:0\]</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_pam_pkcs11_cert_policy_ocsp_on:obj:1" version="1">
<ns7:filepath>/etc/pam_pkcs11/pam_pkcs11.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*cert_policy=(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_enabled_system_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_enabled_system_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_required_system_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_required_system_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_smart_card_required_smartcard_auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/smartcard-auth</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_smart_card_required_smartcard_auth:var:1" />
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_fs_suid_dumpable:obj:1" version="1">
<ns6:name>fs.suid_dumpable</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_dmesg_restrict:obj:1" version="1">
<ns6:name>kernel.dmesg_restrict</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_exec_shield:obj:1" version="1">
<ns6:name>kernel.exec-shield</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_kernel_randomize_va_space:obj:1" version="1">
<ns6:name>kernel.randomize_va_space</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.log_martians</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.rp_filter</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.secure_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.all.send_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.rp_filter</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.secure_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns6:name>net.ipv4.conf.default.send_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns6:name>net.ipv4.icmp_echo_ignore_broadcasts</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns6:name>net.ipv4.icmp_ignore_bogus_error_responses</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_ip_forward:obj:1" version="1">
<ns6:name>net.ipv4.ip_forward</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns6:name>net.ipv4.tcp_syncookies</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_ra</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns6:name>net.ipv6.conf.all.forwarding</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_ra</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_redirects</ns6:name>
</ns6:sysctl_object>
<ns6:sysctl_object id="oval:ssg-object_runtime_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns6:name>net.ipv6.conf.default.accept_source_route</ns6:name>
</ns6:sysctl_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_fs_suid_dumpable:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*fs.suid_dumpable[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_fs_suid_dumpable:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*fs.suid_dumpable[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_dmesg_restrict:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.dmesg_restrict[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_dmesg_restrict:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.dmesg_restrict[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_exec_shield:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.exec-shield[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_exec_shield:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.exec-shield[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_kernel_randomize_va_space:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.randomize_va_space[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_kernel_randomize_va_space:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*kernel.randomize_va_space[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_log_martians:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.log_martians[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_all_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.all.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_rp_filter:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.rp_filter[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_secure_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.secure_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_conf_default_send_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.conf.default.send_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_echo_ignore_broadcasts:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_echo_ignore_broadcasts[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_icmp_ignore_bogus_error_responses:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.icmp_ignore_bogus_error_responses[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_ip_forward:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.ip_forward[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_ip_forward:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.ip_forward[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv4_tcp_syncookies:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv4.tcp_syncookies[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_all_forwarding:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.all.forwarding[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_ra:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_ra[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_redirects:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_redirects[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_sysctld_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:path>/etc/sysctl.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_static_etc_sysctl_net_ipv6_conf_default_accept_source_route:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/sysctl.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:^|.*\n)[^#]*net.ipv6.conf.default.accept_source_route[\s]*=[\s]*(\d+)[\s]*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_inittab_default_runlevel:obj:1" version="1">
<ns7:filepath>/etc/inittab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*id:3:initdefault:[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_default_useradd_inactive:obj:1" version="1">
<ns7:filepath>/etc/default/useradd</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*INACTIVE\s*=\s*(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_passwd_content:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^([^:]+):.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_count_of_all_usernames_from_etc_passwd:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limits_conf_maxlogins:obj:1" version="1">
<ns7:filepath>/etc/security/limits.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins:obj:1" version="1">
<ns7:path>/etc/security/limits.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins[\s]+(\d+)\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_security_limitsd_conf_maxlogins_exists:obj:1" version="1">
<ns7:path>/etc/security/limits.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.conf$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:(?:hard)|(?:-))[\s]+maxlogins</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MAX_DAYS\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_max_days_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_max_days_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_DAYS\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_min_days_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_min_days_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_no_uid_except_root:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!root:)[^:]*:[^:]*:0</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:password_object id="oval:ssg-object_accounts_password_all_shadowed:obj:1" version="1">
<ns6:username operation="pattern match">.*</ns6:username>
</ns6:password_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_MIN_LEN\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_min_len_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_min_len_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_unix_remember:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:sufficient)|(?:required))\s+pam_unix\.so.*remember=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_password_pam_pwhistory_remember:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*password\s+(?:(?:requisite)|(?:required))\s+pam_pwhistory\.so.*remember=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(PASS_WARN_AGE\s+\d+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_pass_warn_age_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_pass_warn_age_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]+(?s).*[\n][\s]*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[\s]+[^\n]*deny=([0-9]+)[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_system-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_silent_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+required[\s]+pam_faillock\.so[\s]+preauth[\s]+silent[\s]+[^\n]*deny=([0-9]+)[\s]*(?s).*[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_deny_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*auth[\s]+(?:(?:sufficient)|(?:\[.*default=die.*\]))[\s]+pam_unix\.so[^\n]+(?s).*[\n][\s]*auth[\s]+\[default=die\][\s]+pam_faillock\.so[\s]+authfail[\s]+[^\n]*deny=([0-9]+)[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_account_phase_password-auth:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">[\n][\s]*account[\s]+required[\s]+pam_faillock\.so[^\n]*[\n][\s]*account[\s]+required[\s]+pam_unix\.so[^\n]*[\n]</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_fail_interval_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_fail_interval_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_fail_interval_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*fail_interval=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_authfail_unlock_time_system-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_unlock_time_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so\s+authfail.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_accounts_passwords_pam_faillock_preauth_unlock_time_password-auth:obj:1" version="2">
<ns7:filepath>/etc/pam.d/password-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so\s+preauth.*unlock_time=([0-9]*).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:environmentvariable58_object id="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1" version="1">
<ns7:pid datatype="int" xsi:nil="true" />
<ns7:name>PATH</ns7:name>
</ns7:environmentvariable58_object>
<ns6:file_object comment="root's path directories with wrong group / other write permissions" id="oval:ssg-object_accounts_root_path_dirs_no_group_other_write:obj:1" version="1">
<ns6:path var_check="at least one" var_ref="oval:ssg-var_accounts_root_path_dirs_no_write:var:1" />
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_accounts_root_path_dirs_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_profile_tmout:obj:1" version="1">
<ns7:filepath>/etc/profile</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*TMOUT[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_profiled_tmout:obj:1" version="1">
<ns7:path>/etc/profile.d</ns7:path>
<ns7:filename operation="pattern match">^.*\.sh$</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*TMOUT[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/bashrc" id="oval:ssg-obj_umask_from_etc_bashrc:obj:1" version="1">
<ns7:filepath>/etc/bashrc</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_bashrc:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_bashrc_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/csh.cshrc" id="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" version="1">
<ns7:filepath>/etc/csh.cshrc</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_csh_cshrc:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_csh_cshrc_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/login.defs" id="oval:ssg-obj_umask_from_etc_login_defs:obj:1" version="1">
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_login_defs:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_login_defs_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/profile" id="oval:ssg-obj_umask_from_etc_profile:obj:1" version="1">
<ns7:filepath>/etc/profile</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_accounts_umask_etc_profile:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_profile_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_build_database_dirpath:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^@@define[\s]DBDIR[\s]+(/.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_build_new_database_filename:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^database_out=file:@@{DBDIR}/([a-z.]+)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_operational_database_filename:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^database=file:@@{DBDIR}/([a-z.]+)$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object id="oval:ssg-object_aide_build_new_database_absolute_path:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-variable_aide_build_new_database_absolute_path:var:1" />
</ns6:file_object>
<ns6:file_object id="oval:ssg-object_aide_operational_database_absolute_path:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-variable_aide_operational_database_absolute_path:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_test_aide_periodic_cron_checking:obj:1" version="1">
<ns7:filepath>/etc/crontab</ns7:filepath>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_test_aide_crond_checking:obj:1" version="1">
<ns7:path>/etc/cron.d</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*root[\s]*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron" id="oval:ssg-object_aide_var_cron_checking:obj:1" version="1">
<ns7:filepath>/var/spool/cron/root</ns7:filepath>
<ns7:pattern operation="pattern match">^[0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*\*[\s]*(root|)/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="run aide daily with cron.(daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_checking:obj:1" version="1">
<ns7:path operation="pattern match">/etc/cron.(daily|weekly|monthly)</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^\s*/usr/sbin/aide[\s]*\-\-check.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_test_aide_scan_notification:obj:1" version="1">
<ns7:filepath>/etc/crontab</ns7:filepath>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes" id="oval:ssg-object_aide_var_cron_notification:obj:1" version="1">
<ns7:filepath>/var/spool/cron/root</ns7:filepath>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="notify personnel when aide completes in cron.(d|daily|weekly|monthly)" id="oval:ssg-object_aide_crontabs_notification:obj:1" version="1">
<ns7:path operation="pattern match">/etc/cron.(d|daily|weekly|monthly)</ns7:path>
<ns7:filename operation="pattern match">^.*$</ns7:filename>
<ns7:pattern operation="pattern match">^.*/usr/sbin/aide[\s]*\-\-check.*\|.*/bin/mail[\s]*-s[\s]*".*"[\s]*root@.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_non_fips_hashes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[A-Z]*[\s]*=[\s]*.*(sha1|rmd160|sha256|whirlpool|tiger|haval|gost|crc32).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_use_fips_hashes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_verify_acls:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!ALLXTRAHASHES)[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_aide_verify_ext_attributes:obj:1" version="1">
<ns7:filepath>/etc/aide.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!ALLXTRAHASHES)[A-Z]*[\s]*=[\s]*([a-z0-9\+]*)$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_audispd_syslog_plugin_activated:obj:1" version="1">
<ns7:filepath>/etc/audisp/plugins.d/syslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*active[ ]+=[ ]+yes[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log_group = root" id="oval:ssg-object_auditd_conf_log_group_root:obj:1" version="1">
<ns7:filepath operation="equals">/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*log_group[ ]+=[ ]+root[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_action_mail_acct:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*action_mail_acct[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_admin_space_left_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*admin_space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_flush:obj:1" version="1">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*flush[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*max_log_file[ ]+=[ ]+(\d+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_max_log_file_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*max_log_file_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_num_logs:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*num_logs[ ]+=[ ]+(\d+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_auditd_data_retention_space_left_action:obj:1" version="2">
<ns7:filepath>/etc/audit/auditd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[ ]*space_left_action[ ]+=[ ]+(\S+)[ ]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_banner_etc_issue:obj:1" version="1">
<ns7:filepath>/etc/issue</ns7:filepath>
<ns7:pattern operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_browsing_browsing_off:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Browsing[\s]+(?:Off|No)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_browsing_browseallow:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*BrowseAllow[\s]+(?:none)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_printserver_disable_port:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Port[\s]+(\d)+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_cups_disable_printserver_use_listen:obj:1" version="2">
<ns7:filepath>/etc/cups/cupsd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*Listen[\s]+(?:localhost|127\.0\.0\.1|::1):(\d)+</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/etc/httpd/conf/" id="oval:ssg-object_dir_perms_etc_httpd_conf:obj:1" version="1">
<ns6:path>/etc/httpd/conf</ns6:path>
<ns6:filename xsi:nil="true" />
</ns6:file_object>
<ns6:file_object comment="/var/log/httpd/" id="oval:ssg-object_dir_perms_var_log_httpd:obj:1" version="1">
<ns6:path>/var/log/httpd</ns6:path>
<ns6:filename xsi:nil="true" />
</ns6:file_object>
<ns6:file_object comment="only local directories" id="oval:ssg-object_only_local_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_world_writable_and_not_sticky:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_hostbasedauthentication:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)HostbasedAuthentication(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_prelinking_disabled:obj:1" version="2">
<ns7:filepath>/etc/sysconfig/prelink</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*PRELINKING=no[\s]*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_core_dumps_limitsconf:obj:1" version="1">
<ns7:filepath>/etc/security/limits.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\*[\s]+(?:hard|-)[\s]+core[\s]+([\d]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="gpgcheck set in /etc/yum.conf" id="oval:ssg-object_yum_ensure_gpgcheck_globally_activated:obj:1" version="1">
<ns7:filepath>/etc/yum.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*1\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="gpgcheck set in /etc/dnf/dnf.conf" id="oval:ssg-object_dnf_ensure_gpgcheck_globally_activated:obj:1" version="1">
<ns7:filepath>/etc/dnf/dnf.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*1\s*$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_ensure_gpgcheck_never_disabled:obj:1" version="1">
<ns7:path>/etc/yum.repos.d</ns7:path>
<ns7:filename operation="pattern match">.*</ns7:filename>
<ns7:pattern operation="pattern match">^\s*gpgcheck\s*=\s*0\s*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logrotate_conf_daily_setting:obj:1" version="2">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/logrotate.conf</ns7:filepath>
<ns7:pattern operation="pattern match">(?:daily)*.*(?=[\n][\s]*daily)(.*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
<ns3:filter action="exclude">oval:ssg-state_another_rotate_interval_after_daily:ste:1</ns3:filter>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_cron_daily_logrotate_existence:obj:1" version="1">
<ns7:filepath>/etc/cron.daily/logrotate</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*/usr/sbin/logrotate[\s]*/etc/logrotate.conf(?:.*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:rpminfo_object id="oval:ssg-object_package_gpg-pubkey:obj:1" version="1">
<ns8:name>gpg-pubkey</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_groupowner_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_file_groupowner_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_file_groupowner_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_owner_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_file_owner_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_file_owner_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="binary directories" id="oval:ssg-object_file_ownership_binary_directories:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_binaries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="binary files" id="oval:ssg-object_file_ownership_binary_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_binaries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library directories" id="oval:ssg-object_file_ownership_lib_dir:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_libraries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library files" id="oval:ssg-object_file_ownership_lib_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)\/|^\/usr\/lib(|64)\/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_libraries_not_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_not_root_root_var_log_audit:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit directories" id="oval:ssg-object_ownership_var_log_audit_directories-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_ownership_var_log_audit_files-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="binary files" id="oval:ssg-object_file_permissions_binary_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/(|s)bin|^\/usr\/(|local\/)(|s)bin|^\/usr\/libexec</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_perms_binary_files_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_perms_binary_files_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/etc/group" id="oval:ssg-object_file_permissions_etc_group:obj:1" version="1">
<ns6:filepath>/etc/group</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/gshadow" id="oval:ssg-object_etc_gshadow:obj:1" version="1">
<ns6:filepath>/etc/gshadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/passwd" id="oval:ssg-object_etc_passwd:obj:1" version="1">
<ns6:filepath>/etc/passwd</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_etc_shadow:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns6:file_object comment="home directories" id="oval:ssg-object_file_permissions_home_dirs:obj:1" version="2">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="exclude">oval:ssg-state_home_dirs_home_itself:ste:1</ns3:filter>
<ns3:filter action="include">oval:ssg-state_home_dirs_wrong_perm:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/etc/httpd/conf/* permissions" id="oval:ssg-object_file_permissions_httpd_server_conf_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/etc/httpd/conf</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="library directories" id="oval:ssg-object_file_permissions_lib_dir:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</ns6:path>
<ns6:filename xsi:nil="true" />
<ns3:filter action="include">oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-perms_state_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="library files" id="oval:ssg-object_file_permissions_lib_files:obj:1" version="1">
<ns6:path operation="pattern match">^\/lib(|64)|^\/usr\/lib(|64)</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-perms_state_symlink:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="world writable" id="oval:ssg-object_file_permissions_unauthorized_world_write:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_file_permissions_unauthorized_world_write:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_special_selinux_files:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_proc:ste:1</ns3:filter>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_unauthorized_world_write_exclude_sys:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="all local files" id="oval:ssg-object_file_permissions_ungroupowned:obj:1" version="1">
<ns6:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path>/</ns6:path>
<ns6:filename operation="pattern match">.*</ns6:filename>
<ns3:filter action="exclude">oval:ssg-state_file_permissions_ungroupowned:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-etc_group_object:obj:1" version="1">
<ns7:filepath>/etc/group</ns7:filepath>
<ns7:pattern operation="pattern match">^[^:]+:[^:]*:([\d]+):[^:]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_var_log_audit_files-non_root:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_not_mode_0640:ste:1</ns3:filter>
</ns6:file_object>
<ns6:file_object comment="/var/log/audit files" id="oval:ssg-object_var_log_audit_files:obj:1" version="1">
<ns6:behaviors max_depth="-1" recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path operation="equals">/var/log/audit</ns6:path>
<ns6:filename operation="pattern match">^.*$</ns6:filename>
<ns3:filter action="include">oval:ssg-state_not_mode_0600:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_enable:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*xferlog_enable[\s]*=[\s]*YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_format:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*xferlog_std_format[\s]*=[\s]*NO$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="log ftp transactions" id="oval:ssg-object_test_ftp_log_transactions_protocol:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*log_ftp_protocol[\s]*=[\s]*YES$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Banner for FTP Users" id="oval:ssg-object_test_ftp_present_banner:obj:1" version="1">
<ns7:filepath>/etc/vsftpd/vsftpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*banner_file[\s]*=[\s]*/etc/issue*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_gid_passwd_group_same_var:obj:1" version="1">
<ns7:filepath>/etc/group</ns7:filepath>
<ns7:pattern operation="pattern match">^.*:x:([0-9]+):</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_gid_passwd_group_same:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^.*:[0-9]+:([0-9]+):</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_disable_automatic_login:obj:1" version="1">
<ns7:filepath>/etc/gdm/custom.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\[daemon]([^\n]*\n+)+?AutomaticLoginEnable=[Ff]alse$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_disable_guest_login:obj:1" version="1">
<ns7:filepath>/etc/gdm/custom.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\[daemon]([^\n]*\n+)+?TimedLoginEnable=[Ff]alse$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_groupowner_shadow_file:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_linuxshield_install_antivirus:obj:1" version="1">
<ns8:name>McAfeeVSEForLinux</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_runtime_installed:obj:1" version="1">
<ns8:name>MFErt</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_management_agent:obj:1" version="1">
<ns8:name>MFEcma</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object id="oval:ssg-object_mcafee_accm_exists:obj:1" version="1">
<ns6:path>/opt/McAfee/accm/bin</ns6:path>
<ns6:filename>accm</ns6:filename>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_mcafee_hbss_hips_installed:obj:1" version="1">
<ns8:name>MFEhiplsm</ns8:name>
</ns8:rpminfo_object>
<ns6:file_object id="oval:ssg-object_mcafee_auditengine_exists:obj:1" version="1">
<ns6:path>/opt/McAfee/auditengine/bin</ns6:path>
<ns6:filename>auditmanager</ns6:filename>
</ns6:file_object>
<ns8:rpminfo_object id="oval:ssg-obj_centos6:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_centos7:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-object_fedora_release_rpm:obj:1" version="1">
<ns8:name>fedora-release</ns8:name>
</ns8:rpminfo_object>
<ns7:textfilecontent54_object id="oval:ssg-object_fedora_vendor_product:obj:1" version="1">
<ns7:filepath>/etc/system-release-cpe</ns7:filepath>
<ns7:pattern operation="pattern match">^cpe:\/o:fedoraproject:fedora:[\d]+$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:family_object id="oval:ssg-object_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_rhel7_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl6:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl7:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_unix_wrlinux:obj:1" version="1" />
<ns6:file_object id="oval:ssg-obj_test_wrlinux:obj:1" version="1">
<ns6:filepath>/etc/wrlinux-release</ns6:filepath>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logwatch_configured_hostlimit:obj:1" version="1">
<ns7:filepath>/etc/logwatch/conf/logwatch.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]HostLimit[\s]*=[\s]*no[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_logwatch_configured_splithosts:obj:1" version="1">
<ns7:filepath>/etc/logwatch/conf/logwatch.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]SplitHosts[\s]*=[\s]*yes[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_nodev:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_noexec:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_dev_shm_partition_nosuid:obj:1" version="1">
<ns8:mount_point>/dev/shm</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_non_root_partitions:obj:1" version="1">
<ns8:mount_point operation="pattern match">^/\w.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_local_nodev:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nfs_nodev_etc_fstab:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nodev:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nodev_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nodev_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nodev_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nodev_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nodev_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nodev_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_noexec_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_noexec_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_noexec_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_noexec_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_noexec_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_noexec_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nfs_nosuid_etc_fstab:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+(.*)$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_nfs_defined_etc_fstab_nosuid:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*\[?[\.\w-:]+\]?:[/\w-]+\s+[/\w-]+\s+nfs[4]?\s+.*$</ns7:pattern>
<ns7:instance datatype="int" operation="not equal">0</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nosuid_etc_fstab_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nosuid_runtime_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nosuid_runtime_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-object_nosuid_etc_fstab_not_cd_dvd_drive:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" />
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_nosuid_runtime_not_cd_dvd_drive:obj:1" version="1">
<ns8:mount_point operation="pattern match">^.*$</ns8:mount_point>
<ns3:filter action="include">oval:ssg-state_nosuid_runtime_not_cd_dvd_drive:ste:1</ns3:filter>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_20340111:obj:1" version="1">
<ns7:filepath>/etc/fstab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_20340112:obj:1" version="1">
<ns7:filepath>/etc/mtab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:partition_object id="oval:ssg-object_tmp_nodev_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_tmp_noexec_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_tmp_nosuid_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_option_var_tmp:obj:1" version="1">
<ns8:mount_point operation="pattern match">/var/tmp</ns8:mount_point>
</ns8:partition_object>
<ns7:textfilecontent54_object comment="look for the partition mount point in /etc/mtab" id="oval:ssg-object_mount_option_var_tmp_bind:obj:1" version="1">
<ns7:filepath>/etc/mtab</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*/tmp[\s]+/var/tmp[\s]+.*bind.*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">
1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sysconfig_nozeroconf_yes:obj:1" version="1">
<ns7:filepath>/etc/sysconfig/network</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*NOZEROCONF[\s]*=[\s]*yes</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for udp6 based rpc services" id="oval:ssg-obj_network_ipv6_disable_rpc_udp6:obj:1" version="1">
<ns7:filepath>/etc/netconfig</ns7:filepath>
<ns7:pattern operation="pattern match">^udp6\s+tpi_clts\s+v\s+inet6\s+udp\s+-\s+-$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Test for tcp6 based rpc services" id="oval:ssg-obj_network_ipv6_disable_rpc_tcp6:obj:1" version="1">
<ns7:filepath>/etc/netconfig</ns7:filepath>
<ns7:pattern operation="pattern match">^tcp6\s+tpi_cots_ord\s+v\s+inet6\s+tcp\s+-\s+-$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:interface_object id="oval:ssg-object_promisc_interfaces:obj:1" version="1">
<ns6:name operation="pattern match">^.*$</ns6:name>
<ns3:filter action="include">oval:ssg-state_promisc:ste:1</ns3:filter>
</ns6:interface_object>
<ns7:textfilecontent54_object comment="/etc/securetty file exists" id="oval:ssg-object_etc_securetty_exists:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="no entries /etc/securetty" id="oval:ssg-object_no_direct_root_logins:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_no_empty_passwords:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">\s*nullok\s*</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-file_permissions_unowned_userid_list_object:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^[^:]+:[^:]+:([\d]+):[\d]+:[^:]*:[^:]+:[^:]*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="all local files" id="oval:ssg-file_permissions_unowned_object:obj:1" version="1">
<ns6:behaviors recurse="directories" recurse_direction="down" recurse_file_system="local" />
<ns6:path>/</ns6:path>
<ns6:filename operation="pattern match">.*</ns6:filename>
<ns3:filter action="exclude">oval:ssg-file_permissions_unowned_userid_list_match:ste:1</ns3:filter>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_no_insecure_locks_exports:obj:1" version="2">
<ns7:filepath>/etc/exports</ns7:filepath>
<ns7:pattern operation="pattern match">^(.*?(\binsecure_locks\b)[^$]*)$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object comment="look for .netrc in /home" id="oval:ssg-object_no_netrc_files_home:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename operation="pattern match">^\.netrc$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for .rhosts or .shosts in /root" id="oval:ssg-object_no_rsh_trust_files_root:obj:1" version="1">
<ns6:path operation="equals">/root</ns6:path>
<ns6:filename operation="pattern match">^\.(r|s)hosts$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for .rhosts or .shosts in /home" id="oval:ssg-object_no_rsh_trust_files_home:obj:1" version="1">
<ns6:behaviors max_depth="1" recurse="directories" recurse_direction="down" recurse_file_system="all" />
<ns6:path operation="equals">/home</ns6:path>
<ns6:filename operation="pattern match">^\.(r|s)hosts$</ns6:filename>
</ns6:file_object>
<ns6:file_object comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg-object_no_rsh_trust_files_etc:obj:1" version="1">
<ns6:path operation="equals">/etc</ns6:path>
<ns6:filename operation="pattern match">^s?hosts\.equiv$</ns6:filename>
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n(?!#|SYS_)(UID_MIN[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MIN[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(SYS_UID_MAX[\s]+[\d]+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_passwd_entries:obj:1" version="1">
<ns7:filepath>/etc/passwd</ns7:filepath>
<ns7:pattern operation="pattern match">^(?!root).*:x:([\d]+):[\d]+:[^:]*:[^:]*:(?!\/sbin\/nologin|\/bin\/sync|\/sbin\/shutdown|\/sbin\/halt).*$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_default_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_default_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_reserved_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_reserved_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_shell_defined_dynalloc_uid_range:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_dynalloc_range_quad_expr:var:1</ns7:var_ref>
</ns7:variable_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_aide_installed:obj:1" version="1">
<ns8:name>aide</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_audit_installed:obj:1" version="1">
<ns8:name>audit</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_bind_removed:obj:1" version="1">
<ns8:name>bind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dhcp_removed:obj:1" version="1">
<ns8:name>dhcp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dovecot_removed:obj:1" version="1">
<ns8:name>dovecot</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_dracut-fips_installed:obj:1" version="1">
<ns8:name>dracut-fips</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_httpd_removed:obj:1" version="1">
<ns8:name>httpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_mcstrans_removed:obj:1" version="1">
<ns8:name>mcstrans</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_net-snmp_removed:obj:1" version="1">
<ns8:name>net-snmp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ntp_installed:obj:1" version="1">
<ns8:name>ntp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openldap-servers_removed:obj:1" version="1">
<ns8:name>openldap-servers</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_openssh-server_removed:obj:1" version="1">
<ns8:name>openssh-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_prelink_removed:obj:1" version="1">
<ns8:name>prelink</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsh-server_removed:obj:1" version="1">
<ns8:name>rsh-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsh_removed:obj:1" version="1">
<ns8:name>rsh</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_rsyslog_installed:obj:1" version="1">
<ns8:name>rsyslog</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba-common_installed:obj:1" version="1">
<ns8:name>samba-common</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_samba-common_removed:obj:1" version="1">
<ns8:name>samba-common</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_screen_installed:obj:1" version="1">
<ns8:name>screen</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_sendmail_removed:obj:1" version="1">
<ns8:name>sendmail</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_setroubleshoot_removed:obj:1" version="1">
<ns8:name>setroubleshoot</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_squid_removed:obj:1" version="1">
<ns8:name>squid</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_talk-server_removed:obj:1" version="1">
<ns8:name>talk-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_talk_removed:obj:1" version="1">
<ns8:name>talk</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_telnet-server_removed:obj:1" version="1">
<ns8:name>telnet-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_telnet_removed:obj:1" version="1">
<ns8:name>telnet</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_tftp-server_removed:obj:1" version="1">
<ns8:name>tftp-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_tftp_removed:obj:1" version="1">
<ns8:name>tftp</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_vsftpd_installed:obj:1" version="1">
<ns8:name>vsftpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_vsftpd_removed:obj:1" version="1">
<ns8:name>vsftpd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_xinetd_removed:obj:1" version="1">
<ns8:name>xinetd</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ypbind_removed:obj:1" version="1">
<ns8:name>ypbind</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_package_ypserv_removed:obj:1" version="1">
<ns8:name>ypserv</ns8:name>
</ns8:rpminfo_object>
<ns8:partition_object id="oval:ssg-object_mount_home_own_partition:obj:1" version="1">
<ns8:mount_point>/home</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_own_tmp_partition:obj:1" version="1">
<ns8:mount_point>/tmp</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_own_partition:obj:1" version="1">
<ns8:mount_point>/var</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_log_own_partition:obj:1" version="1">
<ns8:mount_point>/var/log</ns8:mount_point>
</ns8:partition_object>
<ns8:partition_object id="oval:ssg-object_mount_var_log_audit_own_partition:obj:1" version="1">
<ns8:mount_point>/var/log/audit</ns8:mount_point>
</ns8:partition_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_postfix_server_banner:obj:1" version="1">
<ns7:filepath>/etc/postfix/main.cf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*smtpd_banner[\s]*=[\s]*\$myhostname[\s]+ESMTP[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:file_object id="oval:ssg-object_removable_partition_doesnt_exist:obj:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
</ns6:file_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_require_smb_client_signing:obj:1" version="1">
<ns7:filepath>/etc/samba/smb.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*client[\s]+signing[\s]*=[\s]*mandatory</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="serial ports /etc/securetty" id="oval:ssg-object_serial_ports_etc_securetty:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^ttyS[0-9]+$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:environmentvariable58_object id="oval:ssg-object_root_path_no_dot:obj:1" version="1">
<ns7:pid datatype="int" xsi:nil="true" />
<ns7:name>PATH</ns7:name>
</ns7:environmentvariable58_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_md5_hash:obj:1" version="1">
<ns8:behaviors nomd5="false" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">^.*bin/.*$</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_md5_hash:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_user_ownership:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_user_ownership:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_group_ownership:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_group_ownership:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns8:rpmverifyfile_object comment="rpm verify of all files" id="oval:ssg-object_files_fail_mode:obj:1" version="1">
<ns8:behaviors noghostfiles="true" nomd5="true" />
<ns8:name operation="pattern match">.*</ns8:name>
<ns8:epoch operation="pattern match">.*</ns8:epoch>
<ns8:version operation="pattern match">.*</ns8:version>
<ns8:release operation="pattern match">.*</ns8:release>
<ns8:arch operation="pattern match">.*</ns8:arch>
<ns8:filepath operation="pattern match">.*</ns8:filepath>
<ns3:filter action="include">oval:ssg-state_files_fail_mode:ste:1</ns3:filter>
</ns8:rpmverifyfile_object>
<ns7:textfilecontent54_object id="oval:ssg-object_rsyslog_nolisten:obj:1" version="2">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*\$(?:Input(?:TCP|RELP)|UDP)ServerRun</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_conf:obj:1" version="1">
<ns7:filepath>/etc/rsyslog.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_remote_loghost_rsyslog_d:obj:1" version="1">
<ns7:path>/etc/rsyslog.d</ns7:path>
<ns7:filename operation="pattern match">.*</ns7:filename>
<ns7:pattern operation="pattern match">^\*\.\*[\s]+(?:@|\:omrelp\:)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="virtual consoles /etc/securetty" id="oval:ssg-object_virtual_consoles_etc_securetty:obj:1" version="1">
<ns7:filepath>/etc/securetty</ns7:filepath>
<ns7:pattern operation="pattern match">^vc/[0-9]+$</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns8:selinuxsecuritycontext_object comment="device_t in /dev" id="oval:ssg-object_selinux_all_devicefiles_labeled:obj:1" version="1">
<ns8:behaviors recurse_direction="down" />
<ns8:path>/dev</ns8:path>
<ns8:filename operation="pattern match">^.*$</ns8:filename>
<ns3:filter action="include">oval:ssg-state_selinux_all_devicefiles_labeled:ste:1</ns3:filter>
</ns8:selinuxsecuritycontext_object>
<ns8:selinuxsecuritycontext_object comment="none satisfy initrc_t in /proc" id="oval:ssg-object_selinux_confinement_of_daemons:obj:1" version="1">
<ns8:behaviors max_depth="1" recurse_direction="down" />
<ns8:path>/proc</ns8:path>
<ns8:filename operation="pattern match">^.*$</ns8:filename>
<ns3:filter action="include">oval:ssg-state_selinux_confinement_of_daemons:ste:1</ns3:filter>
</ns8:selinuxsecuritycontext_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_selinux_policy:obj:1" version="1">
<ns7:filepath>/etc/selinux/config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*SELINUXTYPE[\s]*=[\s]*([^\s]*)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_etc_selinux_config:obj:1" version="1">
<ns7:filepath>/etc/selinux/config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*SELINUX[\s]*=[\s]*(.*)[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg-object_etc_libuser_conf_cryptstyle:obj:1" version="1">
<ns7:filepath>/etc/libuser.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*crypt_style[\s]+=[\s]+(?i)sha512[\s]*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1" version="1">
<ns7:behaviors singleline="true" />
<ns7:filepath>/etc/login.defs</ns7:filepath>
<ns7:pattern operation="pattern match">.*\n[^#]*(ENCRYPT_METHOD\s+\w+)\s*\n</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-object_last_encrypt_method_instance_value:obj:1" version="1">
<ns7:var_ref>oval:ssg-variable_last_encrypt_method_instance_value:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg-object_pam_unix_sha512:obj:1" version="1">
<ns7:filepath>/etc/pam.d/system-auth</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:sufficient))[\s]+pam_unix\.so[\s]+.*sha512.*$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_snmp_default_communities:obj:1" version="1">
<ns7:filepath>/etc/snmp/snmpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity|createUser).*(public|private)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_snmp_versions:obj:1" version="1">
<ns7:filepath>/etc/snmp/snmpd.conf</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(com2se|rocommunity|rwcommunity)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_allow_only_protocol2:obj:1" version="3">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Protocol[\s]+2[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_permitemptypasswords_no:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitEmptyPasswords(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_rsh_emulation_disabled:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)IgnoreRhosts(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_disable_rhosts_rsa:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)RhostsRSAAuthentication(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_permitrootlogin_no:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitRootLogin(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_disable_user_known_hosts:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)IgnoreUserKnownHosts(?-i)[\s]+yes[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_no_user_envset:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)PermitUserEnvironment(?-i)[\s]+no[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_banner_set:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Banner(?-i)[\s]+/etc/issue[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-object_sshd_idle_timeout:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)ClientAliveInterval[\s]+(\d+)[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_clientalivecountmax:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)ClientAliveCountMax[\s]+([\d]+)[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_use_approved_ciphers:obj:1" version="2">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)Ciphers(?-i)[\s]+aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sshd_use_approved_macs:obj:1" version="1">
<ns7:filepath>/etc/ssh/sshd_config</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)MACs(?-i)[\s]+hmac-sha2-512,hmac-sha2-256,hmac-sha1[\s]*(?:|(?:#.*))?$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object id="oval:ssg-obj_sysconfig_networking_bootproto_ifcfg:obj:1" version="1">
<ns7:path>/etc/sysconfig/network-scripts</ns7:path>
<ns7:filename operation="pattern match">ifcfg-.*</ns7:filename>
<ns7:pattern operation="pattern match">^[\s]*BOOTPROTO[\s]*=[\s"]*([^#"\s]*)</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppc_64:obj:1" version="1" />
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_ppcle_64:obj:1" version="1" />
<ns6:uname_object comment="32 bit architecture" id="oval:ssg-object_system_info_architecture_x86:obj:1" version="1" />
<ns6:uname_object comment="64 bit architecture" id="oval:ssg-object_system_info_architecture_x86_64:obj:1" version="1" />
<ns7:textfilecontent54_object id="oval:ssg-object_tftpd_uses_secure_mode:obj:1" version="1">
<ns7:filepath>/etc/xinetd.d/tftp</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*server_args[\s]+=[\s]+\-s[\s]+.+$</ns7:pattern>
<ns7:instance datatype="int">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:textfilecontent54_object comment="Umask value from /etc/init.d/functions" id="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" version="1">
<ns7:filepath>/etc/init.d/functions</ns7:filepath>
<ns7:pattern operation="pattern match">^[\s]*(?i)UMASK(?-i)[\s]+([^#\s]*)</ns7:pattern>
<ns7:instance datatype="int" operation="greater than or equal">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:variable_object id="oval:ssg-obj_umask_for_daemons:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_etc_init_d_functions_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns6:file_object comment="/etc/shadow" id="oval:ssg-object_file_etc_shadow:obj:1" version="1">
<ns6:filepath>/etc/shadow</ns6:filepath>
</ns6:file_object>
<ns7:variable_object id="oval:ssg-object_var_accounts_user_umask_umask_as_number:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_accounts_user_umask_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_var_removable_partition_is_cd_dvd_drive:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_removable_partition:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:variable_object id="oval:ssg-object_var_umask_for_daemons_umask_as_number:obj:1" version="1">
<ns7:var_ref>oval:ssg-var_umask_for_daemons_umask_as_number:var:1</ns7:var_ref>
</ns7:variable_object>
<ns7:textfilecontent54_object id="oval:ssg-object_wireless_disable_interfaces:obj:1" version="1">
<ns7:filepath>/proc/net/wireless</ns7:filepath>
<ns7:pattern operation="pattern match">^\s*[-\w]+:</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
</ns3:objects>
<ns3:states>
<ns6:file_state id="oval:ssg-state_rsyslog_files_groupownership:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_rsyslog_files_ownership:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_rsyslog_files_permissions:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_dcredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_dcredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_difok:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_difok:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_lcredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_lcredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_maxrepeat:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_maxrepeat:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_minclass:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_minclass:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_minlen:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_minlen:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_ocredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_ocredit:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_retry:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_retry:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_password_pam_cracklib_ucredit:ste:1" version="1">
<ns7:instance datatype="int">1</ns7:instance>
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_password_pam_ucredit:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_setuid_or_setgid_set:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_proper_always_exit_rule_but_for_unprivileged_command:ste:1" version="1">
<ns7:subexpression datatype="string" operation="not equal" var_check="all" var_ref="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_audit_rules_privileged_commands:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match" var_check="at least one" var_ref="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_set_dimension_match:ste:1" version="1">
<ns7:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_dimension_of_object_audit_rules_privileged_commands:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_bootloader_audit_argument:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*audit=1.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_bootloader_nousb_argument:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*nousb.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:file_state comment="uid greater than or equal to 500 and world writable" id="oval:ssg-state_gid_is_user_and_world_writable:ste:1" version="1">
<ns6:user_id datatype="int" operation="greater than or equal">500</ns6:user_id>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_group_owner_grub_conf:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_grub_conf:ste:1" version="2">
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_sgid:ste:1" version="1">
<ns6:sgid datatype="boolean">true</ns6:sgid>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_sgid_whitelist:ste:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_sgid_whitelist:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_suid:ste:1" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_suid_whitelist:ste:1" version="1">
<ns6:filepath var_check="at least one" var_ref="oval:ssg-var_suid_whitelist:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_user_owner_grub_conf:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gdm_disable_user_list:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_banner_message_enable:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="login_banner_text" id="oval:ssg-state_gconf_gdm_set_login_banner_text:ste:1" version="1">
<ns7:value_of datatype="string" operation="pattern match" var_ref="oval:ssg-login_banner_text:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_automount:ste:1" version="1">
<ns7:value_of datatype="string">false</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_automount_autorun:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_clock_temperature:ste:1" version="1">
<ns7:value_of datatype="string">false</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_clock_weather:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_disable_ctrlaltdel_reboot:ste:1" version="1">
<ns7:value_of datatype="string" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_restart_shutdown:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gconf_gnome_disable_thumbnailers:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_create:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_disconnect:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_disable_wifi_notification:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_idle_activated:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="idle timeout" id="oval:ssg-state_gnome_screensaver_idle_delay:ste:1" version="1">
<ns7:value_of datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-inactivity_timeout_value:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_screensaver_lock_enabled:ste:1" version="1">
<ns7:value_of datatype="string">true</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_max_idle_action:ste:1" version="1">
<ns7:value_of datatype="string">forced-logout</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state comment="idle timeout" id="oval:ssg-state_gnome_screensaver_max_idle_time:ste:1" version="1">
<ns7:value_of datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-inactivity_timeout_value:var:1" />
</ns7:xmlfilecontent_state>
<ns7:xmlfilecontent_state id="oval:ssg-state_gnome_screensaver_mode:ste:1" version="1">
<ns7:value_of datatype="string">blank-only</ns7:value_of>
</ns7:xmlfilecontent_state>
<ns7:textfilecontent54_state id="oval:ssg-state_grub_enable_fips_mode:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*fips=1.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_abrtd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_acpid_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_atd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_auditd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_autofs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_avahi-daemon_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_bluetooth_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_certmonger_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cgconfig_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cgred_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cpuspeed_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_crond_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_cups_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_dhcpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_dovecot_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_haldaemon_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_httpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_ip6tables_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_iptables_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_irqbalance_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_kdump_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_mdmonitor_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_messagebus_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_named_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_netconsole_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_netfs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_nfs_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_nfslock_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_ntpd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_ntpdate_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_oddjobd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_pcscd_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_portreserve_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_postfix_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_psacct_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_qpidd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_quota_nld_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rdisc_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_restorecond_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rhnsd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rhsmcertd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcbind_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcgssd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcidmapd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_rpcsvcgssd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="configured to start" id="oval:ssg-state_service_rsyslog_on:ste:1" version="1">
<ns6:start datatype="boolean">true</ns6:start>
<ns6:kill datatype="boolean">false</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_saslauthd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_smartd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_smb_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_snmpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_squid_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_sshd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_sysstat_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_tftp_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_vsftpd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_xinetd_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns6:runlevel_state comment="not configured to start" id="oval:ssg-state_service_ypbind_off:ste:1" version="1">
<ns6:start datatype="boolean">false</ns6:start>
<ns6:kill datatype="boolean">true</ns6:kill>
</ns6:runlevel_state>
<ns7:textfilecontent54_state id="oval:ssg-state_pam_pkcs11_cert_policy_ocsp_on:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*ocsp_on.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_fs_suid_dumpable:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_dmesg_restrict:ste:1" version="1">
<ns6:value datatype="int" operation="equals">1</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_exec_shield:ste:1" version="1">
<ns6:value datatype="int" operation="equals">1</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_kernel_randomize_va_space:ste:1" version="1">
<ns6:value datatype="int" operation="equals">2</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_log_martians:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_rp_filter:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_all_send_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_rp_filter:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_conf_default_send_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_ip_forward:ste:1" version="1">
<ns6:value datatype="int" operation="equals">0</ns6:value>
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv4_tcp_syncookies:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_ra:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_all_forwarding:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_ra:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" />
</ns6:sysctl_state>
<ns6:sysctl_state id="oval:ssg-state_runtime_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
<ns6:value datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" />
</ns6:sysctl_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_fs_suid_dumpable:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_dmesg_restrict:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_exec_shield:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_kernel_randomize_va_space:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">2</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_log_martians:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_rp_filter:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_secure_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_all_send_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_rp_filter:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_secure_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_conf_default_send_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_echo_ignore_broadcasts:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_icmp_ignore_bogus_error_responses:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_ip_forward:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv4_tcp_syncookies:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_ra:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_all_forwarding:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_ra:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_redirects:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_static_sysctld_net_ipv6_conf_default_accept_source_route:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_account_disable_post_pw_expiration:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_default_useradd_inactive_nonnegative:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than">-1</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_etc_passwd_no_duplicate_user_names:ste:1" version="1">
<ns7:value datatype="int" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_maxlogins:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_pass_max_days_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="less than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_maximum_age_login_defs:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_last_pass_min_days_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_minimum_age_login_defs:var:1" />
</ns7:variable_state>
<ns6:password_state id="oval:ssg-state_accounts_password_all_shadowed:ste:1" version="1">
<ns6:password>x</ns6:password>
</ns6:password_state>
<ns7:variable_state id="oval:ssg-state_last_pass_min_len_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_minlen_login_defs:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_password_pam_unix_remember:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_password_pam_unix_remember:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_pass_warn_age_instance_value:ste:1" version="1">
<ns7:value datatype="int" operation="greater than or equal" var_check="at least one" var_ref="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_var_accounts_passwords_pam_faillock_deny_value:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_system-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_fail_interval_password-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_system-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_accounts_passwords_pam_faillock_unlock_time_password-auth:ste:1" version="2">
<ns7:subexpression datatype="int" operation="equals" var_ref="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state comment="group or other has write privilege" id="oval:ssg-state_accounts_root_path_dirs_wrong_perms:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state comment="symbolic link" id="oval:ssg-state_accounts_root_path_dirs_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_profile_tmout:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_check="all" var_ref="oval:ssg-var_accounts_tmout:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_bashrc:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_csh_cshrc:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_login_defs:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-ste_accounts_umask_etc_profile:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" />
</ns7:variable_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_use_fips_hashes:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*sha512.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_verify_acls:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*acl.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_aide_verify_ext_attributes:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*xattrs.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_action_mail_acct:ste:1" version="1">
<ns7:subexpression operation="equals" var_ref="oval:ssg-var_auditd_action_mail_acct:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_admin_space_left_action:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_admin_space_left_action:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_flush:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_flush:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_max_log_file:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_max_log_file_action:ste:1" version="1">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_max_log_file_action:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_num_logs:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg-var_auditd_num_logs:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_auditd_data_retention_space_left_action:ste:1" version="2">
<ns7:subexpression operation="case insensitive equals" var_ref="oval:ssg-var_auditd_space_left_action:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_dir_perms_etc_httpd_conf:ste:1" operator="AND" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_dir_perms_var_log_httpd:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_world_writable_and_not_sticky:ste:1" version="1">
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_core_dumps_limitsconf:ste:1" version="1">
<ns7:subexpression operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_another_rotate_interval_after_daily:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">}[^{]+[\n][\s]*(weekly|monthly|yearly)|[\n][\s]*(weekly|monthly|yearly)[^}]+{</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-fd431d51-4ae0493b:ste:1" version="1">
<ns8:release>4ae0493b</ns8:release>
<ns8:version>fd431d51</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-2fa658e0-45700c69:ste:1" version="1">
<ns8:release>45700c69</ns8:release>
<ns8:version>2fa658e0</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-f4a80eb5-53a7ff4b:ste:1" version="1">
<ns8:release>53a7ff4b</ns8:release>
<ns8:version>f4a80eb5</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_package_gpg-pubkey-c105b9de-4e0fd3a3:ste:1" version="1">
<ns8:release>4e0fd3a3</ns8:release>
<ns8:version>c105b9de</ns8:version>
</ns8:rpminfo_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_group:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_gshadow:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_groupowner_etc_passwd:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_group:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_gshadow:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_owner_etc_passwd:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_binaries_not_root:ste:1" operator="OR" version="1">
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_libraries_not_root:ste:1" version="1">
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_not_root_root_var_log_audit:ste:1" operator="OR" version="1">
<ns6:group_id datatype="int" operation="not equal">0</ns6:group_id>
<ns6:user_id datatype="int" operation="not equal">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_owner_not_root_var_log_audit-non_root:ste:1" operator="OR" version="1">
<ns6:group_id datatype="int" operation="not equal">0</ns6:group_id>
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_binary_files_nogroupwrite_noworldwrite:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_binary_files_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_etc_group:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_gshadow_state_mode_0000:ste:1" version="1">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uread datatype="boolean">false</ns6:uread>
<ns6:uwrite datatype="boolean">false</ns6:uwrite>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_passwd_state_mode_0644_or_stronger:ste:1" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_uid_0:ste:1" version="1">
<ns6:user_id datatype="int" operation="equals">0</ns6:user_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_gid_0:ste:1" version="1">
<ns6:group_id datatype="int" operation="equals">0</ns6:group_id>
</ns6:file_state>
<ns6:file_state id="oval:ssg-_etc_shadow_state_mode_0000:ste:1" version="1">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uread datatype="boolean">false</ns6:uread>
<ns6:uwrite datatype="boolean">false</ns6:uwrite>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gread datatype="boolean">false</ns6:gread>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_home_dirs_home_itself:ste:1" version="1">
<ns6:path operation="equals">/home</ns6:path>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_home_dirs_wrong_perm:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_wrong_file_permissions_httpd_server_conf_files:ste:1" operator="AND" version="2">
<ns6:suid datatype="boolean">false</ns6:suid>
<ns6:sgid datatype="boolean">false</ns6:sgid>
<ns6:sticky datatype="boolean">false</ns6:sticky>
<ns6:uexec datatype="boolean">false</ns6:uexec>
<ns6:gwrite datatype="boolean">false</ns6:gwrite>
<ns6:gexec datatype="boolean">false</ns6:gexec>
<ns6:oread datatype="boolean">false</ns6:oread>
<ns6:owrite datatype="boolean">false</ns6:owrite>
<ns6:oexec datatype="boolean">false</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_perms_nogroupwrite_noworldwrite:ste:1" operator="OR" version="1">
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-perms_state_symlink:ste:1" version="1">
<ns6:type operation="equals">symbolic link</ns6:type>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write:ste:1" version="1">
<ns6:type operation="equals">regular</ns6:type>
<ns6:owrite datatype="boolean">true</ns6:owrite>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_special_selinux_files:ste:1" version="1">
<ns6:filepath operation="pattern match">^/selinux/(?:(?:member)|(?:user)|(?:relabel)|(?:create)|(?:access)|(?:context))$</ns6:filepath>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_proc:ste:1" version="1">
<ns6:filepath operation="pattern match">^/proc/.*$</ns6:filepath>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_file_permissions_unauthorized_world_write_exclude_sys:ste:1" version="1">
<ns6:filepath operation="pattern match">^/sys/.*$</ns6:filepath>
</ns6:file_state>
<ns6:file_state comment="Files that are owned by a group." id="oval:ssg-state_file_permissions_ungroupowned:ste:1" version="1">
<ns6:group_id datatype="int" var_check="at least one" var_ref="oval:ssg-variable_file_permissions_ungroupowned:var:1" />
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_not_mode_0600:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:uexec datatype="boolean">true</ns6:uexec>
<ns6:gread datatype="boolean">true</ns6:gread>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:gexec datatype="boolean">true</ns6:gexec>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns6:file_state id="oval:ssg-state_not_mode_0640:ste:1" operator="OR" version="1">
<ns6:suid datatype="boolean">true</ns6:suid>
<ns6:sgid datatype="boolean">true</ns6:sgid>
<ns6:sticky datatype="boolean">true</ns6:sticky>
<ns6:uexec datatype="boolean">true</ns6:uexec>
<ns6:gwrite datatype="boolean">true</ns6:gwrite>
<ns6:gexec datatype="boolean">true</ns6:gexec>
<ns6:oread datatype="boolean">true</ns6:oread>
<ns6:owrite datatype="boolean">true</ns6:owrite>
<ns6:oexec datatype="boolean">true</ns6:oexec>
</ns6:file_state>
<ns7:textfilecontent54_state id="oval:ssg-state_gid_passwd_group_same:ste:1" version="1">
<ns7:subexpression datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_gid_passwd_group_same:var:1" />
</ns7:textfilecontent54_state>
<ns6:file_state id="oval:ssg-state_groupowner_shadow_file:ste:1" version="1">
<ns6:group_id datatype="int">0</ns6:group_id>
</ns6:file_state>
<ns8:rpminfo_state id="oval:ssg-state_centos6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_centos7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_server:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_rhel7_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_server:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_wrlinux:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_nodev:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_noexec:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_dev_shm_nosuid:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_local_nodev:ste:1" version="1">
<ns8:device operation="pattern match">^/dev/.*$</ns8:device>
<ns8:mount_options datatype="string" entity_check="all" operation="not equal">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nodev:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*nodev.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nodev_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nodev,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nodev_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nodev_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nodev,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nodev_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_noexec_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?noexec,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_noexec_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_noexec_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?noexec,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_noexec_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_remote_filesystem_nosuid:ste:1" version="1">
<ns7:subexpression operation="pattern match">^.*nosuid.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nosuid_etc_fstab_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nosuid,?.*$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nosuid_runtime_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_nosuid_etc_fstab_not_cd_dvd_drive:ste:1" version="1">
<ns7:subexpression datatype="string" operation="pattern match">^.*,?nosuid,?.*</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_nosuid_runtime_not_cd_dvd_drive:ste:1" version="1">
<ns8:device datatype="string" operation="equals" var_check="at least one" var_ref="oval:ssg-var_removable_partition:var:1" />
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns7:textfilecontent54_state id="oval:ssg-state_20340112:ste:1" version="1">
<ns7:instance datatype="int">2</ns7:instance>
<ns7:subexpression operation="pattern match">sec=(krb5i|ntlmv2i)</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns8:partition_state id="oval:ssg-state_tmp_nodev:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_tmp_noexec:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</ns8:mount_options>
</ns8:partition_state>
<ns8:partition_state id="oval:ssg-state_tmp_nosuid:ste:1" version="1">
<ns8:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</ns8:mount_options>
</ns8:partition_state>
<ns6:interface_state id="oval:ssg-state_promisc:ste:1" version="1">
<ns6:flag datatype="string" entity_check="at least one" operation="equals">PROMISC</ns6:flag>
</ns6:interface_state>
<ns6:file_state id="oval:ssg-file_permissions_unowned_userid_list_match:ste:1" version="1">
<ns6:user_id datatype="int" var_check="at least one" var_ref="oval:ssg-file_permissions_unowned_userid_list:var:1" />
</ns6:file_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_default_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_reserved_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:variable_state id="oval:ssg-state_shell_defined_dynalloc_uid_range:ste:1" version="1">
<ns7:value datatype="int" operation="greater than">0</ns7:value>
</ns7:variable_state>
<ns7:environmentvariable58_state comment="starts with colon or period" id="oval:ssg-state_begins_colon_period:ste:1" version="1">
<ns7:value operation="pattern match">^[:\.]</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="colon twice in a row" id="oval:ssg-state_contains_double_colon:ste:1" version="1">
<ns7:value operation="pattern match">::</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="period twice in a row" id="oval:ssg-state_contains_double_period:ste:1" version="1">
<ns7:value operation="pattern match">\.\.</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="ends with colon or period" id="oval:ssg-state_ends_colon_period:ste:1" version="1">
<ns7:value operation="pattern match">[:\.]$</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="begins with a slash" id="oval:ssg-state_begins_slash:ste:1" version="1">
<ns7:value operation="pattern match">^[^/]</ns7:value>
</ns7:environmentvariable58_state>
<ns7:environmentvariable58_state comment="elements begin with a slash" id="oval:ssg-state_contains_relative_path:ste:1" version="1">
<ns7:value operation="pattern match">[^\\]:[^/]</ns7:value>
</ns7:environmentvariable58_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_md5_hash:ste:1" operator="AND" version="1">
<ns8:md5_differs>fail</ns8:md5_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_user_ownership:ste:1" version="1">
<ns8:ownership_differs>fail</ns8:ownership_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_group_ownership:ste:1" version="1">
<ns8:group_differs>fail</ns8:group_differs>
</ns8:rpmverifyfile_state>
<ns8:rpmverifyfile_state id="oval:ssg-state_files_fail_mode:ste:1" version="1">
<ns8:mode_differs>fail</ns8:mode_differs>
</ns8:rpmverifyfile_state>
<ns8:selinuxsecuritycontext_state comment="do it" id="oval:ssg-state_selinux_all_devicefiles_labeled:ste:1" version="1">
<ns8:type datatype="string" operation="equals">device_t</ns8:type>
</ns8:selinuxsecuritycontext_state>
<ns8:selinuxsecuritycontext_state comment="do it" id="oval:ssg-state_selinux_confinement_of_daemons:ste:1" version="1">
<ns8:type datatype="string" operation="equals">initrc_t</ns8:type>
</ns8:selinuxsecuritycontext_state>
<ns7:textfilecontent54_state id="oval:ssg-state_selinux_policy:ste:1" version="1">
<ns7:subexpression operation="equals" var_check="all" var_ref="oval:ssg-var_selinux_policy_name:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_etc_selinux_config:ste:1" version="1">
<ns7:subexpression datatype="string" operation="equals" var_check="all" var_ref="oval:ssg-var_selinux_state:var:1" />
</ns7:textfilecontent54_state>
<ns7:variable_state id="oval:ssg-state_last_encrypt_method_instance_value:ste:1" version="1">
<ns7:value datatype="string" operation="equals">SHA512</ns7:value>
</ns7:variable_state>
<ns7:textfilecontent54_state comment="upper bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_upper_bound:ste:1" version="1">
<ns7:subexpression datatype="int" operation="less than or equal" var_check="all" var_ref="oval:ssg-sshd_idle_timeout_value:var:1" />
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state comment="lower bound of ClientAliveInterval in seconds" id="oval:ssg-state_timeout_value_lower_bound:ste:1" version="1">
<ns7:subexpression datatype="int" operation="greater than">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_sshd_clientalivecountmax:ste:1" version="1">
<ns7:subexpression datatype="int" operation="equals">0</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns7:textfilecontent54_state id="oval:ssg-state_sysconfig_networking_bootproto_ifcfg:ste:1" version="2">
<ns7:subexpression operation="pattern match">^(static|none)$</ns7:subexpression>
</ns7:textfilecontent54_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppc_64:ste:1" version="1">
<ns6:processor_type operation="equals">ppc64</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_ppcle_64:ste:1" version="1">
<ns6:processor_type operation="equals">ppc64le</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="32 bit architecture" id="oval:ssg-state_system_info_architecture_x86:ste:1" version="1">
<ns6:processor_type operation="equals">i686</ns6:processor_type>
</ns6:uname_state>
<ns6:uname_state comment="64 bit architecture" id="oval:ssg-state_system_info_architecture_x86_64:ste:1" version="1">
<ns6:processor_type operation="equals">x86_64</ns6:processor_type>
</ns6:uname_state>
<ns7:variable_state id="oval:ssg-ste_umask_for_daemons:ste:1" version="1">
<ns7:value datatype="int" operation="bitwise and" var_ref="oval:ssg-var_umask_for_daemons_umask_as_number:var:1" />
</ns7:variable_state>
<ns6:file_state id="oval:ssg-state_etc_shadow_uid_root:ste:1" version="1">
<ns6:user_id datatype="int">0</ns6:user_id>
</ns6:file_state>
<ns7:variable_state id="oval:ssg-state_var_removable_partition_is_cd_dvd_drive:ste:1" version="1">
<ns7:value operation="equals">/dev/cdrom</ns7:value>
</ns7:variable_state>
</ns3:states>
<ns3:variables>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfg_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfg_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfg_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfg_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfg_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfg_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfg_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfg_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfo_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfo_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfo_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfo_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfo_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfo_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfo_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfo_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="$IncludeConfig value converted to regex" datatype="string" id="oval:ssg-var_rfp_include_config_regex:var:1" version="1">
<ns3:glob_to_regex>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfp_rsyslog_include_config_value:obj:1" />
</ns3:glob_to_regex>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files concatenated into string" datatype="string" id="oval:ssg-var_rfp_all_log_files_as_string:var:1" version="1">
<ns3:concat>
<ns3:variable_component var_ref="oval:ssg-var_rfp_include_config_regex:var:1" />
<ns3:literal_component datatype="string">%/etc/rsyslog.conf</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Locations of all rsyslog configuration files as collection" datatype="string" id="oval:ssg-var_rfp_all_log_files_as_collection:var:1" version="1">
<ns3:split delimiter="%">
<ns3:variable_component var_ref="oval:ssg-var_rfp_all_log_files_as_string:var:1" />
</ns3:split>
</ns3:local_variable>
<ns3:local_variable comment="File paths of all rsyslog configuration files" datatype="string" id="oval:ssg-var_rfp_log_files_paths:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_rfp_log_files_paths:obj:1" />
</ns3:local_variable>
<ns3:external_variable comment="External variable for pam_cracklib dcredit" datatype="int" id="oval:ssg-var_password_pam_dcredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib difok" datatype="int" id="oval:ssg-var_password_pam_difok:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib lcredit" datatype="int" id="oval:ssg-var_password_pam_lcredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib maxrepeat" datatype="int" id="oval:ssg-var_password_pam_maxrepeat:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib minclass" datatype="int" id="oval:ssg-var_password_pam_minclass:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib minlen" datatype="int" id="oval:ssg-var_password_pam_minlen:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib ocredit" datatype="int" id="oval:ssg-var_password_pam_ocredit:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib retry" datatype="int" id="oval:ssg-var_password_pam_retry:var:1" version="1" />
<ns3:external_variable comment="External variable for pam_cracklib ucredit" datatype="int" id="oval:ssg-var_password_pam_ucredit:var:1" version="1" />
<ns3:local_variable comment="full for of audit rules for privileged commands" datatype="string" id="oval:ssg-variable_audit_rules_privileged_commands_full_form:var:1" version="1">
<ns3:concat>
<ns3:literal_component>-a always,exit -F path=</ns3:literal_component>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_privileged_commands:obj:1" />
<ns3:literal_component> -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="cardinality of system privileged commands set" datatype="int" id="oval:ssg-variable_dimension_of_object_system_privileged_commands:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_privileged_commands:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:local_variable comment="cardinality of audit.rules privileged commands having expected rule definition set" datatype="int" id="oval:ssg-variable_dimension_of_object_audit_rules_privileged_commands:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_audit_rules_privileged_commands:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:constant_variable comment="sgid whitelist" datatype="string" id="oval:ssg-var_sgid_whitelist:var:1" version="1">
<ns3:value>/bin/cgclassify</ns3:value>
<ns3:value>/bin/cgexec</ns3:value>
<ns3:value>/sbin/netreport</ns3:value>
<ns3:value>/usr/bin/crontab</ns3:value>
<ns3:value>/usr/bin/gnomine</ns3:value>
<ns3:value>/usr/bin/iagno</ns3:value>
<ns3:value>/usr/bin/locate</ns3:value>
<ns3:value>/usr/bin/lockfile</ns3:value>
<ns3:value>/usr/bin/same-gnome</ns3:value>
<ns3:value>/usr/bin/screen</ns3:value>
<ns3:value>/usr/bin/ssh-agent</ns3:value>
<ns3:value>/usr/bin/wall</ns3:value>
<ns3:value>/usr/bin/write</ns3:value>
<ns3:value>/usr/lib64/vte/gnome-pty-helper</ns3:value>
<ns3:value>/usr/libexec/kde4/kdesud</ns3:value>
<ns3:value>/usr/libexec/utempter/utempter</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/admindb</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/admin</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/confirm</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/create</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/edithtml</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/listinfo</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/options</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/private</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/rmlist</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/roster</ns3:value>
<ns3:value>/usr/lib/mailman/cgi-bin/subscribe</ns3:value>
<ns3:value>/usr/lib/mailman/mail/mailman</ns3:value>
<ns3:value>/usr/lib/vte/gnome-pty-helper</ns3:value>
<ns3:value>/usr/sbin/lockdev</ns3:value>
<ns3:value>/usr/sbin/postdrop</ns3:value>
<ns3:value>/usr/sbin/postqueue</ns3:value>
<ns3:value>/usr/sbin/sendmail.sendmail</ns3:value>
</ns3:constant_variable>
<ns3:constant_variable comment="suid whitelist" datatype="string" id="oval:ssg-var_suid_whitelist:var:1" version="1">
<ns3:value>/bin/fusermount</ns3:value>
<ns3:value>/bin/mount</ns3:value>
<ns3:value>/bin/ping6</ns3:value>
<ns3:value>/bin/ping</ns3:value>
<ns3:value>/bin/su</ns3:value>
<ns3:value>/bin/umount</ns3:value>
<ns3:value>/lib64/dbus-1/dbus-daemon-launch-helper</ns3:value>
<ns3:value>/lib/dbus-1/dbus-daemon-launch-helper</ns3:value>
<ns3:value>/sbin/mount.ecryptfs_private</ns3:value>
<ns3:value>/sbin/mount.nfs</ns3:value>
<ns3:value>/sbin/pam_timestamp_check</ns3:value>
<ns3:value>/sbin/unix_chkpwd</ns3:value>
<ns3:value>/usr/bin/abrt-action-install-debuginfo-to-abrt-cache</ns3:value>
<ns3:value>/usr/bin/at</ns3:value>
<ns3:value>/usr/bin/chage</ns3:value>
<ns3:value>/usr/bin/chfn</ns3:value>
<ns3:value>/usr/bin/chsh</ns3:value>
<ns3:value>/usr/bin/crontab</ns3:value>
<ns3:value>/usr/bin/gpasswd</ns3:value>
<ns3:value>/usr/bin/kgrantpty</ns3:value>
<ns3:value>/usr/bin/kpac_dhcp_helper</ns3:value>
<ns3:value>/usr/bin/ksu</ns3:value>
<ns3:value>/usr/bin/newgrp</ns3:value>
<ns3:value>/usr/bin/newrole</ns3:value>
<ns3:value>/usr/bin/passwd</ns3:value>
<ns3:value>/usr/bin/pkexec</ns3:value>
<ns3:value>/usr/bin/rcp</ns3:value>
<ns3:value>/usr/bin/rlogin</ns3:value>
<ns3:value>/usr/bin/rsh</ns3:value>
<ns3:value>/usr/bin/sperl5.10.1</ns3:value>
<ns3:value>/usr/bin/staprun</ns3:value>
<ns3:value>/usr/bin/sudoedit</ns3:value>
<ns3:value>/usr/bin/sudo</ns3:value>
<ns3:value>/usr/bin/Xorg</ns3:value>
<ns3:value>/usr/lib64/amanda/calcsize</ns3:value>
<ns3:value>/usr/lib64/amanda/dumper</ns3:value>
<ns3:value>/usr/lib64/amanda/killpgrp</ns3:value>
<ns3:value>/usr/lib64/amanda/planner</ns3:value>
<ns3:value>/usr/lib64/amanda/rundump</ns3:value>
<ns3:value>/usr/lib64/amanda/runtar</ns3:value>
<ns3:value>/usr/lib64/nspluginwrapper/plugin-config</ns3:value>
<ns3:value>/usr/lib/amanda/calcsize</ns3:value>
<ns3:value>/usr/lib/amanda/dumper</ns3:value>
<ns3:value>/usr/lib/amanda/killpgrp</ns3:value>
<ns3:value>/usr/lib/amanda/planner</ns3:value>
<ns3:value>/usr/lib/amanda/rundump</ns3:value>
<ns3:value>/usr/lib/amanda/runtar</ns3:value>
<ns3:value>/usr/libexec/abrt-action-install-debuginfo-to-abrt-cache</ns3:value>
<ns3:value>/usr/libexec/spice-gtk-x86_64/spice-client-glib-usb-acl-helper</ns3:value>
<ns3:value>/usr/libexec/mc/cons.saver</ns3:value>
<ns3:value>/usr/libexec/openssh/ssh-keysign</ns3:value>
<ns3:value>/usr/libexec/polkit-1/polkit-agent-helper-1</ns3:value>
<ns3:value>/usr/libexec/pt_chown</ns3:value>
<ns3:value>/usr/libexec/pulse/proximity-helper</ns3:value>
<ns3:value>/usr/lib/nspluginwrapper/plugin-config</ns3:value>
<ns3:value>/usr/sbin/amcheck</ns3:value>
<ns3:value>/usr/sbin/seunshare</ns3:value>
<ns3:value>/usr/sbin/suexec</ns3:value>
<ns3:value>/usr/sbin/userhelper</ns3:value>
<ns3:value>/usr/sbin/usernetctl</ns3:value>
</ns3:constant_variable>
<ns3:external_variable comment="login_banner_text" datatype="string" id="oval:ssg-login_banner_text:var:1" version="1" />
<ns3:external_variable comment="inactivity timeout variable" datatype="int" id="oval:ssg-inactivity_timeout_value:var:1" version="1" />
<ns3:local_variable comment="Path to 'rotational' tunable for all block devices on the system" datatype="string" id="oval:ssg-variable_system_block_devices_rotational_paths:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="filepath" object_ref="oval:ssg-object_system_block_devices:obj:1" />
<ns3:literal_component>/queue/rotational</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Path to 'add_random' tunable for all SSD drives on system" datatype="string" id="oval:ssg-variable_system_solid_state_drives_paths:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="path" object_ref="oval:ssg-object_system_ssd_drives:obj:1" />
<ns3:literal_component>/add_random</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression to check if smartcard authentication is enabled in /etc/pam.d/system-auth" datatype="string" id="oval:ssg-variable_smart_card_enabled_system_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=1[\s]default=ignore\][\s]pam_succeed_if.so[\s]service[\s]notin[\s]</ns3:literal_component>
<ns3:literal_component>login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver[\s]quiet[\s]use_uid</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]authinfo_unavail=ignore[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]card_only\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expressiion to check if smartcard authentication is required in /etc/pam.d/system-auth" datatype="string" id="oval:ssg-variable_smart_card_required_system_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=1[\s]default=ignore\][\s]pam_succeed_if.so[\s]service[\s]notin[\s]</ns3:literal_component>
<ns3:literal_component>login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver[\s]quiet[\s]use_uid</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]wait_for_card[\s]card_only\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression to check if smartcard authentication is required in /etc/pam.d/smartcard-auth" datatype="string" id="oval:ssg-variable_smart_card_required_smartcard_auth:var:1" version="1">
<ns3:concat>
<ns3:literal_component>\nauth[\s]+required[\s]+pam_env.so</ns3:literal_component>
<ns3:literal_component>\nauth[\s]+\[success=done[\s]ignore=ignore[\s]default=die\][\s]</ns3:literal_component>
<ns3:literal_component>pam_pkcs11.so[\s]wait_for_card[\s]card_only\n.*</ns3:literal_component>
<ns3:literal_component>\npassword[\s]+required[\s]+pam_pkcs11.so\n</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="External variable for net.ipv4.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.log_martians" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.all.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.rp_filter" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.conf.default.secure_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.icmp_echo_ignore_broadcasts" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.icmp_ignore_bogus_error_responses" datatype="int" id="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv4.tcp_syncookies" datatype="int" id="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.all.forwarding" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_ra" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_redirects" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" version="1" />
<ns3:external_variable comment="External variable for net.ipv6.conf.default.accept_source_route" datatype="int" id="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" version="1" />
<ns3:external_variable comment="inactive days expiration" datatype="int" id="oval:ssg-var_account_disable_post_pw_expiration:var:1" version="1" />
<ns3:local_variable comment="Count of all username rows retrieved from /etc/passwd (including duplicates if any)" datatype="int" id="oval:ssg-variable_count_of_all_usernames_from_etc_passwd:var:1" version="1">
<ns3:count>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1" />
</ns3:count>
</ns3:local_variable>
<ns3:local_variable comment="Count of unique username rows retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_count_of_unique_usernames_from_etc_passwd:var:1" version="1">
<ns3:count>
<ns3:unique>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_content:obj:1" />
</ns3:unique>
</ns3:count>
</ns3:local_variable>
<ns3:external_variable comment="maximum number of concurrent logins per user" datatype="int" id="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MAX_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_max_days_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MAX_DAYS\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_max_days_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Maximum password age" datatype="int" id="oval:ssg-var_accounts_maximum_age_login_defs:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MIN_DAYS directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_days_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MIN_DAYS\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_days_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Minimum password age in days" datatype="int" id="oval:ssg-var_accounts_minimum_age_login_defs:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_MIN_LEN directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_min_len_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_MIN_LEN\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_min_len_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="Password minimum length" datatype="int" id="oval:ssg-var_accounts_password_minlen_login_defs:var:1" version="1" />
<ns3:external_variable comment="number of passwords that should be remembered" datatype="int" id="oval:ssg-var_password_pam_unix_remember:var:1" version="1" />
<ns3:local_variable comment="The value of last PASS_WARN_AGE directive in /etc/login.defs" datatype="int" id="oval:ssg-variable_last_pass_warn_age_instance_value:var:1" version="1">
<ns3:regex_capture pattern="PASS_WARN_AGE\s+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_pass_warn_age_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="password expiration warning age in days" datatype="int" id="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" version="1" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" version="1" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" version="2" />
<ns3:external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" version="2" />
<ns3:local_variable comment="Split the PATH on the : delimiter" datatype="string" id="oval:ssg-var_accounts_root_path_dirs_no_write:var:1" version="1">
<ns3:split delimiter=":">
<ns3:object_component item_field="value" object_ref="oval:ssg-object_accounts_root_path_dirs_no_write_pathenv:obj:1" />
</ns3:split>
</ns3:local_variable>
<ns3:external_variable comment="external variable for TMOUT" datatype="int" id="oval:ssg-var_accounts_tmout:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/bashrc" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_bashrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_bashrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/bashrc umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_bashrc_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_bashrc:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="Required umask converted from string to octal number" datatype="int" id="oval:ssg-var_accounts_user_umask_umask_as_number:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/csh.cshrc" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_csh_cshrc:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_csh_cshrc:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/csh.cshrc umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_csh_cshrc_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_csh_cshrc:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="First octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/login.defs" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_login_defs:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/login.defs umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_login_defs_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_login_defs:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="First octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/profile" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_profile:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_profile:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/profile umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_profile_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_profile:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Absolute path of Aide build database file" datatype="string" id="oval:ssg-variable_aide_build_new_database_absolute_path:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_database_dirpath:obj:1" />
<ns3:literal_component>/</ns3:literal_component>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_new_database_filename:obj:1" />
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Absolute path of Aide build database file" datatype="string" id="oval:ssg-variable_aide_operational_database_absolute_path:var:1" version="1">
<ns3:concat>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_build_database_dirpath:obj:1" />
<ns3:literal_component>/</ns3:literal_component>
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_aide_operational_database_filename:obj:1" />
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="audit action_mail_acct setting" datatype="string" id="oval:ssg-var_auditd_action_mail_acct:var:1" version="1" />
<ns3:external_variable comment="audit admin_space_left_action setting" datatype="string" id="oval:ssg-var_auditd_admin_space_left_action:var:1" version="1" />
<ns3:external_variable comment="audit flush setting" datatype="string" id="oval:ssg-var_auditd_flush:var:1" version="1" />
<ns3:external_variable comment="audit max_log_file settting" datatype="int" id="oval:ssg-var_auditd_max_log_file:var:1" version="1" />
<ns3:external_variable comment="audit max_log_file_action setting" datatype="string" id="oval:ssg-var_auditd_max_log_file_action:var:1" version="1" />
<ns3:external_variable comment="audit num_logs settting" datatype="int" id="oval:ssg-var_auditd_num_logs:var:1" version="1" />
<ns3:external_variable comment="audit space_left_action setting" datatype="string" id="oval:ssg-var_auditd_space_left_action:var:1" version="2" />
<ns3:local_variable comment="all GIDs on the target system" datatype="int" id="oval:ssg-variable_file_permissions_ungroupowned:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-etc_group_object:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="GIDs from /etc/group" datatype="string" id="oval:ssg-var_gid_passwd_group_same:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_gid_passwd_group_same_var:obj:1" />
</ns3:local_variable>
<ns3:constant_variable comment="CD/DVD drive alternative names whitelist" datatype="string" id="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" version="1">
<ns3:value>/dev/cdrom</ns3:value>
<ns3:value>/dev/dvd</ns3:value>
<ns3:value>/dev/scd0</ns3:value>
<ns3:value>/dev/sr0</ns3:value>
</ns3:constant_variable>
<ns3:local_variable comment="Regular expression pattern for CD / DVD drive alternative names" datatype="string" id="oval:ssg-variable_cd_dvd_drive_regex_pattern:var:1" version="1">
<ns3:concat>
<ns3:literal_component>^[\s]*</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_cd_dvd_drive_alternative_names:var:1" />
<ns3:literal_component>[\s]+[/\w]+[\s]+[\w]+[\s]+([^\s]+)(?:[\s]+[\d]+){2}$</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:local_variable comment="Regular expression pattern for removable block special device other than CD / DVD drive" datatype="string" id="oval:ssg-variable_not_cd_dvd_drive_regex_pattern:var:1" version="1">
<ns3:concat>
<ns3:literal_component>^[\s]*</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_removable_partition:var:1" />
<ns3:literal_component>[\s]+[/\w]+[\s]+[\w]+[\s]+([^\s]+)(?:[\s]+[\d]+){2}$</ns3:literal_component>
</ns3:concat>
</ns3:local_variable>
<ns3:external_variable comment="removable partition" datatype="string" id="oval:ssg-var_removable_partition:var:1" version="1" />
<ns3:local_variable comment="List of valid user ids" datatype="int" id="oval:ssg-file_permissions_unowned_userid_list:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-file_permissions_unowned_userid_list_object:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="UIDs retrieved from /etc/passwd" datatype="int" id="oval:ssg-variable_sys_uids_etc_passwd:var:1" version="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_etc_passwd_entries:obj:1" />
</ns3:local_variable>
<ns3:local_variable comment="Value of last UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_uid_min_value:var:1" version="1">
<ns3:regex_capture pattern="UID_MIN[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_uid_min_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - 0) * (x - (UID_MIN - 1)) expression" datatype="int" id="oval:ssg-variable_default_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_uid_min_value:var:1" />
<ns3:literal_component datatype="int">-1</ns3:literal_component>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Value of last SYS_UID_MIN from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_min_value:var:1" version="1">
<ns3:regex_capture pattern="SYS_UID_MIN[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_min_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Value of last SYS_UID_MAX from /etc/login.defs" datatype="int" id="oval:ssg-variable_sys_uid_max_value:var:1" version="1">
<ns3:regex_capture pattern="SYS_UID_MAX[\s]+(\d+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_sys_uid_max_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - 0) * (x - SYS_UID_MIN) expression" datatype="int" id="oval:ssg-variable_reserved_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:local_variable comment="Construct (x - SYS_UID_MIN) * (x - SYS_UID_MAX) expression" datatype="int" id="oval:ssg-variable_dynalloc_range_quad_expr:var:1" version="1">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_min_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="add">
<ns3:variable_component var_ref="oval:ssg-variable_sys_uids_etc_passwd:var:1" />
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">-1</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-variable_sys_uid_max_value:var:1" />
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="External variable: name of selinux policy in /etc/selinux/config" datatype="string" id="oval:ssg-var_selinux_policy_name:var:1" version="1" />
<ns3:external_variable comment="external variable for selinux state" datatype="string" id="oval:ssg-var_selinux_state:var:1" version="1" />
<ns3:local_variable comment="The value of last ENCRYPT_METHOD directive in /etc/login.defs" datatype="string" id="oval:ssg-variable_last_encrypt_method_instance_value:var:1" version="1">
<ns3:regex_capture pattern="ENCRYPT_METHOD\s+(\w+)">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-object_last_encrypt_method_from_etc_login_defs:obj:1" />
</ns3:regex_capture>
</ns3:local_variable>
<ns3:external_variable comment="timeout value" datatype="int" id="oval:ssg-sshd_idle_timeout_value:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from /etc/init.d/functions" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_etc_init_d_functions:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:object_component item_field="subexpression" object_ref="oval:ssg-obj_umask_from_etc_init_d_functions:obj:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="/etc/init.d/functions umask converted from string to a number" datatype="int" id="oval:ssg-var_etc_init_d_functions_umask_as_number:var:1" version="1">
<ns3:arithmetic arithmetic_operation="add">
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">64</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_first_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
<ns3:arithmetic arithmetic_operation="multiply">
<ns3:literal_component datatype="int">8</ns3:literal_component>
<ns3:variable_component var_ref="oval:ssg-var_second_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
<ns3:variable_component var_ref="oval:ssg-var_third_digit_of_umask_from_etc_init_d_functions:var:1" />
</ns3:arithmetic>
</ns3:local_variable>
<ns3:external_variable comment="Required umask converted from string to octal number" datatype="int" id="oval:ssg-var_umask_for_daemons_umask_as_number:var:1" version="1" />
<ns3:external_variable comment="Value of var_accounts_user_umask (the required umask) as string" datatype="string" id="oval:ssg-var_accounts_user_umask:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from var_accounts_user_umask" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_var_accounts_user_umask:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:variable_component var_ref="oval:ssg-var_accounts_user_umask:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:external_variable comment="Value of var_umask_for_daemons (the required umask) as string" datatype="string" id="oval:ssg-var_umask_for_daemons:var:1" version="1" />
<ns3:local_variable comment="First octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_first_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="1">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Second octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_second_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="2">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
<ns3:local_variable comment="Third octal digit of umask from var_umask_for_daemons" datatype="int" id="oval:ssg-var_third_digit_of_umask_from_var_umask_for_daemons:var:1" version="1">
<ns3:substring substring_length="1" substring_start="3">
<ns3:variable_component var_ref="oval:ssg-var_umask_for_daemons:var:1" />
</ns3:substring>
</ns3:local_variable>
</ns3:variables>
</ns3:oval_definitions>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_output--ssg-rhel6-ocil.xml" timestamp="2017-08-11T21:23:31">
<ns9:ocil>
<ns9:generator>
<ns9:schema_version>2.0</ns9:schema_version>
<ns9:timestamp>2017-08-11T09:18:08Z</ns9:timestamp>
</ns9:generator>
<ns9:questionnaires>
<ns9:questionnaire id="ocil:ssg-partition_for_tmp_ocil:questionnaire:1">
<ns9:title>Ensure /tmp Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_tmp_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_ocil:questionnaire:1">
<ns9:title>Ensure /var Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_log_ocil:questionnaire:1">
<ns9:title>Ensure /var/log Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_log_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1">
<ns9:title>Ensure /var/log/audit Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-partition_for_home_ocil:questionnaire:1">
<ns9:title>Ensure /home Located On Separate Partition</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-partition_for_home_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-encrypt_partitions_ocil:questionnaire:1">
<ns9:title>Encrypt Partitions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-encrypt_partitions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_redhat_gpgkey_installed_ocil:questionnaire:1">
<ns9:title>Ensure Red Hat GPG Key Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_redhat_gpgkey_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1">
<ns9:title>Ensure gpgcheck Enabled In Main Yum Configuration</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_gpgcheck_never_disabled_ocil:questionnaire:1">
<ns9:title>Ensure gpgcheck Enabled For All Yum Package Repositories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_gpgcheck_never_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1">
<ns9:title>Ensure Software Patches Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-security_patches_up_to_date_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_aide_installed_ocil:questionnaire:1">
<ns9:title>Install AIDE</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_aide_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-aide_build_database_ocil:questionnaire:1">
<ns9:title>Build and Test AIDE Database</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-aide_build_database_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1">
<ns9:title>Configure Periodic Execution of AIDE</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-aide_periodic_cron_checking_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rpm_verify_permissions_ocil:questionnaire:1">
<ns9:title>Verify and Correct File Permissions with RPM</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rpm_verify_permissions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rpm_verify_hashes_ocil:questionnaire:1">
<ns9:title>Verify File Hashes with RPM</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rpm_verify_hashes_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-install_hids_ocil:questionnaire:1">
<ns9:title>Install Intrusion Detection Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-install_hids_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-install_antivirus_ocil:questionnaire:1">
<ns9:title>Install Virus Scanning Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-install_antivirus_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dracut-fips_installed_ocil:questionnaire:1">
<ns9:title>Install the dracut-fips Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dracut-fips_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-grub_enable_fips_mode_ocil:questionnaire:1">
<ns9:title>Enable FIPS Mode in GRUB</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-grub_enable_fips_mode_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1">
<ns9:title>The Installed Operating System Is Vendor Supported and Certified</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-installed_OS_is_certified_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1">
<ns9:title>Disable GDM Automatic Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gnome_gdm_disable_guest_login_ocil:questionnaire:1">
<ns9:title>Disable GDM Guest Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gnome_gdm_disable_guest_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1">
<ns9:title>Disable the User List</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Login Restart and Shutdown Buttons</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Inactivity Timeout</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1">
<ns9:title>GNOME Desktop Screensaver Mandatory Use</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1">
<ns9:title>Enable Screen Lock Activation After Idle Period</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1">
<ns9:title>Implement Blank Screensaver</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Maximum Allowed Inactivity</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1">
<ns9:title>Set GNOME Login Maximum Allowed Inactivity Action</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1">
<ns9:title>Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Clock Temperature Feature</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1">
<ns9:title>Disable the GNOME Clock Weather Feature</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Connection Creation in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Disconnect Notification in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1">
<ns9:title>Disable WIFI Network Connection Notification in GNOME</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1">
<ns9:title>Disable GNOME Automounting</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_automount_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1">
<ns9:title>Disable All GNOME Thumbnailers</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_noexec_removable_partitions_ocil:questionnaire:1">
<ns9:title>Add noexec Option to Removable Media Partitions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_noexec_removable_partitions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_usb-storage_disabled_ocil:questionnaire:1">
<ns9:title>Disable Modprobe Loading of USB Storage Driver</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_usb-storage_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1">
<ns9:title>Disable the Automounter</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_autofs_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-userowner_shadow_file_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-userowner_shadow_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-groupowner_shadow_file_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-groupowner_shadow_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1">
<ns9:title>Verify Permissions on shadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_shadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1">
<ns9:title>Verify Permissions on group File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_group_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1">
<ns9:title>Verify Permissions on gshadow File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_gshadow_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify User Who Owns passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_owner_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify Group Who Owns passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_groupowner_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1">
<ns9:title>Verify Permissions on passwd File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_etc_passwd_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1">
<ns9:title>Verify that Shared Library Files Have Restrictive Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_library_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1">
<ns9:title>Verify that Shared Library Files Have Root Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_library_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1">
<ns9:title>Verify that System Executables Have Restrictive Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_binary_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1">
<ns9:title>Verify that System Executables Have Root Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_binary_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1">
<ns9:title>Verify that All World-Writable Directories Have Sticky Bits Set</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1">
<ns9:title>Ensure No World-Writable Files Exist</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1">
<ns9:title>Ensure All SGID Executables Are Authorized</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1">
<ns9:title>Ensure All SUID Executables Are Authorized</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1">
<ns9:title>Ensure All Files Are Owned by a User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_files_unowned_by_user_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1">
<ns9:title>Ensure All Files Are Owned by a Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_ungroupowned_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-dir_perms_world_writable_system_owned_ocil:questionnaire:1">
<ns9:title>Ensure All World-Writable Directories Are Owned by a System Account</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-dir_perms_world_writable_system_owned_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-umask_for_daemons_ocil:questionnaire:1">
<ns9:title>Set Daemon Umask</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-umask_for_daemons_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_users_coredumps_ocil:questionnaire:1">
<ns9:title>Disable Core Dumps for All Users</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_users_coredumps_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1">
<ns9:title>Disable Core Dumps for SUID programs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_exec_shield_ocil:questionnaire:1">
<ns9:title>Enable ExecShield</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_exec_shield_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1">
<ns9:title>Enable Randomized Layout of Virtual Address Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_kernel_dmesg_restrict_ocil:questionnaire:1">
<ns9:title>Restrict Access to Kernel Message Buffer</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_kernel_dmesg_restrict_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-enable_selinux_bootloader_ocil:questionnaire:1">
<ns9:title>Ensure SELinux Not Disabled in /etc/grub.conf</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-enable_selinux_bootloader_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_state_ocil:questionnaire:1">
<ns9:title>Ensure SELinux State is Enforcing</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_state_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_policytype_ocil:questionnaire:1">
<ns9:title>Configure SELinux Policy</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_policytype_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-selinux_all_devicefiles_labeled_ocil:questionnaire:1">
<ns9:title>Ensure No Device Files are Unknown to SELinux</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-selinux_all_devicefiles_labeled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1">
<ns9:title>Direct root Logins Not Allowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_direct_root_logins_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1">
<ns9:title>Restrict Virtual Console Root Logins</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-securetty_root_login_console_only_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1">
<ns9:title>Restrict Serial Port Root Logins</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-restrict_serial_port_logins_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_root_webbrowsing_ocil:questionnaire:1">
<ns9:title>Restrict Web Browser Use for Administrative Accounts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_root_webbrowsing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_shelllogin_for_systemaccounts_ocil:questionnaire:1">
<ns9:title>Ensure that System Accounts Do Not Run a Shell Upon Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_shelllogin_for_systemaccounts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1">
<ns9:title>Verify Only Root Has UID 0</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_no_uid_except_zero_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-root_path_default_ocil:questionnaire:1">
<ns9:title>Root Path Must Be Vendor Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-root_path_default_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_empty_passwords_ocil:questionnaire:1">
<ns9:title>Prevent Log In to Accounts With Empty Password</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_empty_passwords_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1">
<ns9:title>Verify All Account Password Hashes are Shadowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_all_shadowed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1">
<ns9:title>All GIDs referenced in /etc/passwd must be defined in /etc/group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gid_passwd_group_same_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_netrc_files_ocil:questionnaire:1">
<ns9:title>Verify No netrc Files Exist</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_netrc_files_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Length in login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Maximum Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1">
<ns9:title>Set Password Warning Age</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1">
<ns9:title>Set Account Expiration Following Inactivity</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_disable_post_pw_expiration_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_unique_name_ocil:questionnaire:1">
<ns9:title>Ensure All Accounts on the System Have Unique Names</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_unique_name_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1">
<ns9:title>Assign Expiration Date to Temporary Accounts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-account_temp_expire_date_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-display_login_attempts_ocil:questionnaire:1">
<ns9:title>Set Last Login/Access Notification</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-display_login_attempts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_retry_ocil:questionnaire:1">
<ns9:title>Set Password Retry Prompts Permitted Per-Session</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_retry_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_maxrepeat_ocil:questionnaire:1">
<ns9:title>Set Password to Maximum of Three Consecutive Repeating Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_maxrepeat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_dcredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Digit Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_dcredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_minlen_ocil:questionnaire:1">
<ns9:title>Set Password Minimum Length</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_minlen_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_ucredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Uppercase Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_ucredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_ocredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Special Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_ocredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_lcredit_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Lowercase Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_lcredit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_difok_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Different Characters</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_difok_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_minclass_ocil:questionnaire:1">
<ns9:title>Set Password Strength Minimum Different Categories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_minclass_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_deny_ocil:questionnaire:1">
<ns9:title>Set Deny For Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_deny_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_ocil:questionnaire:1">
<ns9:title>Set Lockout Time For Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_unlock_time_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_passwords_pam_faillock_interval_ocil:questionnaire:1">
<ns9:title>Set Interval For Counting Failed Password Attempts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_passwords_pam_faillock_interval_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1">
<ns9:title>Limit Password Reuse</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_password_hashing_algorithm_libuserconf_ocil:questionnaire:1">
<ns9:title>Set Password Hashing Algorithm in /etc/libuser.conf</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_password_hashing_algorithm_libuserconf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_tmout_ocil:questionnaire:1">
<ns9:title>Set Interactive Session Timeout</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_tmout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1">
<ns9:title>Limit the Number of Concurrent Login Sessions Allowed Per User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1">
<ns9:title>Ensure that Root's Path Does Not Include World or Group-Writable Directories</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1">
<ns9:title>Ensure that User Home Directories are not Group-Writable or World-Readable</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_home_dirs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_bashrc_ocil:questionnaire:1">
<ns9:title>Ensure the Default Bash Umask is Set Correctly</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_bashrc_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_csh_cshrc_ocil:questionnaire:1">
<ns9:title>Ensure the Default C Shell Umask is Set Correctly</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_csh_cshrc_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1">
<ns9:title>Ensure the Default Umask is Set Correctly in /etc/profile</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_profile_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1">
<ns9:title>Ensure the Default Umask is Set Correctly in login.defs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_user_owner_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /etc/grub.conf User Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_user_owner_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_group_owner_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /etc/grub.conf Group Ownership</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_group_owner_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_grub_conf_ocil:questionnaire:1">
<ns9:title>Verify /boot/grub/grub.conf Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_grub_conf_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-bootloader_password_ocil:questionnaire:1">
<ns9:title>Set Boot Loader Password</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-bootloader_password_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-require_singleuser_auth_ocil:questionnaire:1">
<ns9:title>Require Authentication for Single User Mode</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-require_singleuser_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1">
<ns9:title>Disable Ctrl-Alt-Del Reboot Activation</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_interactive_boot_ocil:questionnaire:1">
<ns9:title>Disable Interactive Boot</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_interactive_boot_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_screen_installed_ocil:questionnaire:1">
<ns9:title>Install the screen Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_screen_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-smartcard_auth_ocil:questionnaire:1">
<ns9:title>Enable Smart Card Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-smartcard_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-banner_etc_issue_ocil:questionnaire:1">
<ns9:title>Modify the System Login Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-banner_etc_issue_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1">
<ns9:title>Enable GUI Warning Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1">
<ns9:title>Set GUI Warning Banner Text</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for Sending ICMP Redirects by Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for IP Forwarding</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Secure Redirects for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Log Martian Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting ICMP Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Secure Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Ignore Bogus ICMP Error Responses</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use TCP Syncookies</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use Reverse Path Filtering for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter to Use Reverse Path Filtering by Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_bluetooth_disabled_ocil:questionnaire:1">
<ns9:title>Disable Bluetooth Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_bluetooth_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_bluetooth_disabled_ocil:questionnaire:1">
<ns9:title>Disable Bluetooth Kernel Modules</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_bluetooth_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1">
<ns9:title>Disable IPv6 Networking Support Automatic Loading</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Router Advertisements</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Router Advertisements</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1">
<ns9:title>Configure Accepting IPv6 Redirects By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_ocil:questionnaire:1">
<ns9:title>Configure Kernel Parameter for Accepting Source-Routed Packets for Interfaces By Default</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_ocil:questionnaire:1">
<ns9:title>Disable Kernel Parameter for IPv6 Forwarding</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1">
<ns9:title>Verify ip6tables Enabled if Using IPv6</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ip6tables_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1">
<ns9:title>Set Default ip6tables Policy for Incoming Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_ip6tables_default_rule_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1">
<ns9:title>Verify iptables Enabled</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_iptables_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1">
<ns9:title>Set Default iptables Policy for Incoming Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_iptables_default_rule_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1">
<ns9:title>Set Default iptables Policy for Forwarded Packets</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-set_iptables_default_rule_forward_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_dccp_disabled_ocil:questionnaire:1">
<ns9:title>Disable DCCP Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_dccp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_sctp_disabled_ocil:questionnaire:1">
<ns9:title>Disable SCTP Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_sctp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1">
<ns9:title>Disable RDS Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_rds_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1">
<ns9:title>Disable TIPC Support</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-kernel_module_tipc_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_openswan_installed_ocil:questionnaire:1">
<ns9:title>Install openswan or libreswan Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_openswan_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1">
<ns9:title>Ensure rsyslog is Installed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsyslog_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1">
<ns9:title>Enable rsyslog Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rsyslog_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1">
<ns9:title>Ensure Log Files Are Owned By Appropriate User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_ownership_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1">
<ns9:title>Ensure Log Files Are Owned By Appropriate Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_groupownership_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1">
<ns9:title>Ensure System Log Files Have Correct Permissions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_files_permissions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1">
<ns9:title>Ensure Logs Sent To Remote Host</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-rsyslog_remote_loghost_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1">
<ns9:title>Ensure Logrotate Runs Periodically</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ensure_logrotate_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1">
<ns9:title>Enable auditd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_auditd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-bootloader_audit_argument_ocil:questionnaire:1">
<ns9:title>Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-bootloader_audit_argument_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1">
<ns9:title>Configure auditd Number of Logs Retained</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_num_logs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1">
<ns9:title>Configure auditd Max Log File Size</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1">
<ns9:title>Configure auditd max_log_file_action Upon Reaching Maximum Log Size</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1">
<ns9:title>Configure auditd space_left Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1">
<ns9:title>Configure auditd admin_space_left Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1">
<ns9:title>Configure auditd mail_acct Action on Low Disk Space</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_data_retention_flush_ocil:questionnaire:1">
<ns9:title>Configure auditd flush priority</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_data_retention_flush_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1">
<ns9:title>Configure auditd to use audispd's syslog plugin</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1">
<ns9:title>Record attempts to alter time through adjtimex</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_adjtimex_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1">
<ns9:title>Record attempts to alter time through settimeofday</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_settimeofday_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter Time Through stime</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_stime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter Time Through clock_settime</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_clock_settime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1">
<ns9:title>Record Attempts to Alter the localtime File</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify User/Group Information</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_usergroup_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Network Environment</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_permissions_var_log_audit_ocil:questionnaire:1">
<ns9:title>System Audit Logs Must Have Mode 0640 or Less Permissive</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_permissions_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1">
<ns9:title>System Audit Logs Must Be Owned By Root</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-file_ownership_var_log_audit_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Mandatory Access Controls</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_mac_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - chmod</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - chown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchmod</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchmodat</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fchownat</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fremovexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - fsetxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lchown</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lremovexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - lsetxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - removexattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1">
<ns9:title>Record Events that Modify the System's Discretionary Access Controls - setxattr</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on the Use of Privileged Commands</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_privileged_commands_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on Exporting to Media (successful)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_media_export_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects File Deletion Events by User</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_file_deletion_events_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects System Administrator Actions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1">
<ns9:title>Ensure auditd Collects Information on Kernel Module Loading and Unloading</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_xinetd_disabled_ocil:questionnaire:1">
<ns9:title>Disable xinetd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_xinetd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_xinetd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall xinetd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_xinetd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_telnetd_disabled_ocil:questionnaire:1">
<ns9:title>Disable telnet Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_telnetd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall telnet-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_telnet-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_telnet_removed_ocil:questionnaire:1">
<ns9:title>Remove telnet Clients</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_telnet_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsh-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall rsh-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsh-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rexec_disabled_ocil:questionnaire:1">
<ns9:title>Disable rexec Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rexec_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rsh_disabled_ocil:questionnaire:1">
<ns9:title>Disable rsh Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rsh_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_rsh_removed_ocil:questionnaire:1">
<ns9:title>Uninstal rsh Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_rsh_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rlogin_disabled_ocil:questionnaire:1">
<ns9:title>Disable rlogin Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rlogin_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1">
<ns9:title>Remove Rsh Trust Files</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_rsh_trust_files_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_ypserv_removed_ocil:questionnaire:1">
<ns9:title>Uninstall ypserv Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_ypserv_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ypbind_disabled_ocil:questionnaire:1">
<ns9:title>Disable ypbind Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ypbind_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_ypbind_removed_ocil:questionnaire:1">
<ns9:title>Remove NIS Client</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_ypbind_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_tftp_disabled_ocil:questionnaire:1">
<ns9:title>Disable tftp Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_tftp_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_tftp-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall tftp-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_tftp-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_tftp_removed_ocil:questionnaire:1">
<ns9:title>Remove tftp</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_tftp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-tftpd_uses_secure_mode_ocil:questionnaire:1">
<ns9:title>Ensure tftp Daemon Uses Secure Mode</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-tftpd_uses_secure_mode_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_talk-server_removed_ocil:questionnaire:1">
<ns9:title>Uninstall talk-server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_talk-server_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_talk_removed_ocil:questionnaire:1">
<ns9:title>Uninstall talk Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_talk_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_abrtd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Automatic Bug Reporting Tool (abrtd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_abrtd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_acpid_disabled_ocil:questionnaire:1">
<ns9:title>Disable Advanced Configuration and Power Interface (acpid)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_acpid_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_certmonger_disabled_ocil:questionnaire:1">
<ns9:title>Disable Certmonger Service (certmonger)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_certmonger_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cgconfig_disabled_ocil:questionnaire:1">
<ns9:title>Disable Control Group Config (cgconfig)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cgconfig_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cgred_disabled_ocil:questionnaire:1">
<ns9:title>Disable Control Group Rules Engine (cgred)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cgred_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cpuspeed_disabled_ocil:questionnaire:1">
<ns9:title>Disable CPU Speed (cpuspeed)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cpuspeed_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_haldaemon_disabled_ocil:questionnaire:1">
<ns9:title>Disable Hardware Abstraction Layer Service (haldaemon)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_haldaemon_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_irqbalance_enabled_ocil:questionnaire:1">
<ns9:title>Enable IRQ Balance (irqbalance)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_irqbalance_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1">
<ns9:title>Disable KDump Kernel Crash Analyzer (kdump)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_kdump_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_mdmonitor_disabled_ocil:questionnaire:1">
<ns9:title>Disable Software RAID Monitor (mdmonitor)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_mdmonitor_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_messagebus_disabled_ocil:questionnaire:1">
<ns9:title>Disable D-Bus IPC Service (messagebus)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_messagebus_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_netconsole_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network Console (netconsole)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_netconsole_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ntpdate_disabled_ocil:questionnaire:1">
<ns9:title>Disable ntpdate Service (ntpdate)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ntpdate_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_oddjobd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Odd Job Daemon (oddjobd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_oddjobd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_portreserve_disabled_ocil:questionnaire:1">
<ns9:title>Disable Portreserve (portreserve)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_portreserve_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_psacct_enabled_ocil:questionnaire:1">
<ns9:title>Enable Process Accounting (psacct)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_psacct_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_qpidd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Apache Qpid (qpidd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_qpidd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_quota_nld_disabled_ocil:questionnaire:1">
<ns9:title>Disable Quota Netlink (quota_nld)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_quota_nld_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rdisc_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network Router Discovery Daemon (rdisc)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rdisc_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rhnsd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Red Hat Network Service (rhnsd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rhnsd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rhsmcertd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Red Hat Subscription Manager Daemon (rhsmcertd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rhsmcertd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_saslauthd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Cyrus SASL Authentication Daemon (saslauthd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_saslauthd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_smartd_disabled_ocil:questionnaire:1">
<ns9:title>Disable SMART Disk Monitoring Service (smartd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_smartd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_sysstat_disabled_ocil:questionnaire:1">
<ns9:title>Disable System Statistics Reset Service (sysstat)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_sysstat_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_crond_enabled_ocil:questionnaire:1">
<ns9:title>Enable cron Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_crond_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_anacron_ocil:questionnaire:1">
<ns9:title>Disable anacron Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_anacron_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_atd_disabled_ocil:questionnaire:1">
<ns9:title>Disable At Service (atd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_atd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1">
<ns9:title>Allow Only SSH Protocol 2</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_allow_only_protocol2_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1">
<ns9:title>Set SSH Idle Timeout Interval</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_set_idle_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1">
<ns9:title>Set SSH Client Alive Count</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_set_keepalive_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1">
<ns9:title>Disable SSH Support for .rhosts Files</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_rhosts_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-disable_host_auth_ocil:questionnaire:1">
<ns9:title>Disable Host-Based Authentication</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-disable_host_auth_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1">
<ns9:title>Disable SSH Root Login</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_root_login_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1">
<ns9:title>Disable SSH Access via Empty Passwords</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_disable_empty_passwords_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1">
<ns9:title>Enable SSH Warning Banner</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_enable_warning_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1">
<ns9:title>Do Not Allow SSH Environment Options</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1">
<ns9:title>Use Only Approved Ciphers</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_use_approved_ciphers_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1">
<ns9:title>Use Only Approved MACs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sshd_use_approved_macs_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_sssd_installed_ocil:questionnaire:1">
<ns9:title>Install the SSSD Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_sssd_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_sssd_enabled_ocil:questionnaire:1">
<ns9:title>Enable the SSSD Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_sssd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1">
<ns9:title>Configure SSSD's Memory Cache to Expire</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_memcache_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1">
<ns9:title>Configure SSSD to Expire Offline Credentials</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_offline_cred_expiration_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sssd_ssh_known_hosts_timeout_ocil:questionnaire:1">
<ns9:title>Configure SSSD to Expire SSH Known Hosts</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sssd_ssh_known_hosts_timeout_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-xwindows_runlevel_setting_ocil:questionnaire:1">
<ns9:title>Disable X Windows Startup By Setting Runlevel</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-xwindows_runlevel_setting_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_xorg-x11-server-common_removed_ocil:questionnaire:1">
<ns9:title>Remove the X Windows Package Group</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_xorg-x11-server-common_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_avahi-daemon_disabled_ocil:questionnaire:1">
<ns9:title>Disable Avahi Server Software</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_avahi-daemon_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_cups_disabled_ocil:questionnaire:1">
<ns9:title>Disable the CUPS Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_cups_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_dhcpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable DHCP Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_dhcpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dhcp_removed_ocil:questionnaire:1">
<ns9:title>Uninstall DHCP Server Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dhcp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_ocil:questionnaire:1">
<ns9:title>Disable DHCP Client</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-sysconfig_networking_bootproto_ifcfg_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1">
<ns9:title>Enable the NTP Daemon</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_ntpd_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1">
<ns9:title>Specify a Remote NTP Server</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ntpd_specify_remote_server_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_postfix_enabled_ocil:questionnaire:1">
<ns9:title>Enable Postfix Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_postfix_enabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_sendmail_removed_ocil:questionnaire:1">
<ns9:title>Uninstall Sendmail Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_sendmail_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-postfix_network_listening_disabled_ocil:questionnaire:1">
<ns9:title>Disable Postfix Network Listening</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-postfix_network_listening_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ldap_client_start_tls_ocil:questionnaire:1">
<ns9:title>Configure LDAP Client to Use TLS For All Transactions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ldap_client_start_tls_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ldap_client_tls_cacertpath_ocil:questionnaire:1">
<ns9:title>Configure Certificate Directives for LDAP Use of TLS</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ldap_client_tls_cacertpath_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_openldap-servers_removed_ocil:questionnaire:1">
<ns9:title>Uninstall openldap-servers Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_openldap-servers_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-nfs_no_anonymous_ocil:questionnaire:1">
<ns9:title>Specify UID and GID for Anonymous NFS Connections</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-nfs_no_anonymous_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_nfs_disabled_ocil:questionnaire:1">
<ns9:title>Disable Network File System (nfs)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_nfs_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_rpcsvcgssd_disabled_ocil:questionnaire:1">
<ns9:title>Disable Secure RPC Server Service (rpcsvcgssd)</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_rpcsvcgssd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_nodev_remote_filesystems_ocil:questionnaire:1">
<ns9:title>Mount Remote Filesystems with nodev</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_nodev_remote_filesystems_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_nosuid_remote_filesystems_ocil:questionnaire:1">
<ns9:title>Mount Remote Filesystems with nosuid</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_nosuid_remote_filesystems_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-no_insecure_locks_exports_ocil:questionnaire:1">
<ns9:title>Ensure Insecure File Locking is Not Allowed</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-no_insecure_locks_exports_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_named_disabled_ocil:questionnaire:1">
<ns9:title>Disable DNS Server</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_named_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_bind_removed_ocil:questionnaire:1">
<ns9:title>Uninstall bind Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_bind_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_vsftpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable vsftpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_vsftpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_vsftpd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall vsftpd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_vsftpd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ftp_log_transactions_ocil:questionnaire:1">
<ns9:title>Enable Logging of All FTP Transactions</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ftp_log_transactions_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-ftp_present_banner_ocil:questionnaire:1">
<ns9:title>Create Warning Banners for All FTP Users</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-ftp_present_banner_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_httpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable httpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_httpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_httpd_removed_ocil:questionnaire:1">
<ns9:title>Uninstall httpd Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_httpd_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_dovecot_disabled_ocil:questionnaire:1">
<ns9:title>Disable Dovecot Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_dovecot_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_dovecot_removed_ocil:questionnaire:1">
<ns9:title>Uninstall dovecot Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_dovecot_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_smb_disabled_ocil:questionnaire:1">
<ns9:title>Disable Samba</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_smb_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_samba_removed_ocil:questionnaire:1">
<ns9:title>Uninstall samba Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_samba_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_samba-common_installed_ocil:questionnaire:1">
<ns9:title>Install the Samba Common Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_samba-common_installed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-require_smb_client_signing_ocil:questionnaire:1">
<ns9:title>Require Client SMB Packet Signing, if using smbclient</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-require_smb_client_signing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-mount_option_smb_client_signing_ocil:questionnaire:1">
<ns9:title>Require Client SMB Packet Signing, if using mount.cifs</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-mount_option_smb_client_signing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_squid_disabled_ocil:questionnaire:1">
<ns9:title>Disable Squid</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_squid_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_squid_removed_ocil:questionnaire:1">
<ns9:title>Uninstall squid Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_squid_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-service_snmpd_disabled_ocil:questionnaire:1">
<ns9:title>Disable snmpd Service</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-service_snmpd_disabled_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-package_net-snmp_removed_ocil:questionnaire:1">
<ns9:title>Uninstall net-snmp Package</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-package_net-snmp_removed_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-snmpd_use_newer_protocol_ocil:questionnaire:1">
<ns9:title>Configure SNMP Service to Use Only SNMPv3 or Newer </ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-snmpd_use_newer_protocol_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-snmpd_not_default_password_ocil:questionnaire:1">
<ns9:title>Ensure Default Password Is Not Used</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-snmpd_not_default_password_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_generic_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_generic_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_auditing_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_auditing_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-met_inherently_nonselected_ocil:questionnaire:1">
<ns9:title>Product Meets this Requirement</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-met_inherently_nonselected_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_nonfinding_nonselected_scope_ocil:questionnaire:1">
<ns9:title>Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_nonfinding_nonselected_scope_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_finding_nonselected_ocil:questionnaire:1">
<ns9:title>Implementation of the Requirement is Not Supported</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_finding_nonselected_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-unmet_nonfinding_scope_ocil:questionnaire:1">
<ns9:title>Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-unmet_nonfinding_scope_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
<ns9:questionnaire id="ocil:ssg-update_process_ocil:questionnaire:1">
<ns9:title>A process for prompt installation of OS updates must exist.</ns9:title>
<ns9:actions>
<ns9:test_action_ref>ocil:ssg-update_process_action:testaction:1</ns9:test_action_ref>
</ns9:actions>
</ns9:questionnaire>
</ns9:questionnaires>
<ns9:test_actions>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_tmp_action:testaction:1" question_ref="ocil:ssg-partition_for_tmp_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_action:testaction:1" question_ref="ocil:ssg-partition_for_var_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_log_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_var_log_audit_action:testaction:1" question_ref="ocil:ssg-partition_for_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-partition_for_home_action:testaction:1" question_ref="ocil:ssg-partition_for_home_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-encrypt_partitions_action:testaction:1" question_ref="ocil:ssg-encrypt_partitions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_redhat_gpgkey_installed_action:testaction:1" question_ref="ocil:ssg-ensure_redhat_gpgkey_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1" question_ref="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_gpgcheck_never_disabled_action:testaction:1" question_ref="ocil:ssg-ensure_gpgcheck_never_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-security_patches_up_to_date_action:testaction:1" question_ref="ocil:ssg-security_patches_up_to_date_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_aide_installed_action:testaction:1" question_ref="ocil:ssg-package_aide_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-aide_build_database_action:testaction:1" question_ref="ocil:ssg-aide_build_database_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-aide_periodic_cron_checking_action:testaction:1" question_ref="ocil:ssg-aide_periodic_cron_checking_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rpm_verify_permissions_action:testaction:1" question_ref="ocil:ssg-rpm_verify_permissions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rpm_verify_hashes_action:testaction:1" question_ref="ocil:ssg-rpm_verify_hashes_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-install_hids_action:testaction:1" question_ref="ocil:ssg-install_hids_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-install_antivirus_action:testaction:1" question_ref="ocil:ssg-install_antivirus_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dracut-fips_installed_action:testaction:1" question_ref="ocil:ssg-package_dracut-fips_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-grub_enable_fips_mode_action:testaction:1" question_ref="ocil:ssg-grub_enable_fips_mode_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-installed_OS_is_certified_action:testaction:1" question_ref="ocil:ssg-installed_OS_is_certified_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gnome_gdm_disable_automatic_login_action:testaction:1" question_ref="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gnome_gdm_disable_guest_login_action:testaction:1" question_ref="ocil:ssg-gnome_gdm_disable_guest_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_disable_user_list_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_restart_shutdown_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_delay_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_mode_blank_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_temperature_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_clock_weather_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_create_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_wifi_notification_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_automount_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gnome_disable_thumbnailers_action:testaction:1" question_ref="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_noexec_removable_partitions_action:testaction:1" question_ref="ocil:ssg-mount_option_noexec_removable_partitions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_usb-storage_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_usb-storage_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_autofs_disabled_action:testaction:1" question_ref="ocil:ssg-service_autofs_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-userowner_shadow_file_action:testaction:1" question_ref="ocil:ssg-userowner_shadow_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-groupowner_shadow_file_action:testaction:1" question_ref="ocil:ssg-groupowner_shadow_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_shadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_shadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_group_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_group_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_group_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_gshadow_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_owner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_owner_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_groupowner_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_etc_passwd_action:testaction:1" question_ref="ocil:ssg-file_permissions_etc_passwd_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_library_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_library_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_library_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_binary_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_binary_dirs_action:testaction:1" question_ref="ocil:ssg-file_ownership_binary_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_sticky_bits_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_world_writable_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_sgid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_unauthorized_suid_action:testaction:1" question_ref="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_files_unowned_by_user_action:testaction:1" question_ref="ocil:ssg-no_files_unowned_by_user_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_ungroupowned_action:testaction:1" question_ref="ocil:ssg-file_permissions_ungroupowned_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-dir_perms_world_writable_system_owned_action:testaction:1" question_ref="ocil:ssg-dir_perms_world_writable_system_owned_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-umask_for_daemons_action:testaction:1" question_ref="ocil:ssg-umask_for_daemons_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_users_coredumps_action:testaction:1" question_ref="ocil:ssg-disable_users_coredumps_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_fs_suid_dumpable_action:testaction:1" question_ref="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_exec_shield_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_exec_shield_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_kernel_dmesg_restrict_action:testaction:1" question_ref="ocil:ssg-sysctl_kernel_dmesg_restrict_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-enable_selinux_bootloader_action:testaction:1" question_ref="ocil:ssg-enable_selinux_bootloader_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_state_action:testaction:1" question_ref="ocil:ssg-selinux_state_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_policytype_action:testaction:1" question_ref="ocil:ssg-selinux_policytype_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-selinux_all_devicefiles_labeled_action:testaction:1" question_ref="ocil:ssg-selinux_all_devicefiles_labeled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_direct_root_logins_action:testaction:1" question_ref="ocil:ssg-no_direct_root_logins_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-securetty_root_login_console_only_action:testaction:1" question_ref="ocil:ssg-securetty_root_login_console_only_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-restrict_serial_port_logins_action:testaction:1" question_ref="ocil:ssg-restrict_serial_port_logins_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_root_webbrowsing_action:testaction:1" question_ref="ocil:ssg-no_root_webbrowsing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_shelllogin_for_systemaccounts_action:testaction:1" question_ref="ocil:ssg-no_shelllogin_for_systemaccounts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_no_uid_except_zero_action:testaction:1" question_ref="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-root_path_default_action:testaction:1" question_ref="ocil:ssg-root_path_default_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_empty_passwords_action:testaction:1" question_ref="ocil:ssg-no_empty_passwords_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_all_shadowed_action:testaction:1" question_ref="ocil:ssg-accounts_password_all_shadowed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gid_passwd_group_same_action:testaction:1" question_ref="ocil:ssg-gid_passwd_group_same_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_netrc_files_action:testaction:1" question_ref="ocil:ssg-no_netrc_files_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_minlen_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_minimum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_maximum_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_warn_age_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_disable_post_pw_expiration_action:testaction:1" question_ref="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_unique_name_action:testaction:1" question_ref="ocil:ssg-account_unique_name_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-account_temp_expire_date_action:testaction:1" question_ref="ocil:ssg-account_temp_expire_date_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-display_login_attempts_action:testaction:1" question_ref="ocil:ssg-display_login_attempts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_retry_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_retry_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_maxrepeat_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_maxrepeat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_dcredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_dcredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_minlen_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_minlen_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_ucredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_ucredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_ocredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_ocredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_lcredit_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_lcredit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_difok_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_difok_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_minclass_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_minclass_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_deny_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_deny_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_passwords_pam_faillock_interval_action:testaction:1" question_ref="ocil:ssg-accounts_passwords_pam_faillock_interval_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_password_pam_unix_remember_action:testaction:1" question_ref="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_systemauth_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_password_hashing_algorithm_libuserconf_action:testaction:1" question_ref="ocil:ssg-set_password_hashing_algorithm_libuserconf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_tmout_action:testaction:1" question_ref="ocil:ssg-accounts_tmout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_max_concurrent_login_sessions_action:testaction:1" question_ref="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_root_path_dirs_no_write_action:testaction:1" question_ref="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_home_dirs_action:testaction:1" question_ref="ocil:ssg-file_permissions_home_dirs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_bashrc_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_bashrc_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_csh_cshrc_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_csh_cshrc_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_profile_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_profile_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-accounts_umask_etc_login_defs_action:testaction:1" question_ref="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_user_owner_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_user_owner_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_group_owner_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_group_owner_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_grub_conf_action:testaction:1" question_ref="ocil:ssg-file_permissions_grub_conf_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-bootloader_password_action:testaction:1" question_ref="ocil:ssg-bootloader_password_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-require_singleuser_auth_action:testaction:1" question_ref="ocil:ssg-require_singleuser_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_ctrlaltdel_reboot_action:testaction:1" question_ref="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_interactive_boot_action:testaction:1" question_ref="ocil:ssg-disable_interactive_boot_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_screen_installed_action:testaction:1" question_ref="ocil:ssg-package_screen_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-smartcard_auth_action:testaction:1" question_ref="ocil:ssg-smartcard_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-banner_etc_issue_action:testaction:1" question_ref="ocil:ssg-banner_etc_issue_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-gconf_gdm_set_login_banner_text_action:testaction:1" question_ref="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_ip_forward_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_bluetooth_disabled_action:testaction:1" question_ref="ocil:ssg-service_bluetooth_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_bluetooth_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_bluetooth_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_ipv6_option_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_action:testaction:1" question_ref="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ip6tables_enabled_action:testaction:1" question_ref="ocil:ssg-service_ip6tables_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_ip6tables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_ip6tables_default_rule_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_iptables_enabled_action:testaction:1" question_ref="ocil:ssg-service_iptables_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-set_iptables_default_rule_forward_action:testaction:1" question_ref="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_dccp_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_dccp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_sctp_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_sctp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_rds_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_rds_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-kernel_module_tipc_disabled_action:testaction:1" question_ref="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_openswan_installed_action:testaction:1" question_ref="ocil:ssg-package_openswan_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsyslog_installed_action:testaction:1" question_ref="ocil:ssg-package_rsyslog_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rsyslog_enabled_action:testaction:1" question_ref="ocil:ssg-service_rsyslog_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_ownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_ownership_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_groupownership_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_groupownership_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_files_permissions_action:testaction:1" question_ref="ocil:ssg-rsyslog_files_permissions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-rsyslog_remote_loghost_action:testaction:1" question_ref="ocil:ssg-rsyslog_remote_loghost_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ensure_logrotate_activated_action:testaction:1" question_ref="ocil:ssg-ensure_logrotate_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_auditd_enabled_action:testaction:1" question_ref="ocil:ssg-service_auditd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-bootloader_audit_argument_action:testaction:1" question_ref="ocil:ssg-bootloader_audit_argument_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_num_logs_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_admin_space_left_action_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_data_retention_flush_action:testaction:1" question_ref="ocil:ssg-auditd_data_retention_flush_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-auditd_audispd_syslog_plugin_activated_action:testaction:1" question_ref="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_adjtimex_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_settimeofday_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_stime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_stime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_clock_settime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_time_watch_localtime_action:testaction:1" question_ref="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_usergroup_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_networkconfig_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_permissions_var_log_audit_action:testaction:1" question_ref="ocil:ssg-file_permissions_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-file_ownership_var_log_audit_action:testaction:1" question_ref="ocil:ssg-file_ownership_var_log_audit_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_mac_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_mac_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_chown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmod_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchmodat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_fsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lchown_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lremovexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_lsetxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_removexattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_dac_modification_setxattr_action:testaction:1" question_ref="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_unsuccessful_file_modification_action:testaction:1" question_ref="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_privileged_commands_action:testaction:1" question_ref="ocil:ssg-audit_rules_privileged_commands_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_media_export_action:testaction:1" question_ref="ocil:ssg-audit_rules_media_export_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_file_deletion_events_action:testaction:1" question_ref="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_sysadmin_actions_action:testaction:1" question_ref="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-audit_rules_kernel_module_loading_action:testaction:1" question_ref="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_xinetd_disabled_action:testaction:1" question_ref="ocil:ssg-service_xinetd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_xinetd_removed_action:testaction:1" question_ref="ocil:ssg-package_xinetd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_telnetd_disabled_action:testaction:1" question_ref="ocil:ssg-service_telnetd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_telnet-server_removed_action:testaction:1" question_ref="ocil:ssg-package_telnet-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_telnet_removed_action:testaction:1" question_ref="ocil:ssg-package_telnet_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsh-server_removed_action:testaction:1" question_ref="ocil:ssg-package_rsh-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rexec_disabled_action:testaction:1" question_ref="ocil:ssg-service_rexec_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rsh_disabled_action:testaction:1" question_ref="ocil:ssg-service_rsh_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_rsh_removed_action:testaction:1" question_ref="ocil:ssg-package_rsh_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rlogin_disabled_action:testaction:1" question_ref="ocil:ssg-service_rlogin_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_rsh_trust_files_action:testaction:1" question_ref="ocil:ssg-no_rsh_trust_files_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_ypserv_removed_action:testaction:1" question_ref="ocil:ssg-package_ypserv_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ypbind_disabled_action:testaction:1" question_ref="ocil:ssg-service_ypbind_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_ypbind_removed_action:testaction:1" question_ref="ocil:ssg-package_ypbind_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_tftp_disabled_action:testaction:1" question_ref="ocil:ssg-service_tftp_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_tftp-server_removed_action:testaction:1" question_ref="ocil:ssg-package_tftp-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_tftp_removed_action:testaction:1" question_ref="ocil:ssg-package_tftp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-tftpd_uses_secure_mode_action:testaction:1" question_ref="ocil:ssg-tftpd_uses_secure_mode_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_talk-server_removed_action:testaction:1" question_ref="ocil:ssg-package_talk-server_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_talk_removed_action:testaction:1" question_ref="ocil:ssg-package_talk_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_abrtd_disabled_action:testaction:1" question_ref="ocil:ssg-service_abrtd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_acpid_disabled_action:testaction:1" question_ref="ocil:ssg-service_acpid_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_certmonger_disabled_action:testaction:1" question_ref="ocil:ssg-service_certmonger_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cgconfig_disabled_action:testaction:1" question_ref="ocil:ssg-service_cgconfig_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cgred_disabled_action:testaction:1" question_ref="ocil:ssg-service_cgred_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cpuspeed_disabled_action:testaction:1" question_ref="ocil:ssg-service_cpuspeed_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_haldaemon_disabled_action:testaction:1" question_ref="ocil:ssg-service_haldaemon_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_irqbalance_enabled_action:testaction:1" question_ref="ocil:ssg-service_irqbalance_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_kdump_disabled_action:testaction:1" question_ref="ocil:ssg-service_kdump_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_mdmonitor_disabled_action:testaction:1" question_ref="ocil:ssg-service_mdmonitor_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_messagebus_disabled_action:testaction:1" question_ref="ocil:ssg-service_messagebus_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_netconsole_disabled_action:testaction:1" question_ref="ocil:ssg-service_netconsole_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ntpdate_disabled_action:testaction:1" question_ref="ocil:ssg-service_ntpdate_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_oddjobd_disabled_action:testaction:1" question_ref="ocil:ssg-service_oddjobd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_portreserve_disabled_action:testaction:1" question_ref="ocil:ssg-service_portreserve_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_psacct_enabled_action:testaction:1" question_ref="ocil:ssg-service_psacct_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_qpidd_disabled_action:testaction:1" question_ref="ocil:ssg-service_qpidd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_quota_nld_disabled_action:testaction:1" question_ref="ocil:ssg-service_quota_nld_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rdisc_disabled_action:testaction:1" question_ref="ocil:ssg-service_rdisc_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rhnsd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rhnsd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rhsmcertd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rhsmcertd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_saslauthd_disabled_action:testaction:1" question_ref="ocil:ssg-service_saslauthd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_smartd_disabled_action:testaction:1" question_ref="ocil:ssg-service_smartd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_sysstat_disabled_action:testaction:1" question_ref="ocil:ssg-service_sysstat_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_crond_enabled_action:testaction:1" question_ref="ocil:ssg-service_crond_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_anacron_action:testaction:1" question_ref="ocil:ssg-disable_anacron_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_atd_disabled_action:testaction:1" question_ref="ocil:ssg-service_atd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_allow_only_protocol2_action:testaction:1" question_ref="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_set_idle_timeout_action:testaction:1" question_ref="ocil:ssg-sshd_set_idle_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_set_keepalive_action:testaction:1" question_ref="ocil:ssg-sshd_set_keepalive_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_rhosts_action:testaction:1" question_ref="ocil:ssg-sshd_disable_rhosts_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-disable_host_auth_action:testaction:1" question_ref="ocil:ssg-disable_host_auth_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_root_login_action:testaction:1" question_ref="ocil:ssg-sshd_disable_root_login_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_disable_empty_passwords_action:testaction:1" question_ref="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_enable_warning_banner_action:testaction:1" question_ref="ocil:ssg-sshd_enable_warning_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_do_not_permit_user_env_action:testaction:1" question_ref="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_use_approved_ciphers_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sshd_use_approved_macs_action:testaction:1" question_ref="ocil:ssg-sshd_use_approved_macs_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_sssd_installed_action:testaction:1" question_ref="ocil:ssg-package_sssd_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_sssd_enabled_action:testaction:1" question_ref="ocil:ssg-service_sssd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_memcache_timeout_action:testaction:1" question_ref="ocil:ssg-sssd_memcache_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_offline_cred_expiration_action:testaction:1" question_ref="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sssd_ssh_known_hosts_timeout_action:testaction:1" question_ref="ocil:ssg-sssd_ssh_known_hosts_timeout_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-xwindows_runlevel_setting_action:testaction:1" question_ref="ocil:ssg-xwindows_runlevel_setting_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_xorg-x11-server-common_removed_action:testaction:1" question_ref="ocil:ssg-package_xorg-x11-server-common_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_avahi-daemon_disabled_action:testaction:1" question_ref="ocil:ssg-service_avahi-daemon_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_cups_disabled_action:testaction:1" question_ref="ocil:ssg-service_cups_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_dhcpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_dhcpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dhcp_removed_action:testaction:1" question_ref="ocil:ssg-package_dhcp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_action:testaction:1" question_ref="ocil:ssg-sysconfig_networking_bootproto_ifcfg_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_ntpd_enabled_action:testaction:1" question_ref="ocil:ssg-service_ntpd_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ntpd_specify_remote_server_action:testaction:1" question_ref="ocil:ssg-ntpd_specify_remote_server_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_postfix_enabled_action:testaction:1" question_ref="ocil:ssg-service_postfix_enabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_sendmail_removed_action:testaction:1" question_ref="ocil:ssg-package_sendmail_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-postfix_network_listening_disabled_action:testaction:1" question_ref="ocil:ssg-postfix_network_listening_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ldap_client_start_tls_action:testaction:1" question_ref="ocil:ssg-ldap_client_start_tls_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ldap_client_tls_cacertpath_action:testaction:1" question_ref="ocil:ssg-ldap_client_tls_cacertpath_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_openldap-servers_removed_action:testaction:1" question_ref="ocil:ssg-package_openldap-servers_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-nfs_no_anonymous_action:testaction:1" question_ref="ocil:ssg-nfs_no_anonymous_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_nfs_disabled_action:testaction:1" question_ref="ocil:ssg-service_nfs_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_rpcsvcgssd_disabled_action:testaction:1" question_ref="ocil:ssg-service_rpcsvcgssd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_nodev_remote_filesystems_action:testaction:1" question_ref="ocil:ssg-mount_option_nodev_remote_filesystems_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_nosuid_remote_filesystems_action:testaction:1" question_ref="ocil:ssg-mount_option_nosuid_remote_filesystems_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-no_insecure_locks_exports_action:testaction:1" question_ref="ocil:ssg-no_insecure_locks_exports_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_named_disabled_action:testaction:1" question_ref="ocil:ssg-service_named_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_bind_removed_action:testaction:1" question_ref="ocil:ssg-package_bind_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_vsftpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_vsftpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_vsftpd_removed_action:testaction:1" question_ref="ocil:ssg-package_vsftpd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ftp_log_transactions_action:testaction:1" question_ref="ocil:ssg-ftp_log_transactions_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-ftp_present_banner_action:testaction:1" question_ref="ocil:ssg-ftp_present_banner_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_httpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_httpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_httpd_removed_action:testaction:1" question_ref="ocil:ssg-package_httpd_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_dovecot_disabled_action:testaction:1" question_ref="ocil:ssg-service_dovecot_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_dovecot_removed_action:testaction:1" question_ref="ocil:ssg-package_dovecot_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_smb_disabled_action:testaction:1" question_ref="ocil:ssg-service_smb_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_samba_removed_action:testaction:1" question_ref="ocil:ssg-package_samba_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_samba-common_installed_action:testaction:1" question_ref="ocil:ssg-package_samba-common_installed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-require_smb_client_signing_action:testaction:1" question_ref="ocil:ssg-require_smb_client_signing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-mount_option_smb_client_signing_action:testaction:1" question_ref="ocil:ssg-mount_option_smb_client_signing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_squid_disabled_action:testaction:1" question_ref="ocil:ssg-service_squid_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_squid_removed_action:testaction:1" question_ref="ocil:ssg-package_squid_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-service_snmpd_disabled_action:testaction:1" question_ref="ocil:ssg-service_snmpd_disabled_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-package_net-snmp_removed_action:testaction:1" question_ref="ocil:ssg-package_net-snmp_removed_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-snmpd_use_newer_protocol_action:testaction:1" question_ref="ocil:ssg-snmpd_use_newer_protocol_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-snmpd_not_default_password_action:testaction:1" question_ref="ocil:ssg-snmpd_not_default_password_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_generic_action:testaction:1" question_ref="ocil:ssg-met_inherently_generic_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_auditing_action:testaction:1" question_ref="ocil:ssg-met_inherently_auditing_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-met_inherently_nonselected_action:testaction:1" question_ref="ocil:ssg-met_inherently_nonselected_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_nonfinding_nonselected_scope_action:testaction:1" question_ref="ocil:ssg-unmet_nonfinding_nonselected_scope_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_finding_nonselected_action:testaction:1" question_ref="ocil:ssg-unmet_finding_nonselected_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-unmet_nonfinding_scope_action:testaction:1" question_ref="ocil:ssg-unmet_nonfinding_scope_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
<ns9:boolean_question_test_action id="ocil:ssg-update_process_action:testaction:1" question_ref="ocil:ssg-update_process_question:question:1">
<ns9:when_true>
<ns9:result>PASS</ns9:result>
</ns9:when_true>
<ns9:when_false>
<ns9:result>FAIL</ns9:result>
</ns9:when_false>
</ns9:boolean_question_test_action>
</ns9:test_actions>
<ns9:questions>
<ns9:boolean_question id="ocil:ssg-partition_for_tmp_question:question:1">
<ns9:question_text>
Run the following command to determine if /tmp
is on its own partition or logical volume:
$ mount | grep "on /tmp "
If /tmp has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_question:question:1">
<ns9:question_text>
Run the following command to determine if /var
is on its own partition or logical volume:
$ mount | grep "on /var "
If /var has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_log_question:question:1">
<ns9:question_text>
Run the following command to determine if /var/log
is on its own partition or logical volume:
$ mount | grep "on /var/log "
If /var/log has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_var_log_audit_question:question:1">
<ns9:question_text>
Run the following command to determine if /var/log/audit
is on its own partition or logical volume:
$ mount | grep "on /var/log/audit "
If /var/log/audit has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-partition_for_home_question:question:1">
<ns9:question_text>
Run the following command to determine if /home
is on its own partition or logical volume:
$ mount | grep "on /home "
If /home has its own partition or volume group, a line
will be returned.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-encrypt_partitions_question:question:1">
<ns9:question_text>
Determine if encryption must be used to protect data on the system.
Is it the case that encryption must be used and is not employed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_redhat_gpgkey_installed_question:question:1">
<ns9:question_text>
To ensure that the GPG key is installed, run:
$ rpm -q --queryformat "%{SUMMARY}\n" gpg-pubkey
The command should return the string below:
gpg(Red Hat, Inc. (release key 2) <security@redhat.com>
Is it the case that the Red Hat GPG Key is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_gpgcheck_globally_activated_question:question:1">
<ns9:question_text>
To determine whether yum is configured to use gpgcheck,
inspect /etc/yum.conf and ensure the following appears in the
[main] section:
gpgcheck=1
A value of 1 indicates that gpgcheck is enabled. Absence of a
gpgcheck line or a setting of 0 indicates that it is
disabled.
Is it the case that GPG checking is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_gpgcheck_never_disabled_question:question:1">
<ns9:question_text>
To determine whether yum has been configured to disable
gpgcheck for any repos, inspect all files in
/etc/yum.repos.d and ensure the following does not appear in any
sections:
gpgcheck=0
A value of 0 indicates that gpgcheck has been disabled for that repo.
Is it the case that GPG checking is disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-security_patches_up_to_date_question:question:1">
<ns9:question_text>
If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or
a yum server which provides updates, invoking the following command will
indicate if updates are available:
$ sudo yum check-update
If the system is not configured to update from one of these sources,
run the following command to list when each package was last updated:
$ rpm -qa -last
Compare this to Red Hat Security Advisories (RHSA) listed at
https://access.redhat.com/security/updates/active/https://access.redhat.com/security/updates/active/
to determine if the system is missing applicable updates.
Is it the case that updates are not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_aide_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the aide package is installed:
$ rpm -q aide
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-aide_build_database_question:question:1">
<ns9:question_text>
To find the location of the AIDE databse file, run the following command:
$ sudo ls -l DBDIR/database_file_name
Is it the case that there is no database file?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-aide_periodic_cron_checking_question:question:1">
<ns9:question_text>
To determine that periodic AIDE execution has been scheduled, run the following command:
$ grep aide /etc/crontab
Is it the case that there is no output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rpm_verify_permissions_question:question:1">
<ns9:question_text>
The following command will list which files on the system have permissions different from what
is expected by the RPM database:
$ rpm -Va | grep '^.M'
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rpm_verify_hashes_question:question:1">
<ns9:question_text> The following command will list which files on the system
have file hashes different from what is expected by the RPM database.
$ rpm -Va | awk '$1 ~ /..5/ && $2 != "c"'
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-install_hids_question:question:1">
<ns9:question_text>
Inspect the system to determine if intrusion detection software has been installed.
Verify this intrusion detection software is active.
Is it the case that no host-based intrusion detection tools are installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-install_antivirus_question:question:1">
<ns9:question_text>
Inspect the system for a cron job or system service which executes
a virus scanning tool regularly.
To verify the McAfee VSEL system service is operational,
run the following command:
$ sudo /sbin/service nails status
To check on the age of uvscan virus definition files, run the following command:
$ sudo cd /opt/NAI/LinuxShield/engine/dat
$ sudo ls -la avvscan.dat avvnames.dat avvclean.dat
Is it the case that virus scanning software does not run continuously, or at least daily, or has signatures that are out of date?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dracut-fips_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dracut-fips package is installed:
$ rpm -q dracut-fips
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-grub_enable_fips_mode_question:question:1">
<ns9:question_text>
To verify that FIPS is enabled properly in grub, run the following command:
$ grep fips /etc/grub.conf
The output should contain fips=1
Is it the case that FIPS is not configured or enabled in grub?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-installed_OS_is_certified_question:question:1">
<ns9:question_text>
To verify that the installed operating system is supported or certified, run
the following command:
$ grep -i "red hat" /etc/redhat-release
The output should contain something similar to:
Red Hat Enterprise Linux Server 6.3 (Santiago)
Is it the case that the installed operating system is not supported or certified?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gnome_gdm_disable_automatic_login_question:question:1">
<ns9:question_text>
To verify that automatic logins are disabled, run the following command:
$ grep -Pzoi "^\[daemon]\\nautomaticlogin.*" /etc/gdm/custom.conf
The output should show the following:
[daemon]
AutomaticLoginEnable=false
Is it the case that GDM allows users to automatically login?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gnome_gdm_disable_guest_login_question:question:1">
<ns9:question_text>
To verify that timed logins are disabled, run the following command:
$ grep -Pzoi "^\[daemon]\\ntimedlogin.*" /etc/gdm/custom.conf
The output should show the following:
[daemon]
TimedLoginEnable=false
Is it the case that GDM allows a guest to login without credentials?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_disable_user_list_question:question:1">
<ns9:question_text>
To ensure the user list is disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_user_list
The output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_restart_shutdown_question:question:1">
<ns9:question_text>
To ensure disable and restart on the login screen are disabled, run the following command:
$ gconftool-2 -g /apps/gdm/simple-greeter/disable_restart_buttons
The output should be true.
Is it the case that disable-restart-buttons has not been configured or is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_delay_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/idle_delay
If properly configured, the output should be .
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_question:question:1">
<ns9:question_text>To check the screensaver mandatory use status, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/idle_activation_enabled
If properly configured, the output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_lock_enabled_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/lock_enabled
If properly configured, the output should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_mode_blank_question:question:1">
<ns9:question_text>
To ensure the screensaver is configured to be blank, run the following command:
$ gconftool-2 -g /apps/gnome-screensaver/mode
If properly configured, the output should be blank-only
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_time_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_time
If properly configured, the output should be .
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_screensaver_max_idle_action_question:question:1">
<ns9:question_text>
To check the current idle time-out value, run the following command:
$ gconftool-2 -g /desktop/gnome/session/max_idle_action
If properly configured, the output should be forced-logout.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_question:question:1">
<ns9:question_text>
To ensure the system is configured to ignore the Ctrl-Alt-Del sequence,
run the following command:
$ gconftool-2 -g /apps/gnome_settings_daemon/keybindings/power
The output should return nothing.
Is it the case that GNOME3 is configured to reboot when Ctrl-Alt-Del is pressed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_temperature_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_temperature
If properly configured, the output should be false.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_clock_weather_question:question:1">
<ns9:question_text>
To check the status of the idle screen lock activation, run the following command:
$ gconftool-2 -g /apps/panel/applets/clock/prefs/show_weather
If properly configured, the output should be false.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_create_question:question:1">
<ns9:question_text>
To ensure that WIFI connections cannot be created, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-wifi-create
The output should return true.
Is it the case that WIFI connections can be created through GNOME?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_disconnect_question:question:1">
<ns9:question_text>
To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-disconnected-notifications
The output should return true.
Is it the case that wireless disconnecting network notification is enabled and not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_wifi_notification_question:question:1">
<ns9:question_text>
To ensure that wireless network notification is disabled, run the following command:
$ gconftool-2 -g /apps/nm-applet/disable-connected-notifications
The output should return true.
Is it the case that wireless connecting network notification is enabled and not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_automount_question:question:1">
<ns9:question_text>
These settings can be verified by running the following:
$ gconftool-2 -g /apps/nautilus/preferences/media_automount
The output should return false.
$ gconftool-2 -g /apps/nautilus/preferences/media_autorun_never
The output should return true.
Is it the case that GNOME automounting is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gnome_disable_thumbnailers_question:question:1">
<ns9:question_text>
These settings can be verified by running the following:
$ gconftool-2 -g /desktop/gnome/thumbnailers/disable_all
The output should return true.
Is it the case that GNOME thumbnailers are not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_noexec_removable_partitions_question:question:1">
<ns9:question_text>
To verify that binaries cannot be directly executed from removable media, run the following command:
$ grep -v noexec /etc/fstab
The resulting output will show partitions which do not have the noexec flag. Verify all partitions
in the output are not removable media.
Is it the case that removable media partitions are present?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_usb-storage_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
usb-storage kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r usb-storage /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_autofs_disabled_question:question:1">
<ns9:question_text>
To check that the autofs service is disabled in system boot configuration, run the following command:
$ sudo chkconfig autofs --list
Output should indicate the autofs service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig autofs --list
autofs 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify autofs is disabled through current runtime configuration:
$ sudo service autofs status
If the service is disabled the command will return the following output:
autofs is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-userowner_shadow_file_question:question:1">
<ns9:question_text>
To check the ownership of /etc/shadow, run the command:
$ ls -lL /etc/shadow
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-groupowner_shadow_file_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/shadow, run the command:
$ ls -lL /etc/shadow
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_shadow_question:question:1">
<ns9:question_text>
To check the permissions of /etc/shadow, run the command:
$ ls -l /etc/shadow
If properly configured, the output should indicate the following permissions:
----------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_group_question:question:1">
<ns9:question_text>
To check the ownership of /etc/group, run the command:
$ ls -lL /etc/group
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_group_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/group, run the command:
$ ls -lL /etc/group
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_group_question:question:1">
<ns9:question_text>
To check the permissions of /etc/group, run the command:
$ ls -l /etc/group
If properly configured, the output should indicate the following permissions:
-rw-r--r--
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_gshadow_question:question:1">
<ns9:question_text>
To check the ownership of /etc/gshadow, run the command:
$ ls -lL /etc/gshadow
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_gshadow_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/gshadow, run the command:
$ ls -lL /etc/gshadow
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_gshadow_question:question:1">
<ns9:question_text>
To check the permissions of /etc/gshadow, run the command:
$ ls -l /etc/gshadow
If properly configured, the output should indicate the following permissions:
----------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_owner_etc_passwd_question:question:1">
<ns9:question_text>
To check the ownership of /etc/passwd, run the command:
$ ls -lL /etc/passwd
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_groupowner_etc_passwd_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/passwd, run the command:
$ ls -lL /etc/passwd
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_etc_passwd_question:question:1">
<ns9:question_text>
To check the permissions of /etc/passwd, run the command:
$ ls -l /etc/passwd
If properly configured, the output should indicate the following permissions:
-rw-r--r--
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_library_dirs_question:question:1">
<ns9:question_text>
Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64
To find shared libraries that are group-writable or world-writable,
run the following command for each directory DIR which contains shared libraries:
$ sudo find -L DIR -perm /022 -type f
Is it the case that any of these files are group-writable or world-writable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_library_dirs_question:question:1">
<ns9:question_text>
Shared libraries are stored in the following directories:
/lib
/lib64
/usr/lib
/usr/lib64
For each of these directories, run the following command to find files not
owned by root:
$ sudo find -L $DIR \! -user root -exec chown root {} \;
Is it the case that any of these files are not owned by root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_binary_dirs_question:question:1">
<ns9:question_text>
System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are group-writable or world-writable,
run the following command for each directory DIR which contains system executables:
$ sudo find -L DIR -perm /022 -type f
Is it the case that any system executables are found to be group or world writable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_binary_dirs_question:question:1">
<ns9:question_text>
System executables are stored in the following directories by default:
/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin
To find system executables that are not owned by root,
run the following command for each directory DIR which contains system executables:
$ sudo find DIR/ \! -user root
Is it the case that any system executables are found to not be owned by root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-dir_perms_world_writable_sticky_bits_question:question:1">
<ns9:question_text>
To find world-writable directories that lack the sticky bit, run the following command:
$ sudo find / -xdev -type d -perm 002 ! -perm 1000
Is it the case that any world-writable directories are missing the sticky bit?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_world_writable_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_sgid_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_unauthorized_suid_question:question:1">
<ns9:question_text>
To find world-writable files, run the following command:
$ sudo find / -xdev -type f -perm -002
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_files_unowned_by_user_question:question:1">
<ns9:question_text>
The following command will discover and print any
files on local partitions which do not belong to a valid user.
Run it once for each local partition PART:
$ sudo find PART -xdev -nouser -print
Is it the case that files exist that are not owned by a valid user?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_ungroupowned_question:question:1">
<ns9:question_text>
The following command will discover and print any
files on local partitions which do not belong to a valid group.
Run it once for each local partition PART:
$ sudo find PART -xdev -nogroup -print
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-dir_perms_world_writable_system_owned_question:question:1">
<ns9:question_text>
The following command will discover and print world-writable directories that
are not owned by a system account, given the assumption that only system
accounts have a uid lower than 500. Run it once for each local partition PART:
$ sudo find PART -xdev -type d -perm -0002 -uid +499 -print
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-umask_for_daemons_question:question:1">
<ns9:question_text>
To check the value of the umask, run the following command:
$ grep umask /etc/init.d/functions
The output should show either 022 or 027.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_users_coredumps_question:question:1">
<ns9:question_text>
To verify that core dumps are disabled for all users, run the following command:
$ grep core /etc/security/limits.conf
The output should be:
* hard core 0
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_fs_suid_dumpable_question:question:1">
<ns9:question_text>
The status of the fs.suid_dumpable kernel parameter can be queried
by running the following command:
preserve$ sysctl fs.suid_dumpable
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_exec_shield_question:question:1">
<ns9:question_text>
The status of the kernel.exec-shield kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.exec-shield
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_randomize_va_space_question:question:1">
<ns9:question_text>
The status of the kernel.randomize_va_space kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.randomize_va_space
The output of the command should indicate a value of 2.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_kernel_dmesg_restrict_question:question:1">
<ns9:question_text>
The status of the kernel.dmesg_restrict kernel parameter can be queried
by running the following command:
preserve$ sysctl kernel.dmesg_restrict
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-enable_selinux_bootloader_question:question:1">
<ns9:question_text>
Inspect /etc/grub.conf for any instances of selinux=0
in the kernel boot arguments. Presence of selinux=0 indicates
that SELinux is disabled at boot time.
Is it the case that SELinux is disabled at boot time?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_state_question:question:1">
<ns9:question_text>
Check the file /etc/selinux/config and ensure the following line appears:
SELINUX=
Is it the case that SELINUX is not set to enforcing?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_policytype_question:question:1">
<ns9:question_text>
Check the file /etc/selinux/config and ensure the following line appears:
SELINUXTYPE=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-selinux_all_devicefiles_labeled_question:question:1">
<ns9:question_text>To check for unlabeled device files, run the following command:
$ sudo find /dev -context *:device_t:* \( -type c -o -type b \) -printf "%p %Z\n"
It should produce no output in a well-configured system.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_direct_root_logins_question:question:1">
<ns9:question_text>
To ensure root may not directly login to the system over physical consoles,
run the following command:
cat /etc/securetty
If any output is returned, this is a finding.
Is it the case that the /etc/securetty file is not empty?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-securetty_root_login_console_only_question:question:1">
<ns9:question_text>
To check for virtual console entries which permit root login, run the
following command:
$ sudo grep ^vc/[0-9] /etc/securetty
If any output is returned, then root logins over virtual console devices is permitted.
Is it the case that root login over virtual console devices is permitted?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-restrict_serial_port_logins_question:question:1">
<ns9:question_text>
To check for serial port entries which permit root login,
run the following command:
$ sudo grep ^ttyS/[0-9] /etc/securetty
If any output is returned, then root login over serial ports is permitted.
Is it the case that root login over serial ports is permitted?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_root_webbrowsing_question:question:1">
<ns9:question_text>
Check the root home directory for a .mozilla directory. If
one exists, ensure browsing is limited to local service administration.
Is it the case that this is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_shelllogin_for_systemaccounts_question:question:1">
<ns9:question_text>
To obtain a listing of all users, their UIDs, and their shells, run the
command: $ awk -F: '{print $1 ":" $3 ":" $7}' /etc/passwd Identify
the system accounts from this listing. These will primarily be the accounts
with UID numbers less than UID_MIN, other than root. Value of the UID_MIN
directive is set in /etc/login.defs configuration file. In the default
configuration UID_MIN is set to 500.
Is it the case that any system account (other than root) has a login shell?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_no_uid_except_zero_question:question:1">
<ns9:question_text>
To list all password file entries for accounts with UID 0, run the following command:
$ awk -F: '($3 == 0) {print}' /etc/passwd
This should print only one line, for the user root.
Is it the case that any account other than root has a UID of 0?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-root_path_default_question:question:1">
<ns9:question_text>
To view the root user's PATH, run the following command:
$ sudo env | grep PATH
If correctly configured, the PATH must: use vendor default settings,
have no empty entries, and have no entries beginning with a character
other than a slash (/).
Is it the case that any of these conditions are not met?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_empty_passwords_question:question:1">
<ns9:question_text>
To verify that null passwords cannot be used, run the following command:
$ grep nullok /etc/pam.d/system-auth
If this produces any output, it may be possible to log into accounts
with empty passwords.
Is it the case that NULL passwords can be used?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_all_shadowed_question:question:1">
<ns9:question_text>
To check that no password hashes are stored in
/etc/passwd, run the following command:
$ awk -F: '($2 != "x") {print}' /etc/passwd
If it produces any output, then a password hash is
stored in /etc/passwd.
Is it the case that any stored hashes are found in /etc/passwd?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gid_passwd_group_same_question:question:1">
<ns9:question_text>
To ensure all GIDs referenced in /etc/passwd are defined in /etc/group,
run the following command:
$ sudo pwck -qr
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_netrc_files_question:question:1">
<ns9:question_text>
To check the system for the existence of any .netrc files,
run the following command:
$ sudo find /root /home -xdev -name .netrc
Is it the case that any .netrc files exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_minlen_login_defs_question:question:1">
<ns9:question_text>
To check the minimum password length, run the command:
$ grep PASS_MIN_LEN /etc/login.defs
The DoD requirement is 15.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_minimum_age_login_defs_question:question:1">
<ns9:question_text>
To check the minimum password age, run the command:
$ grep PASS_MIN_DAYS /etc/login.defs
The DoD and FISMA requirement is 1.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_maximum_age_login_defs_question:question:1">
<ns9:question_text>
To check the maximum password age, run the command:
$ grep PASS_MAX_DAYS /etc/login.defs
The DoD and FISMA requirement is 60.
A value of 180 days is sufficient for many environments.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_warn_age_login_defs_question:question:1">
<ns9:question_text>
To check the password warning age, run the command:
$ grep PASS_WARN_AGE /etc/login.defs
The DoD requirement is 7.
Is it the case that it is not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_disable_post_pw_expiration_question:question:1">
<ns9:question_text>
To verify the INACTIVE setting, run the following command:
grep "INACTIVE" /etc/default/useradd
The output should indicate the INACTIVE configuration option is set
to an appropriate integer as shown in the example below:
$ sudo grep "INACTIVE" /etc/default/useradd
INACTIVE=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_unique_name_question:question:1">
<ns9:question_text>
Run the following command to check for duplicate account names:
$ sudo pwck -qr
If there are no duplicate names, no line will be returned.
Is it the case that a line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-account_temp_expire_date_question:question:1">
<ns9:question_text>
For every temporary and emergency account, run the following command
to obtain its account aging and expiration information:
$ sudo chage -l USER
Verify each of these accounts has an expiration date set as documented.
Is it the case that any temporary or emergency accounts have no expiration date set or do not expire within a documented time frame?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-display_login_attempts_question:question:1">
<ns9:question_text>
To ensure that last login/access notification is configured correctly, run
the following command:
$ grep pam_lastlog.so /etc/pam.d/system-auth
The output should show output showfailed.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_retry_question:question:1">
<ns9:question_text>
To check how many retry attempts are permitted on a per-session basis, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The retry parameter will indicate how many attempts are permitted.
The DoD required value is less than or equal to 3.
This would appear as retry=3, or a lower value.
Is it the case that it is not the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_maxrepeat_question:question:1">
<ns9:question_text>
To check the maximum value for consecutive repeating characters, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
Look for the value of the maxrepeat parameter. The DoD requirement is 3.
Is it the case that maxrepeat is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_dcredit_question:question:1">
<ns9:question_text>
To check how many digits are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The dcredit parameter (as a negative number) will indicate how many digits are required.
The DoD requires at least one digit in a password.
This would appear as dcredit=-1.
Is it the case that dcredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_minlen_question:question:1">
<ns9:question_text>
To check how many characters are required in a password, run the following command:
$ grep cracklib /etc/pam.d/system-auth
Your output should contain minlen=
Is it the case that minlen is not found or not set to the required value (or higher)?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_ucredit_question:question:1">
<ns9:question_text>
To check how many uppercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ucredit parameter (as a negative number) will indicate how many uppercase characters are required.
The DoD and FISMA require at least one uppercase character in a password.
This would appear as ucredit=-1.
Is it the case that ucredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_ocredit_question:question:1">
<ns9:question_text>
To check how many special characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The ocredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one special character in a password.
This would appear as ocredit=-1.
Is it the case that ocredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_lcredit_question:question:1">
<ns9:question_text>
To check how many lowercase characters are required in a password, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The lcredit parameter (as a negative number) will indicate how many special characters are required.
The DoD and FISMA require at least one lowercase character in a password.
This would appear as lcredit=-1.
Is it the case that lcredit is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_difok_question:question:1">
<ns9:question_text>
To check how many characters must differ during a password change, run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The difok parameter will indicate how many characters must differ.
The DoD requires four characters differ during a password change.
This would appear as difok=4.
Is it the case that difok is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_minclass_question:question:1">
<ns9:question_text>
To check how many categories of characters must be used in password during a password change,
run the following command:
$ grep pam_cracklib /etc/pam.d/system-auth
The minclass parameter will indicate how many character classes must be used. If
the requirement was for the password to contain characters from three different categories,
then this would appear as minclass=3.
Is it the case that minclass is not found or not set to the required value?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_deny_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth
The output should show deny=.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth /etc/pam.d/password-auth
The output should show unlock_time=<some-large-number>; the largest acceptable value is 604800 seconds (one week).
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_passwords_pam_faillock_interval_question:question:1">
<ns9:question_text>
To ensure the failed password attempt policy is configured correctly, run the following command:
$ grep pam_faillock /etc/pam.d/system-auth /etc/pam.d/password-auth
For each file, the output should show fail_interval=<interval-in-seconds> where interval-in-seconds is 900 (15 minutes) or greater. If the fail_interval parameter is not set, the default setting of 900 seconds is acceptable.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_password_pam_unix_remember_question:question:1">
<ns9:question_text>
To verify the password reuse setting is compliant, run the following command:
$ grep remember /etc/pam.d/system-auth
The output should show the following at the end of the line:
remember=
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_systemauth_question:question:1">
<ns9:question_text>
Inspect the password section of /etc/pam.d/system-auth and
ensure that the pam_unix.so module includes the argument
sha512:
$ grep sha512 /etc/pam.d/system-auth
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_logindefs_question:question:1">
<ns9:question_text>
Inspect /etc/login.defs and ensure the following line appears:
ENCRYPT_METHOD SHA512
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_password_hashing_algorithm_libuserconf_question:question:1">
<ns9:question_text>
Inspect /etc/libuser.conf and ensure the following line appears
in the [default] section:
crypt_style = sha512
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_tmout_question:question:1">
<ns9:question_text>
Run the following command to ensure the TMOUT value is configured for all users
on the system:
$ sudo grep TMOUT /etc/profile
Is it the case that value of TMOUT is not greater than or equal to expected setting?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_max_concurrent_login_sessions_question:question:1">
<ns9:question_text>
Run the following command to ensure the maxlogins value is configured for all users
on the system:
$ grep "maxlogins" /etc/security/limits.conf
You should receive output similar to the following:
* hard maxlogins
Is it the case that it is not similar?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_root_path_dirs_no_write_question:question:1">
<ns9:question_text>
To ensure write permissions are disabled for group and other
for each element in root's path, run the following command:
$ sudo ls -ld DIR
Is it the case that group or other write permissions exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_home_dirs_question:question:1">
<ns9:question_text>
To ensure the user home directory is not group-writable or world-readable, run the following:
$ sudo ls -ld /home/USER
Is it the case that the user home directory is group-writable or world-readable?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_bashrc_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/bashrc file by
running the following command:
$ grep "umask" /etc/bashrc
All output must show the value of umask set as shown below:
$ grep "umask" /etc/bashrc
umask
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_csh_cshrc_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/csh.cshrc file by
running the following command:
$ grep "umask" /etc/csh.cshrc
All output must show the value of umask set as shown in the below:
$ grep "umask" /etc/csh.cshrc
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_profile_question:question:1">
<ns9:question_text>
Verify the umask setting is configured correctly in the /etc/profile file by
running the following command:
$ grep "umask" /etc/profile
All output must show the value of umask set as shown in the below:
$ grep "umask" /etc/profile
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-accounts_umask_etc_login_defs_question:question:1">
<ns9:question_text>
Verify the UMASK setting is configured correctly in the /etc/login.defs file by
running the following command:
$ grep -i "UMASK" /etc/login.defs
All output must show the value of umask set as shown in the below:
$ grep -i "UMASK" /etc/login.defs
umask
Is it the case that the above command returns no output, or if the umask is configured incorrectly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_user_owner_grub_conf_question:question:1">
<ns9:question_text>
To check the ownership of /etc/grub.conf, run the command:
$ ls -lL /etc/grub.conf
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_group_owner_grub_conf_question:question:1">
<ns9:question_text>
To check the group ownership of /etc/grub.conf, run the command:
$ ls -lL /etc/grub.conf
If properly configured, the output should indicate the following group-owner.
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_grub_conf_question:question:1">
<ns9:question_text>
To check the permissions of /etc/grub.conf, run the command:
$ sudo ls -lL /etc/grub.conf
If properly configured, the output should indicate the following
permissions: -rw-------
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-bootloader_password_question:question:1">
<ns9:question_text>
To verify the boot loader password has been set and encrypted, run the following command:
$ sudo grep password /etc/grub.conf
The output should show the following:
password --encrypted password-hash
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-require_singleuser_auth_question:question:1">
<ns9:question_text>
To check if authentication is required for single-user mode, run the following command:
$ grep SINGLE /etc/sysconfig/init
The output should be the following:
SINGLE=/sbin/sulogin
Is it the case that the output is different?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_ctrlaltdel_reboot_question:question:1">
<ns9:question_text>
To ensure the system is configured to log a message instead of rebooting the system when
Ctrl-Alt-Del is pressed, ensure the following line is in /etc/init/control-alt-delete.conf:
exec /usr/bin/logger -p security.info "Control-Alt-Delete pressed"
Is it the case that the system is configured to run the shutdown command?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_interactive_boot_question:question:1">
<ns9:question_text>
To check whether interactive boot is disabled, run the following commands:
$ grep PROMPT /etc/sysconfig/init If interactive boot is
disabled, the output will show: PROMPT=no$ grep confirm /etc/grub.conf If interactive boot is disabled,
there should be no output.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_screen_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the screen package is installed:
$ rpm -q screen
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-smartcard_auth_question:question:1">
<ns9:question_text>
Interview the SA to determine if all accounts not exempted by policy are using
CAC authentication. For DoD systems, the following systems and accounts are
exempt from using smart card (CAC) authentication:
SIPRNET systemsStandalone systemsApplication accountsTemporary employee accounts, such as students or interns, who cannot easily receive a CAC or PIVOperational tactical locations that are not collocated with RAPIDS workstations to issue CAC or ALTTest systems, such as those with an Interim Approval to Test (IATT) and use a separate VPN, firewall, or security measure preventing access to network and system components from outside the protection boundary documented in the IATT.
Is it the case that non-exempt accounts are not using CAC authentication?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-banner_etc_issue_question:question:1">
<ns9:question_text>
To check if the system login banner is compliant,
run the following command:
$ cat /etc/issue
Is it the case that it does not display the required banner?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_enable_warning_gui_banner_question:question:1">
<ns9:question_text>
To ensure a login warning banner is enabled, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_enable
Search for the banner_message_enable schema.
If properly configured, the default value should be true.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-gconf_gdm_set_login_banner_text_question:question:1">
<ns9:question_text>
To ensure the login warning banner text is properly set, run the following:
$ gconftool-2 -g /apps/gdm/simple-greeter/banner_message_text
If properly configured, the proper banner text will appear within this schema.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.send_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.send_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.send_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_ip_forward_question:question:1">
<ns9:question_text>
The status of the net.ipv4.ip_forward kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.ip_forward
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
The ability to forward packets is only appropriate for routers.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.secure_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.secure_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.log_martians kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.log_martians
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.secure_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.secure_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_question:question:1">
<ns9:question_text>
The status of the net.ipv4.icmp_echo_ignore_broadcasts kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.icmp_echo_ignore_broadcasts
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_question:question:1">
<ns9:question_text>
The status of the net.ipv4.icmp_ignore_bogus_error_responses kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.icmp_ignore_bogus_error_responses
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_question:question:1">
<ns9:question_text>
The status of the net.ipv4.tcp_syncookies kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.tcp_syncookies
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.all.rp_filter kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.all.rp_filter
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_question:question:1">
<ns9:question_text>
The status of the net.ipv4.conf.default.rp_filter kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv4.conf.default.rp_filter
The output of the command should indicate a value of 1.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_bluetooth_disabled_question:question:1">
<ns9:question_text>
To check that the bluetooth service is disabled in system boot configuration, run the following command:
# chkconfig bluetooth --list
Output should indicate the bluetooth service has either not been installed or has been disabled at all runlevels, as shown in the example below:
# chkconfig bluetooth --list
bluetooth 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Is it the case that the service is configured to run?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_bluetooth_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
bluetooth kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r bluetooth /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_ipv6_option_disabled_question:question:1">
<ns9:question_text>
If the system uses IPv6, this is not applicable.
If the system is configured to disable the
ipv6 kernel module, it will contain a line
of the form:
options ipv6 disable=1
Such lines may be inside any file in /etc/modprobe.d or the
deprecated/etc/modprobe.conf. This permits insertion of the IPv6
kernel module (which other parts of the system expect to be present), but
otherwise keeps it inactive. Run the following command to search for such
lines in all files in /etc/modprobe.d and the deprecated
/etc/modprobe.conf:
preserve$ grep -r ipv6 /etc/modprobe.conf /etc/modprobe.d
Is it the case that the ipv6 kernel module is not disabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_ra kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_ra
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_ra kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_ra
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_redirects kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_redirects
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.default.accept_source_route kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.default.accept_source_route
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_question:question:1">
<ns9:question_text>
The status of the net.ipv6.conf.all.forwarding kernel parameter can be queried
by running the following command:
preserve$ sysctl net.ipv6.conf.all.forwarding
The output of the command should indicate a value of 0.
If this value is not the default value, investigate how it could have been
adjusted at runtime, and verify it is not set improperly in
/etc/sysctl.conf.
The ability to forward packets is only appropriate for routers.
Is it the case that the correct value is not returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ip6tables_enabled_question:question:1">
<ns9:question_text>
If IPv6 is disabled, this is not applicable.
Run the following command to determine the current status of the
ip6tables service:
$ sudo service ip6tables status
If the service is enabled, it should return the following: ip6tables is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_ip6tables_default_rule_question:question:1">
<ns9:question_text>
If IPv6 is disabled, this is not applicable.
Inspect the file /etc/sysconfig/ip6tables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/ip6tables
Is it the case that the default policy for the INPUT chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_iptables_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
iptables service:
$ sudo service iptables status
If the service is enabled, it should return the following: iptables is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_iptables_default_rule_question:question:1">
<ns9:question_text>Inspect the file /etc/sysconfig/iptables to determine
the default policy for the INPUT chain. It should be set to DROP:
$ sudo grep ":INPUT" /etc/sysconfig/iptables
Is it the case that the default policy for the INPUT chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-set_iptables_default_rule_forward_question:question:1">
<ns9:question_text>
Run the following command to ensure the default FORWARD policy is DROP:
grep ":FORWARD" /etc/sysconfig/iptables
The output should be similar to the following:
$ sudo grep ":FORWARD" /etc/sysconfig/iptables
:FORWARD DROP [0:0
Is it the case that the default policy for the FORWARD chain is not set to DROP?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_dccp_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
dccp kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r dccp /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_sctp_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
sctp kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r sctp /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_rds_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
rds kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r rds /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-kernel_module_tipc_disabled_question:question:1">
<ns9:question_text>
If the system is configured to prevent the loading of the
tipc kernel module,
it will contain lines inside any file in /etc/modprobe.d or the deprecated/etc/modprobe.conf.
These lines instruct the module loading system to run another program (such as
/bin/true) upon a module install event.
Run the following command to search for such lines in all files in /etc/modprobe.d
and the deprecated /etc/modprobe.conf:
preserve$ grep -r tipc /etc/modprobe.conf /etc/modprobe.d
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_openswan_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the openswan package is installed:
$ rpm -q openswan
Run the following command to determine if the libreswan package is installed:
$ rpm -q libreswan
If the system does not communicate over untrusted networks, this is not applicable.
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsyslog_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the rsyslog package is installed:
$ rpm -q rsyslog
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rsyslog_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
rsyslog service:
$ sudo service rsyslog status
If the service is enabled, it should return the following: rsyslog is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_ownership_question:question:1">
<ns9:question_text>
The owner of all log files written by rsyslog should be root.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the owner of a given log file, run the following command:
$ ls -l LOGFILE
Is it the case that the owner is not root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_groupownership_question:question:1">
<ns9:question_text>
The group-owner of all log files written by rsyslog should be root.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the group-owner of a given log file, run the following command:
$ ls -l LOGFILE
Is it the case that the group-owner is not root?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_files_permissions_question:question:1">
<ns9:question_text>
The file permissions for all log files written by rsyslog
should be set to 600, or more restrictive.
These log files are determined by the second part of each Rule line in
/etc/rsyslog.conf and typically all appear in /var/log.
To see the permissions of a given log file, run the following command:
$ ls -l LOGFILE
The permissions should be 600, or more restrictive. Some log files referenced
in /etc/rsyslog.conf may be created by other programs and may require
exclusion from consideration, such as /var/log/boot.log.
Is it the case that the permissions are not correct?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-rsyslog_remote_loghost_question:question:1">
<ns9:question_text>
To ensure logs are sent to a remote host, examine the file
/etc/rsyslog.conf.
If using UDP, a line similar to the following should be present:
*.* @loghost.example.com
If using TCP, a line similar to the following should be present:
*.* @@loghost.example.com
If using RELP, a line similar to the following should be present:
*.* :omrelp:loghost.example.com
Is it the case that none of these are present?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ensure_logrotate_activated_question:question:1">
<ns9:question_text>
To determine the status and frequency of logrotate, run the following command:
$ sudo grep logrotate /var/log/cron*
If logrotate is configured properly, output should include references to
/etc/cron.daily.
Is it the case that logrotate is not configured to run daily?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_auditd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
auditd service:
$ sudo service auditd status
If the service is enabled, it should return the following: auditd is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-bootloader_audit_argument_question:question:1">
<ns9:question_text>
Inspect the kernel boot arguments (which follow the word kernel) in
/etc/grub.conf. If they include audit=1, then
auditing is enabled at boot time.
Is it the case that auditing is not enabled at boot time?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_num_logs_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine how many logs the system is configured to retain after rotation:
$ sudo grep num_logs /etc/audit/auditd.conf
num_logs = 5
Is it the case that the system log file retention has not been properly configured?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine how much data the system will retain in each audit log file:
$ sudo grep max_log_file /etc/audit/auditd.conf
max_log_file = 6
Is it the case that the system audit data threshold has not been properly configured?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_max_log_file_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to rotate logs when they reach their
maximum size:
$ sudo grep max_log_file_action /etc/audit/auditd.conf
max_log_file_action rotate
Is it the case that the system has not been properly configured to rotate audit logs?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_space_left_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to email the administrator when
disk space is starting to run low:
$ sudo grep space_left_action /etc/audit/auditd.conf
space_left_action
Acceptable values are email, suspend, single, and halt.
Is it the case that the system is not configured to send an email to the system administrator when disk space is starting to run low?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_admin_space_left_action_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to either suspend, switch to single-user mode,
or halt when disk space has run low:
admin_space_left_action single
Is it the case that the system is not configured to switch to single-user mode for corrective action?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_action_mail_acct_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to send email to an
account when it needs to notify an administrator:
action_mail_acct = root
Is it the case that auditd is not configured to send emails per identified actions?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_data_retention_flush_question:question:1">
<ns9:question_text>
Inspect /etc/audit/auditd.conf and locate the following line to
determine if the system is configured to synchronize audit event data
with the log files on the disk:
$ sudo grep flush /etc/audit/auditd.conf
flush = DATA
Acceptable values are DATA, and SYNC. The setting is
case-insensitive.
Is it the case that auditd is not configured to synchronously write audit event data to disk?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-auditd_audispd_syslog_plugin_activated_question:question:1">
<ns9:question_text>
To verify the audispd's syslog plugin is active, run the following command:
$ sudo grep active /etc/audisp/plugins.d/syslog.conf
If the plugin is active, the output will show yes.
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_adjtimex_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the adjtimex
system call, run the following command:
preserve$ sudo grep "adjtimex" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_settimeofday_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the settimeofday
system call, run the following command:
preserve$ sudo grep "settimeofday" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_stime_question:question:1">
<ns9:question_text>
If the system is 64-bit only, this is not applicable.
To determine if the system is configured to audit calls to
the stime
system call, run the following command:
preserve$ sudo grep "stime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_clock_settime_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the clock_settime
system call, run the following command:
preserve$ sudo grep "clock_settime" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_time_watch_localtime_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit attempts to
alter time via the /etc/localtime file, run the following
command:
$ sudo auditctl -l | grep "watch=/etc/localtime"
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit time changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_usergroup_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit account changes,
run the following command:
auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow|/etc/security/opasswd)'
If the system is configured to watch for account changes, lines should be returned for
each file specified (and with perm=wa for each).
Is it the case that the system is not configured to audit account changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_networkconfig_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit changes to its network configuration,
run the following command:
auditctl -l | egrep '(/etc/issue|/etc/issue.net|/etc/hosts|/etc/sysconfig/network)'
If the system is configured to watch for network configuration changes, a line should be returned for
each file specified (and perm=wa should be indicated for each).
Is it the case that the system is not configured to audit changes of the network configuration?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_permissions_var_log_audit_question:question:1">
<ns9:question_text>
Run the following command to check the mode of the system audit logs:
$ sudo ls -l /var/log/audit
Audit logs must be mode 0640 or less permissive.
Is it the case that any are more permissive?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-file_ownership_var_log_audit_question:question:1">
<ns9:question_text>
To check the ownership of /var/log, run the command:
$ ls -lL /var/log
If properly configured, the output should indicate the following owner:
root
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_mac_modification_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit changes to its SELinux
configuration files, run the following command:
$ sudo auditctl -l | grep "dir=/etc/selinux"
If the system is configured to watch for changes to its SELinux
configuration, a line should be returned (including
perm=wa indicating permissions that are watched).
Is it the case that the system is not configured to audit attempts to change the MAC policy?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_chmod_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the chmod
system call, run the following command:
preserve$ sudo grep "chmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that the system is not configured to audit permission changes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_chown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the chown
system call, run the following command:
preserve$ sudo grep "chown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmod_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchmod
system call, run the following command:
preserve$ sudo grep "fchmod" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchmodat_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchmodat
system call, run the following command:
preserve$ sudo grep "fchmodat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchown
system call, run the following command:
preserve$ sudo grep "fchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fchownat_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fchownat
system call, run the following command:
preserve$ sudo grep "fchownat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fremovexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fremovexattr
system call, run the following command:
preserve$ sudo grep "fremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_fsetxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the fsetxattr
system call, run the following command:
preserve$ sudo grep "fsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lchown_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lchown
system call, run the following command:
preserve$ sudo grep "lchown" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lremovexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lremovexattr
system call, run the following command:
preserve$ sudo grep "lremovexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_lsetxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the lsetxattr
system call, run the following command:
preserve$ sudo grep "lsetxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_removexattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the removexattr
system call, run the following command:
preserve$ sudo grep "removexattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_dac_modification_setxattr_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the setxattr
system call, run the following command:
preserve$ sudo grep "setxattr" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_unsuccessful_file_modification_question:question:1">
<ns9:question_text>
To verify that the audit system collects unauthorized file accesses, run the following commands:
$ sudo grep EACCES /etc/audit/audit.rules
$ sudo grep EPERM /etc/audit/audit.rules
Is it the case that 32-bit and 64-bit system calls to creat, open, openat, open_by_handle_at, truncate, and ftruncate are not audited during EACCES and EPERM?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_privileged_commands_question:question:1">
<ns9:question_text>
To verify that auditing of privileged command use is configured, run the
following command for each local partition PART to find relevant
setuid / setgid programs:
$ sudo find PART -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null
Run the following command to verify entries in the audit rules for all programs
found with the previous command:
$ sudo grep path /etc/audit/audit.rules
It should be the case that all relevant setuid / setgid programs have a line
in the audit rules.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_media_export_question:question:1">
<ns9:question_text>
To verify that auditing is configured for all media exportation events, run the following command:
$ sudo auditctl -l | grep syscall | grep mount
Is it the case that there is not output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_file_deletion_events_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the unlink
system call, run the following command:
preserve$ sudo grep "unlink" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the unlinkat
system call, run the following command:
preserve$ sudo grep "unlinkat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the rename
system call, run the following command:
preserve$ sudo grep "rename" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the renameat
system call, run the following command:
preserve$ sudo grep "renameat" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_sysadmin_actions_question:question:1">
<ns9:question_text>
To verify that auditing is configured for system administrator actions, run the following command:
$ sudo auditctl -l | grep "watch=/etc/sudoers"
Is it the case that there is not output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-audit_rules_kernel_module_loading_question:question:1">
<ns9:question_text>
To determine if the system is configured to audit calls to
the init_module
system call, run the following command:
preserve$ sudo grep "init_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
To determine if the system is configured to audit calls to
the delete_module
system call, run the following command:
preserve$ sudo grep "delete_module" /etc/audit/audit.rules
If the system is configured to audit this activity, it will return a line.
Is it the case that no line is returned?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_xinetd_disabled_question:question:1">
<ns9:question_text>
If network services are using the xinetd service, this is not applicable.
To check that the xinetd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig xinetd --list
Output should indicate the xinetd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig xinetd --list
xinetd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify xinetd is disabled through current runtime configuration:
$ sudo service xinetd status
If the service is disabled the command will return the following output:
xinetd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_xinetd_removed_question:question:1">
<ns9:question_text>
If network services are using the xinetd service, this is not applicable.
Run the following command to determine if the xinetd package is installed:
$ rpm -q xinetd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_telnetd_disabled_question:question:1">
<ns9:question_text>
To check that the telnet service is disabled in system boot configuration, run the following command:
$ sudo chkconfig telnet --list
Output should indicate the telnet service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig telnet --list
telnet off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_telnet-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the telnet-server package is installed:
$ rpm -q telnet-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_telnet_removed_question:question:1">
<ns9:question_text>
The telnet package can be removed with the following command:
$ sudo yum erase telnet
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsh-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the rsh-server package is installed:
$ rpm -q rsh-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rexec_disabled_question:question:1">
<ns9:question_text>
To check that the rexec service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rexec --list
Output should indicate the rexec service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rexec --list
rexec off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rsh_disabled_question:question:1">
<ns9:question_text>
To check that the rsh service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rsh --list
Output should indicate the rsh service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rsh --list
rsh off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_rsh_removed_question:question:1">
<ns9:question_text>
The rsh package can be removed with the following command:
$ sudo yum erase rsh
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rlogin_disabled_question:question:1">
<ns9:question_text>
To check that the rlogin service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rlogin --list
Output should indicate the rlogin service has either not been installed, or has been disabled, as shown in the example below:
$ sudo chkconfig rlogin --list
rlogin off
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_rsh_trust_files_question:question:1">
<ns9:question_text>
The existence of the file /etc/hosts.equiv or a file named
.rhosts inside a user home directory indicates the presence
of an Rsh trust relationship.
Is it the case that these files exist?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_ypserv_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the ypserv package is installed:
$ rpm -q ypserv
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ypbind_disabled_question:question:1">
<ns9:question_text>
To check that the ypbind service is disabled in system boot configuration, run the following command:
$ sudo chkconfig ypbind --list
Output should indicate the ypbind service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig ypbind --list
ypbind 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify ypbind is disabled through current runtime configuration:
$ sudo service ypbind status
If the service is disabled the command will return the following output:
ypbind is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_ypbind_removed_question:question:1">
<ns9:question_text>
The ypbind package can be removed with the following command:
$ sudo yum erase ypbind
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_tftp_disabled_question:question:1">
<ns9:question_text>
To check that the tftp service is disabled in system boot configuration, run the following command:
$ sudo chkconfig tftp --list
Output should indicate the tftp service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig tftp --list
tftp 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify tftp is disabled through current runtime configuration:
$ sudo service tftp status
If the service is disabled the command will return the following output:
tftp is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_tftp-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the tftp-server package is installed:
$ rpm -q tftp-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_tftp_removed_question:question:1">
<ns9:question_text>
The tftp package can be removed with the following command:
$ sudo yum erase tftp
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-tftpd_uses_secure_mode_question:question:1">
<ns9:question_text>
If TFTP is not installed, this is not applicable. To determine if TFTP is installed,
run the following command:
$ rpm -qa | grep tftp
Verify tftp is configured by with the -s option by running the
following command:
grep "server_args" /etc/xinetd.d/tftp
The output should indicate the server_args variable is configured with the -s
flag, matching the example below:
$ grep "server_args" /etc/xinetd.d/tftp
server_args = -s /var/lib/tftpboot
Is it the case that this flag is missing?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_talk-server_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the talk-server package is installed:
$ rpm -q talk-server
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_talk_removed_question:question:1">
<ns9:question_text>
The talk package can be removed with the following command:
$ sudo yum erase talk
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_abrtd_disabled_question:question:1">
<ns9:question_text>
To check that the abrtd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig abrtd --list
Output should indicate the abrtd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig abrtd --list
abrtd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify abrtd is disabled through current runtime configuration:
$ sudo service abrtd status
If the service is disabled the command will return the following output:
abrtd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_acpid_disabled_question:question:1">
<ns9:question_text>
To check that the acpid service is disabled in system boot configuration, run the following command:
$ sudo chkconfig acpid --list
Output should indicate the acpid service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig acpid --list
acpid 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify acpid is disabled through current runtime configuration:
$ sudo service acpid status
If the service is disabled the command will return the following output:
acpid is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_certmonger_disabled_question:question:1">
<ns9:question_text>
To check that the certmonger service is disabled in system boot configuration, run the following command:
$ sudo chkconfig certmonger --list
Output should indicate the certmonger service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig certmonger --list
certmonger 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify certmonger is disabled through current runtime configuration:
$ sudo service certmonger status
If the service is disabled the command will return the following output:
certmonger is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cgconfig_disabled_question:question:1">
<ns9:question_text>
To check that the cgconfig service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cgconfig --list
Output should indicate the cgconfig service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cgconfig --list
cgconfig 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cgconfig is disabled through current runtime configuration:
$ sudo service cgconfig status
If the service is disabled the command will return the following output:
cgconfig is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cgred_disabled_question:question:1">
<ns9:question_text>
To check that the cgred service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cgred --list
Output should indicate the cgred service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cgred --list
cgred 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cgred is disabled through current runtime configuration:
$ sudo service cgred status
If the service is disabled the command will return the following output:
cgred is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cpuspeed_disabled_question:question:1">
<ns9:question_text>
To check that the cpuspeed service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cpuspeed --list
Output should indicate the cpuspeed service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cpuspeed --list
cpuspeed 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cpuspeed is disabled through current runtime configuration:
$ sudo service cpuspeed status
If the service is disabled the command will return the following output:
cpuspeed is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_haldaemon_disabled_question:question:1">
<ns9:question_text>
To check that the haldaemon service is disabled in system boot configuration, run the following command:
$ sudo chkconfig haldaemon --list
Output should indicate the haldaemon service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig haldaemon --list
haldaemon 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify haldaemon is disabled through current runtime configuration:
$ sudo service haldaemon status
If the service is disabled the command will return the following output:
haldaemon is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_irqbalance_enabled_question:question:1">
<ns9:question_text>
To check that the irqbalance service is disabled in system boot configuration, run the following command:
$ sudo chkconfig irqbalance --list
Output should indicate the irqbalance service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig irqbalance --list
irqbalance 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify irqbalance is disabled through current runtime configuration:
$ sudo service irqbalance status
If the service is disabled the command will return the following output:
irqbalance is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_kdump_disabled_question:question:1">
<ns9:question_text>
To check that the kdump service is disabled in system boot configuration, run the following command:
$ sudo chkconfig kdump --list
Output should indicate the kdump service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig kdump --list
kdump 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify kdump is disabled through current runtime configuration:
$ sudo service kdump status
If the service is disabled the command will return the following output:
kdump is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_mdmonitor_disabled_question:question:1">
<ns9:question_text>
To check that the mdmonitor service is disabled in system boot configuration, run the following command:
$ sudo chkconfig mdmonitor --list
Output should indicate the mdmonitor service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig mdmonitor --list
mdmonitor 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify mdmonitor is disabled through current runtime configuration:
$ sudo service mdmonitor status
If the service is disabled the command will return the following output:
mdmonitor is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_messagebus_disabled_question:question:1">
<ns9:question_text>
To check that the messagebus service is disabled in system boot configuration, run the following command:
$ sudo chkconfig messagebus --list
Output should indicate the messagebus service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig messagebus --list
messagebus 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify messagebus is disabled through current runtime configuration:
$ sudo service messagebus status
If the service is disabled the command will return the following output:
messagebus is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_netconsole_disabled_question:question:1">
<ns9:question_text>
To check that the netconsole service is disabled in system boot configuration, run the following command:
$ sudo chkconfig netconsole --list
Output should indicate the netconsole service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig netconsole --list
netconsole 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify netconsole is disabled through current runtime configuration:
$ sudo service netconsole status
If the service is disabled the command will return the following output:
netconsole is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ntpdate_disabled_question:question:1">
<ns9:question_text>
To check that the ntpdate service is disabled in system boot configuration, run the following command:
$ sudo chkconfig ntpdate --list
Output should indicate the ntpdate service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig ntpdate --list
ntpdate 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify ntpdate is disabled through current runtime configuration:
$ sudo service ntpdate status
If the service is disabled the command will return the following output:
ntpdate is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_oddjobd_disabled_question:question:1">
<ns9:question_text>
To check that the oddjobd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig oddjobd --list
Output should indicate the oddjobd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig oddjobd --list
oddjobd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify oddjobd is disabled through current runtime configuration:
$ sudo service oddjobd status
If the service is disabled the command will return the following output:
oddjobd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_portreserve_disabled_question:question:1">
<ns9:question_text>
To check that the portreserve service is disabled in system boot configuration, run the following command:
$ sudo chkconfig portreserve --list
Output should indicate the portreserve service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig portreserve --list
portreserve 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify portreserve is disabled through current runtime configuration:
$ sudo service portreserve status
If the service is disabled the command will return the following output:
portreserve is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_psacct_enabled_question:question:1">
<ns9:question_text>
To check that the psacct service is disabled in system boot configuration, run the following command:
$ sudo chkconfig psacct --list
Output should indicate the psacct service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig psacct --list
psacct 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify psacct is disabled through current runtime configuration:
$ sudo service psacct status
If the service is disabled the command will return the following output:
psacct is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_qpidd_disabled_question:question:1">
<ns9:question_text>
To check that the qpidd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig qpidd --list
Output should indicate the qpidd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig qpidd --list
qpidd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify qpidd is disabled through current runtime configuration:
$ sudo service qpidd status
If the service is disabled the command will return the following output:
qpidd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_quota_nld_disabled_question:question:1">
<ns9:question_text>
To check that the quota_nld service is disabled in system boot configuration, run the following command:
$ sudo chkconfig quota_nld --list
Output should indicate the quota_nld service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig quota_nld --list
quota_nld 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify quota_nld is disabled through current runtime configuration:
$ sudo service quota_nld status
If the service is disabled the command will return the following output:
quota_nld is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rdisc_disabled_question:question:1">
<ns9:question_text>
To check that the rdisc service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rdisc --list
Output should indicate the rdisc service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rdisc --list
rdisc 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rdisc is disabled through current runtime configuration:
$ sudo service rdisc status
If the service is disabled the command will return the following output:
rdisc is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rhnsd_disabled_question:question:1">
<ns9:question_text>
To check that the rhnsd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rhnsd --list
Output should indicate the rhnsd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rhnsd --list
rhnsd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rhnsd is disabled through current runtime configuration:
$ sudo service rhnsd status
If the service is disabled the command will return the following output:
rhnsd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rhsmcertd_disabled_question:question:1">
<ns9:question_text>
To check that the rhsmcertd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rhsmcertd --list
Output should indicate the rhsmcertd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rhsmcertd --list
rhsmcertd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rhsmcertd is disabled through current runtime configuration:
$ sudo service rhsmcertd status
If the service is disabled the command will return the following output:
rhsmcertd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_saslauthd_disabled_question:question:1">
<ns9:question_text>
To check that the saslauthd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig saslauthd --list
Output should indicate the saslauthd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig saslauthd --list
saslauthd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify saslauthd is disabled through current runtime configuration:
$ sudo service saslauthd status
If the service is disabled the command will return the following output:
saslauthd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_smartd_disabled_question:question:1">
<ns9:question_text>
To check that the smartd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig smartd --list
Output should indicate the smartd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig smartd --list
smartd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify smartd is disabled through current runtime configuration:
$ sudo service smartd status
If the service is disabled the command will return the following output:
smartd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_sysstat_disabled_question:question:1">
<ns9:question_text>
To check that the sysstat service is disabled in system boot configuration, run the following command:
$ sudo chkconfig sysstat --list
Output should indicate the sysstat service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig sysstat --list
sysstat 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify sysstat is disabled through current runtime configuration:
$ sudo service sysstat status
If the service is disabled the command will return the following output:
sysstat is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_crond_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
crond service:
$ sudo service crond status
If the service is enabled, it should return the following: crond is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_anacron_question:question:1">
<ns9:question_text>
Run the following command to determine if the cronie-anacron package is installed:
$ rpm -q cronie-anacron
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_atd_disabled_question:question:1">
<ns9:question_text>
To check that the atd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig atd --list
Output should indicate the atd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig atd --list
atd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify atd is disabled through current runtime configuration:
$ sudo service atd status
If the service is disabled the command will return the following output:
atd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_allow_only_protocol2_question:question:1">
<ns9:question_text>
To check which SSH protocol version is allowed, run the following command:
$ sudo grep Protocol /etc/ssh/sshd_config
If configured properly, output should be Protocol 2
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_set_idle_timeout_question:question:1">
<ns9:question_text>
Run the following command to see what the timeout interval is:
$ sudo grep ClientAliveInterval /etc/ssh/sshd_config
If properly configured, the output should be:
ClientAliveInterval 900
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_set_keepalive_question:question:1">
<ns9:question_text>
To ensure the SSH idle timeout will occur when the ClientAliveCountMax is set, run the following command:
$ sudo grep ClientAliveCountMax /etc/ssh/sshd_config
If properly configured, output should be:
ClientAliveCountMax 0
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_rhosts_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
IgnoreRhosts
option is set, run the following command:
preserve$ sudo grep -i IgnoreRhosts /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
yes is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-disable_host_auth_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
HostbasedAuthentication
option is set, run the following command:
preserve$ sudo grep -i HostbasedAuthentication /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_root_login_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
PermitRootLogin
option is set, run the following command:
preserve$ sudo grep -i PermitRootLogin /etc/ssh/sshd_config
If a line indicating no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_disable_empty_passwords_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
PermitEmptyPasswords
option is set, run the following command:
preserve$ sudo grep -i PermitEmptyPasswords /etc/ssh/sshd_config
If no line, a commented line, or a line indicating the value
no is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_enable_warning_banner_question:question:1">
<ns9:question_text>
To determine how the SSH daemon's
Banner
option is set, run the following command:
preserve$ sudo grep -i Banner /etc/ssh/sshd_config
If a line indicating /etc/issue is returned, then the required value is set.
Is it the case that the required value is not set?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_do_not_permit_user_env_question:question:1">
<ns9:question_text>
To ensure users are not able to present environment daemons, run the following command:
$ sudo grep PermitUserEnvironment /etc/ssh/sshd_config
If properly configured, output should be:
PermitUserEnvironment no
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_use_approved_ciphers_question:question:1">
<ns9:question_text>
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved
ciphers are in use, run the following command:
$ sudo grep Ciphers /etc/ssh/sshd_config
The output should contain only those ciphers which are FIPS-approved, namely, the
AES and 3DES ciphers.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sshd_use_approved_macs_question:question:1">
<ns9:question_text>
Only FIPS-approved MACs should be used. To verify that only FIPS-approved
MACs are in use, run the following command:
$ sudo grep -i macs /etc/ssh/sshd_config
The output should contain only those MACs which are FIPS-approved, namely,
hmac-sha2-512, hmac-sha2-256, and hmac-sha1 hash functions.
Is it the case that that is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_sssd_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the sssd package is installed:
$ rpm -q sssd
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_sssd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
sssd service:
$ systemctl is-active sssd
If the service is running, it should return the following: active
Is it the case that the service is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_memcache_timeout_question:question:1">
<ns9:question_text>
To verify that SSSD's in-memory cache expires after a day, run the following command:
$ sudo grep memcache_timeout /etc/sssd/sssd.conf
If configured properly, output should be memcache_timeout = 86400.
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_offline_cred_expiration_question:question:1">
<ns9:question_text>
To verify that SSSD expires offline credentials, run the following command:
$ sudo grep offline_credentials_expiration
If configured properly, output should be
offline_credentials_expiration = 1
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sssd_ssh_known_hosts_timeout_question:question:1">
<ns9:question_text>
To verify that SSSD expires known SSH host keys, run the following command:
$ sudo grep ssh_known_hosts_timeout
If configured properly, output should be
ssh_known_hosts_timeout = 86400
Is it the case that it does not exist or is not configured properly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-xwindows_runlevel_setting_question:question:1">
<ns9:question_text>
To verify the default runlevel is 3, run the following command:
$ grep initdefault /etc/inittab
The output should show the following:
id:3:initdefault:
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_xorg-x11-server-common_removed_question:question:1">
<ns9:question_text>
To ensure the X Windows package group is removed, run the following command:
$ rpm -qi xorg-x11-server-common
The output should be:
package xorg-x11-server-common is not installed
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_avahi-daemon_disabled_question:question:1">
<ns9:question_text>
To check that the avahi-daemon service is disabled in system boot configuration, run the following command:
$ sudo chkconfig avahi-daemon --list
Output should indicate the avahi-daemon service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig avahi-daemon --list
avahi-daemon 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify avahi-daemon is disabled through current runtime configuration:
$ sudo service avahi-daemon status
If the service is disabled the command will return the following output:
avahi-daemon is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_cups_disabled_question:question:1">
<ns9:question_text>
To check that the cups service is disabled in system boot configuration, run the following command:
$ sudo chkconfig cups --list
Output should indicate the cups service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig cups --list
cups 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify cups is disabled through current runtime configuration:
$ sudo service cups status
If the service is disabled the command will return the following output:
cups is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_dhcpd_disabled_question:question:1">
<ns9:question_text>
To check that the dhcpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig dhcpd --list
Output should indicate the dhcpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig dhcpd --list
dhcpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify dhcpd is disabled through current runtime configuration:
$ sudo service dhcpd status
If the service is disabled the command will return the following output:
dhcpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dhcp_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dhcp package is installed:
$ rpm -q dhcp
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-sysconfig_networking_bootproto_ifcfg_question:question:1">
<ns9:question_text>
To verify that DHCP is not being used, examine the following file for each interface:
# /etc/sysconfig/network-scripts/ifcfg-interface
Look for the following:
BOOTPROTO=none
and the following, substituting the appropriate values based on your site's addressing scheme:
NETMASK=255.255.255.0
IPADDR=192.168.1.2
GATEWAY=192.168.1.1
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_ntpd_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
ntpd service:
$ sudo service ntpd status
If the service is enabled, it should return the following: ntpd is running...
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ntpd_specify_remote_server_question:question:1">
<ns9:question_text>
To verify that a remote NTP service is configured for time synchronization,
open the following file:
/etc/ntp.conf
In the file, there should be a section similar to the following:
server ntpserver
Is it the case that this is not the case?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_postfix_enabled_question:question:1">
<ns9:question_text>
Run the following command to determine the current status of the
postfix service:
$ sudo service postfix status
If the service is enabled, it should return the following: postfix is running...
Is it the case that the system is not a cross domain solution and the service is not enabled?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_sendmail_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the sendmail package is installed:
$ rpm -q sendmail
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-postfix_network_listening_disabled_question:question:1">
<ns9:question_text>
Run the following command to ensure postfix accepts mail messages from only the local system:
$ grep inet_interfaces /etc/postfix/main.cf
If properly configured, the output should show only localhost.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ldap_client_start_tls_question:question:1">
<ns9:question_text>
To ensure LDAP is configured to use TLS for all transactions, run the following command:
$ grep start_tls /etc/pam_ldap.conf
The result should contain:
ssl start_tls
Is it the case that LDAP is not in use, the line is commented out, or not configured correctly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ldap_client_tls_cacertpath_question:question:1">
<ns9:question_text>
To ensure TLS is configured with trust certificates, run the following command:
$ grep cert /etc/pam_ldap.conf
The result should return either
tls_cacertdir /etc/pki/tls/CA
or
tls_cacertfile /etc/pki/tls/CA/cacert.pem
Is it the case that LDAP is not in use, the line is commented out, or not configured correctly?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_openldap-servers_removed_question:question:1">
<ns9:question_text>
To verify the openldap-servers package is not installed,
run the following command:
$ rpm -q openldap-servers
The output should show the following:
package openldap-servers is not installed
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-nfs_no_anonymous_question:question:1">
<ns9:question_text>
Inspect the mounts configured in /etc/exports. Each mount should specify a value
greater than UID_MAX and GID_MAX as defined in /etc/login.defs.
Is it the case that anonuid or anongid are not set to a value greater than UID_MAX (for anonuid) and GID_MAX (for anongid)?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_nfs_disabled_question:question:1">
<ns9:question_text>
It is prudent to ensure the nfs service is disabled in system boot, as well as
not currently running. First, run the following to verify the service is stopped:
$ service nfs status
If the service is stopped or disabled, it will return the following:
rpc.svcgssd is stopped
rpc.mountd is stopped
nfsd is stopped
rpc.rquotad is stopped
To verify that the nfs service is disabled, run the following command:
$ chkconfig --list nfs
If properly configured, the output should look like:
nfs 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_rpcsvcgssd_disabled_question:question:1">
<ns9:question_text>
To check that the rpcsvcgssd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig rpcsvcgssd --list
Output should indicate the rpcsvcgssd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig rpcsvcgssd --list
rpcsvcgssd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify rpcsvcgssd is disabled through current runtime configuration:
$ sudo service rpcsvcgssd status
If the service is disabled the command will return the following output:
rpcsvcgssd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_nodev_remote_filesystems_question:question:1">
<ns9:question_text>
To verify the nodev option is configured for all NFS mounts, run the following command:
$ mount | grep nfs
All NFS mounts should show the nodev setting in parentheses. This is not applicable if NFS is
not implemented.
Is it the case that the setting does not show?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_nosuid_remote_filesystems_question:question:1">
<ns9:question_text>
To verify the nosuid option is configured for all NFS mounts, run the following command:
$ mount | grep nfs
All NFS mounts should show the nosuid setting in parentheses. This is not applicable if NFS is
not implemented.
Is it the case that the setting does not show?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-no_insecure_locks_exports_question:question:1">
<ns9:question_text>
To verify insecure file locking has been disabled, run the following command:
$ grep insecure_locks /etc/exports
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_named_disabled_question:question:1">
<ns9:question_text>
To check that the named service is disabled in system boot configuration, run the following command:
$ sudo chkconfig named --list
Output should indicate the named service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig named --list
named 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify named is disabled through current runtime configuration:
$ sudo service named status
If the service is disabled the command will return the following output:
named is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_bind_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the bind package is installed:
$ rpm -q bind
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_vsftpd_disabled_question:question:1">
<ns9:question_text>
To check that the vsftpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig vsftpd --list
Output should indicate the vsftpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig vsftpd --list
vsftpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify vsftpd is disabled through current runtime configuration:
$ sudo service vsftpd status
If the service is disabled the command will return the following output:
vsftpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_vsftpd_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the vsftpd package is installed:
$ rpm -q vsftpd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ftp_log_transactions_question:question:1">
<ns9:question_text>
Find if logging is applied to the FTP daemon.
Procedures:
If vsftpd is started by xinetd the following command will indicate the xinetd.d startup file:
$ grep vsftpd /etc/xinetd.d/*
$ grep server_args vsftpd xinetd.d startup file
This will indicate the vsftpd config file used when starting through xinetd.
If the server_args line is missing or does not include the vsftpd configuration file, then the default config file (/etc/vsftpd/vsftpd.conf) is used.
$ sudo grep xferlog_enable vsftpd config file
Is it the case that xferlog_enable is missing, or is not set to yes?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-ftp_present_banner_question:question:1">
<ns9:question_text>
If FTP services are not installed, this is not applicable.
To verify this configuration, run the following command:
grep "banner_file" /etc/vsftpd/vsftpd.conf
The output should show the value of banner_file is set to /etc/issue, an example of which is shown below:
$ sudo grep "banner_file" /etc/vsftpd/vsftpd.conf
banner_file=/etc/issue
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_httpd_disabled_question:question:1">
<ns9:question_text>
To check that the httpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig httpd --list
Output should indicate the httpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig httpd --list
httpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify httpd is disabled through current runtime configuration:
$ sudo service httpd status
If the service is disabled the command will return the following output:
httpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_httpd_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the httpd package is installed:
$ rpm -q httpd
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_dovecot_disabled_question:question:1">
<ns9:question_text>
To check that the dovecot service is disabled in system boot configuration, run the following command:
$ sudo chkconfig dovecot --list
Output should indicate the dovecot service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig dovecot --list
dovecot 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify dovecot is disabled through current runtime configuration:
$ sudo service dovecot status
If the service is disabled the command will return the following output:
dovecot is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_dovecot_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the dovecot package is installed:
$ rpm -q dovecot
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_smb_disabled_question:question:1">
<ns9:question_text>
To check that the smb service is disabled in system boot configuration, run the following command:
$ sudo chkconfig smb --list
Output should indicate the smb service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig smb --list
smb 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify smb is disabled through current runtime configuration:
$ sudo service smb status
If the service is disabled the command will return the following output:
smb is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_samba_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the samba package is installed:
$ rpm -q samba
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_samba-common_installed_question:question:1">
<ns9:question_text>
Run the following command to determine if the samba-common package is installed:
$ rpm -q samba-common
Is it the case that the package is not installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-require_smb_client_signing_question:question:1">
<ns9:question_text>
To verify that Samba clients running smbclient must use packet signing, run the following command:
$ grep signing /etc/samba/smb.conf
The output should show:
client signing = mandatory
Is it the case that it is not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-mount_option_smb_client_signing_question:question:1">
<ns9:question_text>
To verify that Samba clients using mount.cifs must use packet signing, run the following command:
$ grep sec /etc/fstab
The output should show either krb5i or ntlmv2i in use.
Is it the case that it does not?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_squid_disabled_question:question:1">
<ns9:question_text>
To check that the squid service is disabled in system boot configuration, run the following command:
$ sudo chkconfig squid --list
Output should indicate the squid service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig squid --list
squid 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify squid is disabled through current runtime configuration:
$ sudo service squid status
If the service is disabled the command will return the following output:
squid is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_squid_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the squid package is installed:
$ rpm -q squid
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-service_snmpd_disabled_question:question:1">
<ns9:question_text>
To check that the snmpd service is disabled in system boot configuration, run the following command:
$ sudo chkconfig snmpd --list
Output should indicate the snmpd service has either not been installed,
or has been disabled at all runlevels, as shown in the example below:
$ sudo chkconfig snmpd --list
snmpd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Run the following command to verify snmpd is disabled through current runtime configuration:
$ sudo service snmpd status
If the service is disabled the command will return the following output:
snmpd is stopped
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-package_net-snmp_removed_question:question:1">
<ns9:question_text>
Run the following command to determine if the net-snmp package is installed:
$ rpm -q net-snmp
Is it the case that the package is installed?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-snmpd_use_newer_protocol_question:question:1">
<ns9:question_text>
To ensure only SNMPv3 or newer is used, run the following command:
$ sudo grep 'rocommunity\|rwcommunity\|com2sec' /etc/snmp/snmpd.conf | grep -v "^#"
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-snmpd_not_default_password_question:question:1">
<ns9:question_text>
To ensure the default password is not set, run the following command:
$ sudo grep -v "^#" /etc/snmp/snmpd.conf| grep public
There should be no output.
Is it the case that there is output?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_generic_question:question:1">
<ns9:question_text>RHEL6 supports this requirement and cannot be configured to be out of
compliance. This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_auditing_question:question:1">
<ns9:question_text>The RHEL6 auditing system supports this requirement and cannot be configured to be out of
compliance. Every audit record in RHEL includes a timestamp, the operation attempted,
success or failure of the operation, the subject involved (executable/process),
the object involved (file/path), and security labels for the subject and object.
It also includes the ability to label events with custom key labels. The auditing system
centralizes the recording of audit events for the entire system and includes
reduction (ausearch), reporting (aureport), and real-time
response (audispd) facilities.
This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-met_inherently_nonselected_question:question:1">
<ns9:question_text>RHEL6 supports this requirement and cannot be configured to be out of
compliance. This is a permanent not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_nonfinding_nonselected_scope_question:question:1">
<ns9:question_text>
RHEL6 cannot support this requirement without assistance from an external
application, policy, or service. This requirement is NA.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_finding_nonselected_question:question:1">
<ns9:question_text>
This is a permanent finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-unmet_nonfinding_scope_question:question:1">
<ns9:question_text>
RHEL6 cannot support this requirement without assistance from an external
application, policy, or service. This requirement is NA.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
<ns9:boolean_question id="ocil:ssg-update_process_question:question:1">
<ns9:question_text>
Ask an administrator if a process exists to promptly and automatically apply OS
software updates. If such a process does not exist, this is a finding.
If the OS update process limits automatic updates of software packages, where
such updates would impede normal system operation, to scheduled maintenance
windows, but still within IAVM-dictated timeframes, this is not a finding.
Is it the case that ?
</ns9:question_text>
</ns9:boolean_question>
</ns9:questions>
</ns9:ocil>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_output--ssg-rhel6-pcidss-xccdf-1.2.xml" timestamp="2017-08-11T21:23:34">
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_PCIDSS-RHEL-6" resolved="1" style="SCAP_1.2" xml:lang="en-US">
<ns10:status date="2017-08-11">draft</ns10:status>
<ns10:title xml:lang="en-US">Guide to the Secure Configuration of Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">This guide presents a catalog of security-relevant
configuration settings for Red Hat Enterprise Linux 6. It is a rendering of
content structured in the eXtensible Configuration Checklist Description Format (XCCDF)
in order to support security automation. The SCAP content is
is available in the <html:code>scap-security-guide</html:code> package which is developed at
<html:a href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a>.
<html:br />
<html:br />
Providing system administrators with such guidance informs them how to securely
configure systems under their control in a variety of network roles. Policy
makers and baseline creators can use this catalog of settings, with its
associated references to higher-level security control catalogs, in order to
assist them in security baseline creation. This guide is a <html:i>catalog, not a
checklist,</html:i> and satisfaction of every item is not likely to be possible or
sensible in many operational scenarios. However, the XCCDF format enables
granular selection and adjustment of settings, and their association with OVAL
and OCIL content provides an automated checking capability. Transformations of
this document, and its associated automated checking content, are capable of
providing baselines that meet a diverse set of policy objectives. Some example
XCCDF <html:i>Profiles</html:i>, which are selections of items that form checklists and
can be used as baselines, are available with this guide. They can be
processed, in an automated fashion, with tools that support the Security
Content Automation Protocol (SCAP). The DISA STIG for Red Hat Enterprise Linux 6,
which provides required settings for US Department of Defense systems, is
one example of a baseline created from this guidance.
</ns10:description>
<ns10:notice id="centos_warning"><html:div>
<html:p>This benchmark is a direct port of a <html:i>SCAP Security Guide </html:i> benchmark developed for <html:i>Red Hat Enterprise Linux</html:i>. It has been modified through an automated process to remove specific dependencies on <html:i>Red Hat Enterprise Linux</html:i> and to function with <html:i>CentOS</html:i>. The result is a generally useful <html:i>SCAP Security Guide</html:i> benchmark with the following caveats:</html:p>
<html:ul>
<html:li><html:i>CentOS</html:i> is not an exact copy of <html:i>Red Hat Enterprise Linux</html:i>. There may be configuration differences that produce false positives and/or false negatives. If this occurs please file a bug report.</html:li>
<html:li><html:i>CentOS</html:i> has its own build system, compiler options, patchsets, and is a community supported, non-commercial operating system. <html:i>CentOS</html:i> does not inherit certifications or evaluations from <html:i>Red Hat Enterprise Linux</html:i>. As such, some configuration rules (such as those requiring <html:i>FIPS 140-2</html:i> encryption) will continue to fail on <html:i>CentOS</html:i>.</html:li>
</html:ul>
<html:p>Members of the <html:i>CentOS</html:i> community are invited to participate in <html:a href="http://open-scap.org">OpenSCAP</html:a> and <html:a href="https://github.com/OpenSCAP/scap-security-guide">SCAP Security Guide</html:a> development. Bug reports and patches can be sent to GitHub: <html:a href="https://github.com/OpenSCAP/scap-security-guide">https://github.com/OpenSCAP/scap-security-guide</html:a>. The mailing list is at <html:a href="https://fedorahosted.org/mailman/listinfo/scap-security-guide">https://fedorahosted.org/mailman/listinfo/scap-security-guide</html:a>.</html:p></html:div></ns10:notice>
<ns10:notice id="terms_of_use" xml:lang="en-US">Do not attempt to implement any of the settings in
this guide without first testing them in a non-operational environment. The
creators of this guidance assume no responsibility whatsoever for its use by
other parties, and makes no guarantees, expressed or implied, about its
quality, reliability, or any other characteristic.</ns10:notice>
<ns10:front-matter xml:lang="en-US">The SCAP Security Guide Project<html:br />
<html:a href="https://www.open-scap.org/security-policies/scap-security-guide">https://www.open-scap.org/security-policies/scap-security-guide</html:a></ns10:front-matter>
<ns10:rear-matter xml:lang="en-US">Red Hat and Red Hat Enterprise Linux are either registered
trademarks or trademarks of Red Hat, Inc. in the United States and other
countries. All other names are registered trademarks or trademarks of their
respective companies.</ns10:rear-matter>
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6" />
<ns10:platform idref="cpe:/o:centos:centos:6" />
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6::client" />
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:6::computenode" />
<ns10:version update="https://github.com/OpenSCAP/scap-security-guide/releases/latest">0.1.31</ns10:version>
<ns10:metadata>
<dc:publisher>SCAP Security Guide Project</dc:publisher>
<dc:creator>SCAP Security Guide Project</dc:creator>
<dc:contributor>Gabe Alford <redhatrises@gmail.com></dc:contributor>
<dc:contributor>Christopher Anderson <cba@fedoraproject.org></dc:contributor>
<dc:contributor>Chuck Atkins <chuck.atkins@kitware.com></dc:contributor>
<dc:contributor>Molly Jo Bault <Molly.Jo.Bault@ballardtech.com></dc:contributor>
<dc:contributor>Joseph Bisch <joseph.bisch@gmail.com></dc:contributor>
<dc:contributor>Jeffrey Blank <blank@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Blake Burkhart <blake.burkhart@us.af.mil></dc:contributor>
<dc:contributor>Patrick Callahan <pmc@patrickcallahan.com></dc:contributor>
<dc:contributor>Nick Carboni <ncarboni@redhat.com></dc:contributor>
<dc:contributor>Frank Caviggia <fcaviggi@ra.iad.redhat.com></dc:contributor>
<dc:contributor>Eric Christensen <echriste@redhat.com></dc:contributor>
<dc:contributor>Caleb Cooper <coopercd@ornl.gov></dc:contributor>
<dc:contributor>Maura Dailey <maura@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Klaas Demter <demter@atix.de></dc:contributor>
<dc:contributor>Jean-Baptiste Donnette <jean-baptiste.donnette@epita.fr></dc:contributor>
<dc:contributor>drax <applezip@gmail.com></dc:contributor>
<dc:contributor>Greg Elin <gregelin@gitmachines.com></dc:contributor>
<dc:contributor>Andrew Gilmore <agilmore2@gmail.com></dc:contributor>
<dc:contributor>Joshua Glemza <jglemza@nasa.gov></dc:contributor>
<dc:contributor>Steve Grubb <sgrubb@redhat.com></dc:contributor>
<dc:contributor>Trey Henefield <thenefield@gmail.com></dc:contributor>
<dc:contributor>Robin Price II <robin@redhat.com></dc:contributor>
<dc:contributor>Jeremiah Jahn <jeremiah@goodinassociates.com></dc:contributor>
<dc:contributor>Stephan Joerrens <Stephan.Joerrens@fiduciagad.de></dc:contributor>
<dc:contributor>Yuli Khodorkovskiy <ykhodorkovskiy@tresys.com></dc:contributor>
<dc:contributor>Luke Kordell <luke.t.kordell@lmco.com></dc:contributor>
<dc:contributor>kspargur <kspargur@kspargur.csb></dc:contributor>
<dc:contributor>Fen Labalme <fen@civicactions.com></dc:contributor>
<dc:contributor>Jan Lieskovsky <jlieskov@redhat.com></dc:contributor>
<dc:contributor>Šimon Lukašík <slukasik@redhat.com></dc:contributor>
<dc:contributor>Jamie Lorwey Martin <jlmartin@redhat.com></dc:contributor>
<dc:contributor>Michael McConachie <michael@redhat.com></dc:contributor>
<dc:contributor>Rodney Mercer <rmercer@harris.com></dc:contributor>
<dc:contributor>Brian Millett <bmillett@gmail.com></dc:contributor>
<dc:contributor>mmosel <mmosel@kde.example.com></dc:contributor>
<dc:contributor>Zbynek Moravec <zmoravec@redhat.com></dc:contributor>
<dc:contributor>Kazuo Moriwaka <moriwaka@users.noreply.github.com></dc:contributor>
<dc:contributor>Michael Moseley <michael@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Joe Nall <joe@nall.com></dc:contributor>
<dc:contributor>Michele Newman <mnewman@redhat.com></dc:contributor>
<dc:contributor>Kaustubh Padegaonkar <theTuxRacer@gmail.com></dc:contributor>
<dc:contributor>Michael Palmiotto <mpalmiotto@tresys.com></dc:contributor>
<dc:contributor>pcactr <paul.c.arnold4.ctr@mail.mil></dc:contributor>
<dc:contributor>Kenneth Peeples <kennethwpeeples@gmail.com></dc:contributor>
<dc:contributor>Frank Lin PIAT <fpiat@klabs.be></dc:contributor>
<dc:contributor>Martin Preisler <mpreisle@redhat.com></dc:contributor>
<dc:contributor>T.O. Radzy Radzykewycz <radzy@windriver.com></dc:contributor>
<dc:contributor>Rick Renshaw <Richard_Renshaw@xtoenergy.com></dc:contributor>
<dc:contributor>Chris Reynolds <c.reynolds82@gmail.com></dc:contributor>
<dc:contributor>Pat Riehecky <riehecky@fnal.gov></dc:contributor>
<dc:contributor>Joshua Roys <roysjosh@gmail.com></dc:contributor>
<dc:contributor>rrenshaw <bofh69@yahoo.com></dc:contributor>
<dc:contributor>Ray Shaw (Cont ARL/CISD) rvshaw <rvshaw@esme.arl.army.mil></dc:contributor>
<dc:contributor>Willy Santos <wsantos@redhat.com></dc:contributor>
<dc:contributor>Gautam Satish <gautams@hpe.com></dc:contributor>
<dc:contributor>Watson Sato <wsato@redhat.com></dc:contributor>
<dc:contributor>Satoru SATOH <satoru.satoh@gmail.com></dc:contributor>
<dc:contributor>Spencer Shimko <sshimko@tresys.com></dc:contributor>
<dc:contributor>Francisco Slavin <fslavin@tresys.com></dc:contributor>
<dc:contributor>David Smith <dsmith@eclipse.ncsc.mil></dc:contributor>
<dc:contributor>Kevin Spargur <kspargur@redhat.com></dc:contributor>
<dc:contributor>Kenneth Stailey <kstailey.lists@gmail.com></dc:contributor>
<dc:contributor>Leland Steinke <leland.j.steinke.ctr@mail.mil></dc:contributor>
<dc:contributor>Philippe Thierry <phil@reseau-libre.net></dc:contributor>
<dc:contributor>Paul Tittle <ptittle@cmf.nrl.navy.mil></dc:contributor>
<dc:contributor>Jeb Trayer <jeb.d.trayer@uscg.mil></dc:contributor>
<dc:contributor>Shawn Wells <shawn@redhat.com></dc:contributor>
<dc:contributor>Rob Wilmoth <rwilmoth@redhat.com></dc:contributor>
<dc:contributor>Lucas Yamanishi <lucas.yamanishi@onyxpoint.com></dc:contributor>
<dc:contributor>Kevin Zimmerman <kevin.zimmerman@kitware.com></dc:contributor>
<dc:contributor>Jan Černý <jcerny@redhat.com></dc:contributor>
<dc:contributor>Michal Šrubař <msrubar@redhat.com></dc:contributor>
<dc:source>https://github.com/OpenSCAP/scap-security-guide/releases/latest</dc:source>
</ns10:metadata>
<ns10:model system="urn:xccdf:scoring:default" />
<ns10:Profile id="xccdf_org.ssgproject.content_profile_pci-dss_centric">
<ns10:title xml:lang="en-US">PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">This is a *draft* profile for PCI-DSS v3</ns10:description>
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_install_hids" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_disable_prelink" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_build_database" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_unique_name" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_minlen" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="true" />
<ns10:select idref="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="true" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" selector="4" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" selector="90" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" selector="6" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" selector="1800" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" selector="15_minutes" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" selector="7" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" selector="2" />
<ns10:refine-value idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" selector="90" />
</ns10:Profile>
<ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2." selected="true"><ns10:title>2.</ns10:title><ns10:description>Do not use vendor-supplied defaults for system passwords and other</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1" selected="true"><ns10:title>2.1</ns10:title><ns10:description>Always change vendor-supplied</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1" selected="true"><ns10:title>2.1.1</ns10:title><ns10:description>For wireless environments</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1.a" selected="true"><ns10:title>2.1.1.a</ns10:title><ns10:description>Interview responsible personnel and examine</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1.b" selected="true"><ns10:title>2.1.1.b</ns10:title><ns10:description>Interview personnel and examine policies and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1.c" selected="true"><ns10:title>2.1.1.c</ns10:title><ns10:description>Examine vendor documentation and login to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1.d" selected="true"><ns10:title>2.1.1.d</ns10:title><ns10:description>Examine vendor documentation and observe</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.1.e" selected="true"><ns10:title>2.1.1.e</ns10:title><ns10:description>Examine vendor documentation and observe</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.a" selected="true"><ns10:title>2.1.a</ns10:title><ns10:description>Choose a sample of system components, and attempt</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.b" selected="true"><ns10:title>2.1.b</ns10:title><ns10:description>For the sample of system components, verify that all</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.1.c" selected="true"><ns10:title>2.1.c</ns10:title><ns10:description>Interview personnel and examine supporting</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2" selected="true"><ns10:title>2.2</ns10:title><ns10:description>Develop configuration standards for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.1" selected="true"><ns10:title>2.2.1</ns10:title><ns10:description>Implement only one primary</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.1.a" selected="true"><ns10:title>2.2.1.a</ns10:title><ns10:description>Select a sample of system components and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.1.b" selected="true"><ns10:title>2.2.1.b</ns10:title><ns10:description>If virtualization technologies are used, inspect the</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.2" selected="true"><ns10:title>2.2.2</ns10:title><ns10:description>Enable only necessary services,</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.2.a" selected="true"><ns10:title>2.2.2.a</ns10:title><ns10:description>Select a sample of system components and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.2.b" selected="true"><ns10:title>2.2.2.b</ns10:title><ns10:description>Identify any enabled insecure services, daemons,</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.3" selected="true"><ns10:title>2.2.3</ns10:title><ns10:description>Implement additional security</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.3.a" selected="true"><ns10:title>2.2.3.a</ns10:title><ns10:description>Inspect configuration settings to verify that security</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.4" selected="true"><ns10:title>2.2.4</ns10:title><ns10:description>Configure system security</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.4.a" selected="true"><ns10:title>2.2.4.a</ns10:title><ns10:description>Interview system administrators and/or security</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.4.b" selected="true"><ns10:title>2.2.4.b</ns10:title><ns10:description>Examine the system configuration standards to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.4.c" selected="true"><ns10:title>2.2.4.c</ns10:title><ns10:description>Select a sample of system components and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.5" selected="true"><ns10:title>2.2.5</ns10:title><ns10:description>Remove all unnecessary</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.5.a" selected="true"><ns10:title>2.2.5.a</ns10:title><ns10:description>Select a sample of system components and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.5.b" selected="true"><ns10:title>2.2.5.b</ns10:title><ns10:description>. Examine the documentation and security</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.5.c" selected="true"><ns10:title>2.2.5.c</ns10:title><ns10:description>. Examine the documentation and security</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.a" selected="true"><ns10:title>2.2.a</ns10:title><ns10:description /></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.b" selected="true"><ns10:title>2.2.b</ns10:title><ns10:description>Examine policies and interview personnel to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.c" selected="true"><ns10:title>2.2.c</ns10:title><ns10:description>Examine policies and interview personnel to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.2.d" selected="true"><ns10:title>2.2.d</ns10:title><ns10:description>Verify that system configuration standards include the</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.3" selected="true"><ns10:title>2.3</ns10:title><ns10:description>Encrypt all non-console</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.3.a" selected="true"><ns10:title>2.3.a</ns10:title><ns10:description>Observe an administrator log on to each system and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.3.b" selected="true"><ns10:title>2.3.b</ns10:title><ns10:description>Review services and parameter files on systems to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.3.c" selected="true"><ns10:title>2.3.c</ns10:title><ns10:description>Observe an administrator log on to each system to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.3.d" selected="true"><ns10:title>2.3.d</ns10:title><ns10:description>Examine vendor documentation and interview</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.4" selected="true"><ns10:title>2.4</ns10:title><ns10:description>Maintain an inventory of system</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.4.a" selected="true"><ns10:title>2.4.a</ns10:title><ns10:description>Examine system inventory to verify that a list of</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.4.b" selected="true"><ns10:title>2.4.b</ns10:title><ns10:description>Interview personnel to verify the documented inventory</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.5" selected="true"><ns10:title>2.5</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-2.6" selected="true"><ns10:title>2.6</ns10:title><ns10:description>Shared hosting providers must</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3." selected="true"><ns10:title>3.</ns10:title><ns10:description>Protect stored cardholder data</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.1" selected="true"><ns10:title>3.1</ns10:title><ns10:description>Keep cardholder data storage to a</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.1.a" selected="true"><ns10:title>3.1.a</ns10:title><ns10:description>Examine the data retention and disposal policies,</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.1.b" selected="true"><ns10:title>3.1.b</ns10:title><ns10:description>Interview personnel to verify that:</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.1.c" selected="true"><ns10:title>3.1.c</ns10:title><ns10:description>For a sample of system components that store cardholder</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2" selected="true"><ns10:title>3.2</ns10:title><ns10:description>Do not store sensitive authentication</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.1" selected="true"><ns10:title>3.2.1</ns10:title><ns10:description>Do not store the full contents of</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.2" selected="true"><ns10:title>3.2.2</ns10:title><ns10:description>Do not store the card verification</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.3" selected="true"><ns10:title>3.2.3</ns10:title><ns10:description>Do not store the personal</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.a" selected="true"><ns10:title>3.2.a</ns10:title><ns10:description>For issuers and/or companies that support issuing</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.b" selected="true"><ns10:title>3.2.b</ns10:title><ns10:description>For issuers and/or companies that support issuing</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.c" selected="true"><ns10:title>3.2.c</ns10:title><ns10:description>For all other entities, if sensitive authentication data is</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.2.d" selected="true"><ns10:title>3.2.d</ns10:title><ns10:description>For all other entities, if sensitive authentication data is</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.3" selected="true"><ns10:title>3.3</ns10:title><ns10:description>Mask PAN when displayed (the first</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.3.a" selected="true"><ns10:title>3.3.a</ns10:title><ns10:description>Examine written policies and procedures for masking the</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.3.b" selected="true"><ns10:title>3.3.b</ns10:title><ns10:description>Examine system configurations to verify that full PAN is</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.3.c" selected="true"><ns10:title>3.3.c</ns10:title><ns10:description>Examine displays of PAN (for example, on screen, on</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4" selected="true"><ns10:title>3.4</ns10:title><ns10:description>Render PAN unreadable anywhere it</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.1" selected="true"><ns10:title>3.4.1</ns10:title><ns10:description>If disk encryption is used (rather</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.1.a" selected="true"><ns10:title>3.4.1.a</ns10:title><ns10:description>If disk encryption is used, inspect the configuration</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.1.b" selected="true"><ns10:title>3.4.1.b</ns10:title><ns10:description>Observe processes and interview personnel to verify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.1.c" selected="true"><ns10:title>3.4.1.c</ns10:title><ns10:description>Examine the configurations and observe the</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.a" selected="true"><ns10:title>3.4.a</ns10:title><ns10:description>Examine documentation about the system used to protect</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.b" selected="true"><ns10:title>3.4.b</ns10:title><ns10:description>Examine several tables or files from a sample of data</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.c" selected="true"><ns10:title>3.4.c</ns10:title><ns10:description>Examine a sample of removable media (for example,</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.d" selected="true"><ns10:title>3.4.d</ns10:title><ns10:description>Examine a sample of audit logs to confirm that the PAN is</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.4.e" selected="true"><ns10:title>3.4.e</ns10:title><ns10:description>If</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5" selected="true"><ns10:title>3.5</ns10:title><ns10:description>Document and implement</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.1" selected="true"><ns10:title>3.5.1</ns10:title><ns10:description>Restrict access to cryptographic</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.2" selected="true"><ns10:title>3.5.2</ns10:title><ns10:description>Store secret and private keys</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.2.a" selected="true"><ns10:title>3.5.2.a</ns10:title><ns10:description>Examine documented procedures to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.2.b" selected="true"><ns10:title>3.5.2.b</ns10:title><ns10:description>Examine system configurations and key storage</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.2.c" selected="true"><ns10:title>3.5.2.c</ns10:title><ns10:description>Wherever key-encrypting keys are used, examine</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.5.3" selected="true"><ns10:title>3.5.3</ns10:title><ns10:description>Store cryptographic keys in the</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6" selected="true"><ns10:title>3.6</ns10:title><ns10:description>Fully document and implement all</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.1" selected="true"><ns10:title>3.6.1</ns10:title><ns10:description>Generation of strong</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.1.a" selected="true"><ns10:title>3.6.1.a</ns10:title><ns10:description>Verify that key-management procedures specify how</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.1.b" selected="true"><ns10:title>3.6.1.b</ns10:title><ns10:description>Observe the method for generating keys to verify that</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.2" selected="true"><ns10:title>3.6.2</ns10:title><ns10:description>Secure cryptographic key</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.2.a" selected="true"><ns10:title>3.6.2.a</ns10:title><ns10:description>Verify that key-management procedures specify how</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.2.b" selected="true"><ns10:title>3.6.2.b</ns10:title><ns10:description>Observe the method for distributing keys to verify that</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.3" selected="true"><ns10:title>3.6.3</ns10:title><ns10:description>Secure cryptographic key storage</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.3.a" selected="true"><ns10:title>3.6.3.a</ns10:title><ns10:description>Verify that key-management procedures specify how</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.3.b" selected="true"><ns10:title>3.6.3.b</ns10:title><ns10:description>Observe the method for storing keys to verify that</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.4" selected="true"><ns10:title>3.6.4</ns10:title><ns10:description>Cryptographic key changes for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.4.a" selected="true"><ns10:title>3.6.4.a</ns10:title><ns10:description>Verify that key-management procedures include a</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.4.b" selected="true"><ns10:title>3.6.4.b</ns10:title><ns10:description>Interview personnel to verify that keys are changed at</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.5" selected="true"><ns10:title>3.6.5</ns10:title><ns10:description>Retirement or replacement (for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.5.a" selected="true"><ns10:title>3.6.5.a</ns10:title><ns10:description>Verify that key-management procedures specify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.5.b" selected="true"><ns10:title>3.6.5.b</ns10:title><ns10:description>Interview personnel to verify the following processes</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.6" selected="true"><ns10:title>3.6.6</ns10:title><ns10:description>If manual clear-text cryptographic</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.6.a" selected="true"><ns10:title>3.6.6.a</ns10:title><ns10:description>Verify that manual clear-text key-management</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.7" selected="true"><ns10:title>3.6.7</ns10:title><ns10:description>Prevention of unauthorized</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.7.a" selected="true"><ns10:title>3.6.7.a</ns10:title><ns10:description>Verify that key-management procedures specify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.7.b" selected="true"><ns10:title>3.6.7.b</ns10:title><ns10:description>Interview personnel and/or observe processes to</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.8" selected="true"><ns10:title>3.6.8</ns10:title><ns10:description>Requirement for cryptographic</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.8.a" selected="true"><ns10:title>3.6.8.a</ns10:title><ns10:description>Verify that key-management procedures specify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.8.b" selected="true"><ns10:title>3.6.8.b</ns10:title><ns10:description>Observe documentation or other evidence showing</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.6.b" selected="true"><ns10:title>3.6.b</ns10:title><ns10:description>Examine the key-management procedures and processes</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-3.7" selected="true"><ns10:title>3.7</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4." selected="true"><ns10:title>4.</ns10:title><ns10:description>Encrypt transmission of cardholder data across open, public networks</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1" selected="true"><ns10:title>4.1</ns10:title><ns10:description>Use strong cryptography and security</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.1" selected="true"><ns10:title>4.1.1</ns10:title><ns10:description>Ensure wireless networks transmitting</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.a" selected="true"><ns10:title>4.1.a</ns10:title><ns10:description>Identify all locations where cardholder data is</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.b" selected="true"><ns10:title>4.1.b</ns10:title><ns10:description>Review documented policies and procedures to verify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.c" selected="true"><ns10:title>4.1.c</ns10:title><ns10:description>Select and observe a sample of inbound and outbound</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.d" selected="true"><ns10:title>4.1.d</ns10:title><ns10:description>Examine keys and certificates to verify that only</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.e" selected="true"><ns10:title>4.1.e</ns10:title><ns10:description>Examine system configurations to verify that the</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.f" selected="true"><ns10:title>4.1.f</ns10:title><ns10:description>Examine system configurations to verify that the proper</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.1.g" selected="true"><ns10:title>4.1.g</ns10:title><ns10:description>For TLS implementations, examine system</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.2" selected="true"><ns10:title>4.2</ns10:title><ns10:description>Never send unprotected PANs by end-</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.2.a" selected="true"><ns10:title>4.2.a</ns10:title><ns10:description>If end-user messaging technologies are used to send</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.2.b" selected="true"><ns10:title>4.2.b</ns10:title><ns10:description>Review written policies to verify the existence of a</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-4.3" selected="true"><ns10:title>4.3</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5." selected="true"><ns10:title>5.</ns10:title><ns10:description>Protect all systems against malware and regularly update anti-virus</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.1" selected="true"><ns10:title>5.1</ns10:title><ns10:description>Deploy anti-virus software on all</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.1.1" selected="true"><ns10:title>5.1.1</ns10:title><ns10:description>Ensure that anti-virus programs</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.1.2" selected="true"><ns10:title>5.1.2</ns10:title><ns10:description>For systems considered to be not</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.2" selected="true"><ns10:title>5.2</ns10:title><ns10:description>Ensure that all anti-virus mechanisms</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.2.a" selected="true"><ns10:title>5.2.a</ns10:title><ns10:description>Examine policies and procedures to verify that anti-virus</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.2.b" selected="true"><ns10:title>5.2.b</ns10:title><ns10:description>Examine anti-virus configurations, including the master</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.2.c" selected="true"><ns10:title>5.2.c</ns10:title><ns10:description>Examine a sample of system components, including all</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.2.d" selected="true"><ns10:title>5.2.d</ns10:title><ns10:description>Examine anti-virus configurations, including the master</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.3" selected="true"><ns10:title>5.3</ns10:title><ns10:description>Ensure that anti-virus mechanisms</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.3.a" selected="true"><ns10:title>5.3.a</ns10:title><ns10:description>Examine anti-virus configurations, including the master</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.3.b" selected="true"><ns10:title>5.3.b</ns10:title><ns10:description>Examine anti-virus configurations, including the master</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.3.c" selected="true"><ns10:title>5.3.c</ns10:title><ns10:description>Interview responsible personnel and observe processes to</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-5.4" selected="true"><ns10:title>5.4</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6." selected="true"><ns10:title>6.</ns10:title><ns10:description>Develop and maintain secure systems and applications</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.1" selected="true"><ns10:title>6.1</ns10:title><ns10:description>Establish a process to identify security</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.1.a" selected="true"><ns10:title>6.1.a</ns10:title><ns10:description>Examine policies and procedures to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.1.b" selected="true"><ns10:title>6.1.b</ns10:title><ns10:description>Interview responsible personnel and observe</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.2" selected="true"><ns10:title>6.2</ns10:title><ns10:description>Ensure that all system components and</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.2.a" selected="true"><ns10:title>6.2.a</ns10:title><ns10:description>Examine policies and procedures related to security-</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.2.b" selected="true"><ns10:title>6.2.b</ns10:title><ns10:description>For a sample of system components and related</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3" selected="true"><ns10:title>6.3</ns10:title><ns10:description>Develop internal and external software</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.1" selected="true"><ns10:title>6.3.1</ns10:title><ns10:description>Remove development, test and/or</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.2" selected="true"><ns10:title>6.3.2</ns10:title><ns10:description>Review custom code prior to release</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.2.a" selected="true"><ns10:title>6.3.2.a</ns10:title><ns10:description>Examine written software-development procedures</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.2.b" selected="true"><ns10:title>6.3.2.b</ns10:title><ns10:description>Select a sample of recent custom application</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.a" selected="true"><ns10:title>6.3.a</ns10:title><ns10:description>Examine written software-development processes to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.b" selected="true"><ns10:title>6.3.b</ns10:title><ns10:description>Examine written software-development processes to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.c" selected="true"><ns10:title>6.3.c</ns10:title><ns10:description>Examine written software-development processes to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.3.d" selected="true"><ns10:title>6.3.d</ns10:title><ns10:description>Interview software developers to verify that written</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4" selected="true"><ns10:title>6.4</ns10:title><ns10:description>Follow change control processes and</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.1" selected="true"><ns10:title>6.4.1</ns10:title><ns10:description>Separate development/test</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.1.a" selected="true"><ns10:title>6.4.1.a</ns10:title><ns10:description>Examine network documentation and network</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.1.b" selected="true"><ns10:title>6.4.1.b</ns10:title><ns10:description>Examine access controls settings to verify that</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.2" selected="true"><ns10:title>6.4.2</ns10:title><ns10:description>Separation of duties between</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.3" selected="true"><ns10:title>6.4.3</ns10:title><ns10:description>Production data (live PANs) are not</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.3.a" selected="true"><ns10:title>6.4.3.a</ns10:title><ns10:description>Observe testing processes and interview</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.3.b" selected="true"><ns10:title>6.4.3.b</ns10:title><ns10:description>Examine a sample of test data to verify production</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.4" selected="true"><ns10:title>6.4.4</ns10:title><ns10:description>Removal of test data and accounts</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.4.a" selected="true"><ns10:title>6.4.4.a</ns10:title><ns10:description>Observe testing processes and interview</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.4.b" selected="true"><ns10:title>6.4.4.b</ns10:title><ns10:description>Examine a sample of data and accounts from</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.5" selected="true"><ns10:title>6.4.5</ns10:title><ns10:description>Change control procedures for the</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.5.a" selected="true"><ns10:title>6.4.5.a</ns10:title><ns10:description>Examine documented change control procedures</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.4.5.b" selected="true"><ns10:title>6.4.5.b</ns10:title><ns10:description>For a sample of system components, interview</ns10:description></ns10:Group></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5" selected="true"><ns10:title>6.5</ns10:title><ns10:description>Address common coding vulnerabilities in</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.1" selected="true"><ns10:title>6.5.1</ns10:title><ns10:description>Injection flaws, particularly SQL</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.10" selected="true"><ns10:title>6.5.10</ns10:title><ns10:description>Broken authentication and session</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.2" selected="true"><ns10:title>6.5.2</ns10:title><ns10:description>Buffer overflows</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.3" selected="true"><ns10:title>6.5.3</ns10:title><ns10:description>Insecure cryptographic storage</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.4" selected="true"><ns10:title>6.5.4</ns10:title><ns10:description>Insecure communications</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.5" selected="true"><ns10:title>6.5.5</ns10:title><ns10:description>Improper error handling</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.6" selected="true"><ns10:title>6.5.6</ns10:title><ns10:description>Examine software-development policies and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.7" selected="true"><ns10:title>6.5.7</ns10:title><ns10:description>Cross-site scripting (XSS)</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.8" selected="true"><ns10:title>6.5.8</ns10:title><ns10:description>Improper access control (such as</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.9" selected="true"><ns10:title>6.5.9</ns10:title><ns10:description>Cross-site request forgery (CSRF)</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.a" selected="true"><ns10:title>6.5.a</ns10:title><ns10:description>Examine software-development policies and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.b" selected="true"><ns10:title>6.5.b</ns10:title><ns10:description>Interview a sample of developers to verify that they are</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.5.c" selected="true"><ns10:title>6.5.c</ns10:title><ns10:description>Examine records of training to verify that software</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.6" selected="true"><ns10:title>6.6</ns10:title><ns10:description>For public-facing web applications,</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-6.7" selected="true"><ns10:title>6.7</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7." selected="true"><ns10:title>7.</ns10:title><ns10:description>Restrict access to cardholder data by business need to know</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1" selected="true"><ns10:title>7.1</ns10:title><ns10:description>Limit access to system</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.1" selected="true"><ns10:title>7.1.1</ns10:title><ns10:description>Define access needs for</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.2" selected="true"><ns10:title>7.1.2</ns10:title><ns10:description>Restrict access to privileged</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.2.a" selected="true"><ns10:title>7.1.2.a</ns10:title><ns10:description>Interview personnel responsible for assigning access to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.2.b" selected="true"><ns10:title>7.1.2.b</ns10:title><ns10:description>Select a sample of user IDs with privileged access and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.3" selected="true"><ns10:title>7.1.3</ns10:title><ns10:description>Assign access based on</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.1.4" selected="true"><ns10:title>7.1.4</ns10:title><ns10:description>Require documented</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.2" selected="true"><ns10:title>7.2</ns10:title><ns10:description>Establish an access control</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.2.1" selected="true"><ns10:title>7.2.1</ns10:title><ns10:description>Coverage of all system</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.2.2" selected="true"><ns10:title>7.2.2</ns10:title><ns10:description>Assignment of privileges to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.2.3" selected="true"><ns10:title>7.2.3</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-7.3" selected="true"><ns10:title>7.3</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8." selected="true"><ns10:title>8.</ns10:title><ns10:description>Identify and authenticate access to system components</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1" selected="true"><ns10:title>8.1</ns10:title><ns10:description>Define and implement policies and</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.1" selected="true"><ns10:title>8.1.1</ns10:title><ns10:description>Assign all users a unique ID</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.2" selected="true"><ns10:title>8.1.2</ns10:title><ns10:description>Control addition, deletion, and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.3" selected="true"><ns10:title>8.1.3</ns10:title><ns10:description>Immediately revoke access for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.3.a" selected="true"><ns10:title>8.1.3.a</ns10:title><ns10:description>Select a sample of users terminated in the past six</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.3.b" selected="true"><ns10:title>8.1.3.b</ns10:title><ns10:description>Verify all physical authentication methods</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.4" selected="true"><ns10:title>8.1.4</ns10:title><ns10:description>Remove/disable inactive user</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.5" selected="true"><ns10:title>8.1.5</ns10:title><ns10:description>Manage IDs used by vendors to</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.5.a" selected="true"><ns10:title>8.1.5.a</ns10:title><ns10:description>Interview personnel and observe processes for</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.5.b" selected="true"><ns10:title>8.1.5.b</ns10:title><ns10:description>Interview personnel and observe processes to verify</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.6" selected="true"><ns10:title>8.1.6</ns10:title><ns10:description>Limit repeated access attempts</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.6.a" selected="true"><ns10:title>8.1.6.a</ns10:title><ns10:description>For a sample of system components, inspect system</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.6.b" selected="true"><ns10:title>8.1.6.b</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.7" selected="true"><ns10:title>8.1.7</ns10:title><ns10:description>Set the lockout duration to a</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.8" selected="true"><ns10:title>8.1.8</ns10:title><ns10:description>If a session has been idle for</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.a" selected="true"><ns10:title>8.1.a</ns10:title><ns10:description>Review procedures and confirm they define processes for</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.1.b" selected="true"><ns10:title>8.1.b</ns10:title><ns10:description>Verify that procedures are implemented for user</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2" selected="true"><ns10:title>8.2</ns10:title><ns10:description>In addition to assigning a unique ID,</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.1" selected="true"><ns10:title>8.2.1</ns10:title><ns10:description>Using strong cryptography,</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.1.a" selected="true"><ns10:title>8.2.1.a</ns10:title><ns10:description>Examine vendor documentation and system</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.1.b" selected="true"><ns10:title>8.2.1.b</ns10:title><ns10:description>For a sample of system components, examine</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.1.c" selected="true"><ns10:title>8.2.1.c</ns10:title><ns10:description>For a sample of system components, examine data</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.1.d" selected="true"><ns10:title>8.2.1.d</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.2" selected="true"><ns10:title>8.2.2</ns10:title><ns10:description>Verify user identity before</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.3" selected="true"><ns10:title>8.2.3</ns10:title><ns10:description>Passwords/phrases must meet</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.3.a" selected="true"><ns10:title>8.2.3.a</ns10:title><ns10:description>For a sample of system components, inspect system</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.3.b" selected="true"><ns10:title>8.2.3.b</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.4" selected="true"><ns10:title>8.2.4</ns10:title><ns10:description>Change user</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.4.a" selected="true"><ns10:title>8.2.4.a</ns10:title><ns10:description>For a sample of system components, inspect system</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.4.b" selected="true"><ns10:title>8.2.4.b</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.5" selected="true"><ns10:title>8.2.5</ns10:title><ns10:description>Do not allow an individual to</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.5.a" selected="true"><ns10:title>8.2.5.a</ns10:title><ns10:description>For a sample of system components, obtain and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.5.b" selected="true"><ns10:title>8.2.5.b</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.2.6" selected="true"><ns10:title>8.2.6</ns10:title><ns10:description>Set passwords/phrases for first-</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.3" selected="true"><ns10:title>8.3</ns10:title><ns10:description>Incorporate two-factor authentication</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.3.a" selected="true"><ns10:title>8.3.a</ns10:title><ns10:description>Examine system configurations for remote access servers</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.3.b" selected="true"><ns10:title>8.3.b</ns10:title><ns10:description>Observe a sample of personnel (for example, users and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.4" selected="true"><ns10:title>8.4</ns10:title><ns10:description>Document and communicate</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.4.a" selected="true"><ns10:title>8.4.a</ns10:title><ns10:description>Examine</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.4.b" selected="true"><ns10:title>8.4.b</ns10:title><ns10:description>Review authentication policies and procedures that are</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.4.c" selected="true"><ns10:title>8.4.c</ns10:title><ns10:description>Interview a sample of users to verify that they are familiar</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.5" selected="true"><ns10:title>8.5</ns10:title><ns10:description>Do not use group, shared, or generic</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.5.1" selected="true"><ns10:title>8.5.1</ns10:title><ns10:description /></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.5.a" selected="true"><ns10:title>8.5.a</ns10:title><ns10:description>For a sample of system components, examine user ID lists</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.5.b" selected="true"><ns10:title>8.5.b</ns10:title><ns10:description>Examine authentication policies and procedures to verify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.5.c" selected="true"><ns10:title>8.5.c</ns10:title><ns10:description>Interview system administrators to verify that group and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.6" selected="true"><ns10:title>8.6</ns10:title><ns10:description>Where other authentication</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.6.a" selected="true"><ns10:title>8.6.a</ns10:title><ns10:description>Examine authentication policies and procedures to verify</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.6.b" selected="true"><ns10:title>8.6.b</ns10:title><ns10:description>Interview security personnel to verify authentication</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.6.c" selected="true"><ns10:title>8.6.c</ns10:title><ns10:description>Examine system configuration settings and/or physical</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.7" selected="true"><ns10:title>8.7</ns10:title><ns10:description>All access to any database</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.7.a" selected="true"><ns10:title>8.7.a</ns10:title><ns10:description>Review database and application configuration settings</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.7.b" selected="true"><ns10:title>8.7.b</ns10:title><ns10:description>Examine database and application configuration settings to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.7.c" selected="true"><ns10:title>8.7.c</ns10:title><ns10:description>Examine database access control settings and database</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.7.d" selected="true"><ns10:title>8.7.d</ns10:title><ns10:description>Examine database access control settings, database</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-8.8" selected="true"><ns10:title>8.8</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10." selected="true"><ns10:title>10.</ns10:title><ns10:description>Track and monitor all access to network resources and cardholder data</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.1" selected="true"><ns10:title>10.1</ns10:title><ns10:description>Implement audit trails to link all</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2" selected="true"><ns10:title>10.2</ns10:title><ns10:description>Implement automated audit trails for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.1" selected="true"><ns10:title>10.2.1</ns10:title><ns10:description>All individual user accesses to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.2" selected="true"><ns10:title>10.2.2</ns10:title><ns10:description>All actions taken by any</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.3" selected="true"><ns10:title>10.2.3</ns10:title><ns10:description>Access to all audit trails</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.4" selected="true"><ns10:title>10.2.4</ns10:title><ns10:description>Invalid logical access attempts</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.5" selected="true"><ns10:title>10.2.5</ns10:title><ns10:description>Use of and changes to</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.5.a" selected="true"><ns10:title>10.2.5.a</ns10:title><ns10:description>Verify use of identification and authentication</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.5.b" selected="true"><ns10:title>10.2.5.b</ns10:title><ns10:description>Verify all elevation of privileges is logged.</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.5.c" selected="true"><ns10:title>10.2.5.c</ns10:title><ns10:description>Verify all changes, additions, or deletions to any account</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.6" selected="true"><ns10:title>10.2.6</ns10:title><ns10:description>Initialization, stopping, or</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.2.7" selected="true"><ns10:title>10.2.7</ns10:title><ns10:description>Creation and deletion of system-</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3" selected="true"><ns10:title>10.3</ns10:title><ns10:description>Record at least the following audit</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.1" selected="true"><ns10:title>10.3.1</ns10:title><ns10:description>User identification</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.2" selected="true"><ns10:title>10.3.2</ns10:title><ns10:description>Type of event</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.3" selected="true"><ns10:title>10.3.3</ns10:title><ns10:description>Date and time</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.4" selected="true"><ns10:title>10.3.4</ns10:title><ns10:description>Success or failure indication</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.5" selected="true"><ns10:title>10.3.5</ns10:title><ns10:description>Origination of event</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.3.6" selected="true"><ns10:title>10.3.6</ns10:title><ns10:description>Identity or name of affected</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4" selected="true"><ns10:title>10.4</ns10:title><ns10:description>Using time-synchronization</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.1" selected="true"><ns10:title>10.4.1</ns10:title><ns10:description>Critical systems have the</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.1.a" selected="true"><ns10:title>10.4.1.a</ns10:title><ns10:description>Examine the process for acquiring, distributing and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.1.b" selected="true"><ns10:title>10.4.1.b</ns10:title><ns10:description>Observe the time-related system-parameter settings for</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.2" selected="true"><ns10:title>10.4.2</ns10:title><ns10:description>Time data is protected.</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.2.a" selected="true"><ns10:title>10.4.2.a</ns10:title><ns10:description>Examine system configurations and time-</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.2.b" selected="true"><ns10:title>10.4.2.b</ns10:title><ns10:description>Examine system configurations, time synchronization</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.4.3" selected="true"><ns10:title>10.4.3</ns10:title><ns10:description>Time settings are received from</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5" selected="true"><ns10:title>10.5</ns10:title><ns10:description>Secure audit trails so they cannot</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5.1" selected="true"><ns10:title>10.5.1</ns10:title><ns10:description>Limit viewing of audit trails to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5.2" selected="true"><ns10:title>10.5.2</ns10:title><ns10:description>Protect audit trail files from</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5.3" selected="true"><ns10:title>10.5.3</ns10:title><ns10:description>Promptly back up audit trail files</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5.4" selected="true"><ns10:title>10.5.4</ns10:title><ns10:description>Write logs for external-facing</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.5.5" selected="true"><ns10:title>10.5.5</ns10:title><ns10:description>Use file-integrity monitoring or</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6" selected="true"><ns10:title>10.6</ns10:title><ns10:description>Review logs and security events for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.1" selected="true"><ns10:title>10.6.1</ns10:title><ns10:description>Review the following at least</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.1.a" selected="true"><ns10:title>10.6.1.a</ns10:title><ns10:description>Examine security policies and procedures to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.1.b" selected="true"><ns10:title>10.6.1.b</ns10:title><ns10:description>Observe processes and interview personnel to verify</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.2" selected="true"><ns10:title>10.6.2</ns10:title><ns10:description>Review logs of all other system</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.2.a" selected="true"><ns10:title>10.6.2.a</ns10:title><ns10:description>Examine security policies and procedures to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.2.b" selected="true"><ns10:title>10.6.2.b</ns10:title><ns10:description /></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.3" selected="true"><ns10:title>10.6.3</ns10:title><ns10:description>Follow up exceptions and</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.3.a" selected="true"><ns10:title>10.6.3.a</ns10:title><ns10:description>Examine security policies and procedures to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.6.3.b" selected="true"><ns10:title>10.6.3.b</ns10:title><ns10:description>Observe processes and interview personnel to verify</ns10:description></ns10:Group></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.7" selected="true"><ns10:title>10.7</ns10:title><ns10:description>Retain audit trail history for at least</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.7.a" selected="true"><ns10:title>10.7.a</ns10:title><ns10:description>Examine security policies and procedures to verify that they</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.7.b" selected="true"><ns10:title>10.7.b</ns10:title><ns10:description>Interview personnel and examine audit logs to verify that</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.7.c" selected="true"><ns10:title>10.7.c</ns10:title><ns10:description>Interview personnel and observe processes to verify that at</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-10.8" selected="true"><ns10:title>10.8</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11." selected="true"><ns10:title>11.</ns10:title><ns10:description>Regularly test security systems and processes</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1" selected="true"><ns10:title>11.1</ns10:title><ns10:description>Implement processes to test for the</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.1" selected="true"><ns10:title>11.1.1</ns10:title><ns10:description>Maintain an inventory of</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.2" selected="true"><ns10:title>11.1.2</ns10:title><ns10:description>Implement incident response</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.2.a" selected="true"><ns10:title>11.1.2.a</ns10:title><ns10:description /></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.2.b" selected="true"><ns10:title>11.1.2.b</ns10:title><ns10:description>Interview responsible personnel and/or inspect</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.a" selected="true"><ns10:title>11.1.a</ns10:title><ns10:description>Examine policies and procedures to verify processes</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.b" selected="true"><ns10:title>11.1.b</ns10:title><ns10:description>Verify that the methodology is adequate to detect and</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.c" selected="true"><ns10:title>11.1.c</ns10:title><ns10:description>If wireless scanning is utilized, examine output from</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.1.d" selected="true"><ns10:title>11.1.d</ns10:title><ns10:description>If automated monitoring is utilized (for example,</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2" selected="true"><ns10:title>11.2</ns10:title><ns10:description>Run internal and external network</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.1" selected="true"><ns10:title>11.2.1</ns10:title><ns10:description>Perform quarterly internal</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.1.a" selected="true"><ns10:title>11.2.1.a</ns10:title><ns10:description>Review the scan reports and verify that four</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.1.b" selected="true"><ns10:title>11.2.1.b</ns10:title><ns10:description>Review the scan reports and verify that the scan</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.2" selected="true"><ns10:title>11.2.2</ns10:title><ns10:description>Perform quarterly external</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.2.c" selected="true"><ns10:title>11.2.2.c</ns10:title><ns10:description>Review the scan reports to verify that the scans</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.3" selected="true"><ns10:title>11.2.3</ns10:title><ns10:description>Perform internal and external</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.3.a" selected="true"><ns10:title>11.2.3.a</ns10:title><ns10:description>Inspect and correlate change control</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.3.b" selected="true"><ns10:title>11.2.3.b</ns10:title><ns10:description>Review scan reports and verify that the scan</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.2.3.c" selected="true"><ns10:title>11.2.3.c</ns10:title><ns10:description>Validate that the scan was performed by a qualified</ns10:description></ns10:Group></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3" selected="true"><ns10:title>11.3</ns10:title><ns10:description>Implement a methodology for</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.1" selected="true"><ns10:title>11.3.1</ns10:title><ns10:description>Perform</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.1.a" selected="true"><ns10:title>11.3.1.a</ns10:title><ns10:description>Examine the scope of work and results from the</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.1.b" selected="true"><ns10:title>11.3.1.b</ns10:title><ns10:description>Verify that the test was performed by a qualified</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.2" selected="true"><ns10:title>11.3.2</ns10:title><ns10:description>Perform</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.2.a" selected="true"><ns10:title>11.3.2.a</ns10:title><ns10:description>Examine the scope of work and results from the</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.2.b" selected="true"><ns10:title>11.3.2.b</ns10:title><ns10:description>Verify that the test was performed by a qualified</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.3" selected="true"><ns10:title>11.3.3</ns10:title><ns10:description>Exploitable vulnerabilities found</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.4" selected="true"><ns10:title>11.3.4</ns10:title><ns10:description>If segmentation is used to isolate</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.4.a" selected="true"><ns10:title>11.3.4.a</ns10:title><ns10:description>Examine segmentation controls and review</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.3.4.b" selected="true"><ns10:title>11.3.4.b</ns10:title><ns10:description>Examine the results from the most recent</ns10:description></ns10:Group></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.4" selected="true"><ns10:title>11.4</ns10:title><ns10:description>Use intrusion-detection and/or</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.4.a" selected="true"><ns10:title>11.4.a</ns10:title><ns10:description>Examine system configurations and network diagrams</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.4.b" selected="true"><ns10:title>11.4.b</ns10:title><ns10:description>Examine system configurations and interview</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.4.c" selected="true"><ns10:title>11.4.c</ns10:title><ns10:description>Examine IDS/IPS configurations and vendor</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.5" selected="true"><ns10:title>11.5</ns10:title><ns10:description>Deploy a change-detection</ns10:description><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.5.1" selected="true"><ns10:title>11.5.1</ns10:title><ns10:description>Implement a process to respond to</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.5.a" selected="true"><ns10:title>11.5.a</ns10:title><ns10:description>Verify the use of a change-detection mechanism within</ns10:description></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.5.b" selected="true"><ns10:title>11.5.b</ns10:title><ns10:description>Verify the mechanism is configured to alert personnel</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_pcidss-req-11.6" selected="true"><ns10:title>11.6</ns10:title><ns10:description>Ensure that security policies and</ns10:description></ns10:Group></ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_values" selected="true"><ns10:title>Values</ns10:title><ns10:description>Group of values used in PCI-DSS profile</ns10:description><ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to fix syscall audit rule for given system call</ns10:title>
<ns10:description xml:lang="en-US">Function to fix syscall audit rule for given system call. It is
based on example audit syscall rule definitions as outlined in
/usr/share/doc/audit-2.3.7/stig.rules file provided with the audit package. It
will combine multiple system calls belonging to the same syscall group into one
audit rule (rather than to create audit rule per different system call) to
avoid audit infrastructure performance penalty in the case of
'one-audit-rule-definition-per-one-system-call'. See:
https://www.redhat.com/archives/linux-audit/2014-November/msg00009.html
for further details.
Expects five arguments (each of them is required) in the form of:
* audit tool tool used to load audit rules,
either 'auditctl', or 'augenrules
* audit rules' pattern audit rule skeleton for same syscall
* syscall group greatest common string this rule shares
with other rules from the same group
* architecture architecture this rule is intended for
* full form of new rule to add expected full form of audit rule as to
be added into audit.rules file
Note: The 2-th up to 4-th arguments are used to determine how many existing
audit rules will be inspected for resemblance with the new audit rule
(5-th argument) the function is going to add. The rule's similarity check
is performed to optimize audit.rules definition (merge syscalls of the same
group into one rule) to avoid the "single-syscall-per-audit-rule" performance
penalty.
Example call:
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k delete"
# Use escaped BRE regex to specify rule group
GROUP="\(rmdir\|unlink\|rename\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete"
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to fix audit file system object watch rule for given path</ns10:title>
<ns10:description xml:lang="en-US">Function to fix audit file system object watch rule for given path:
* if rule exists, also verifies the -w bits match the requirements
* if rule doesn't exist yet, appends expected rule form to $files_to_inspect
audit rules file, depending on the tool which was used to load audit rules
Expects four arguments (each of them is required) in the form of:
* audit tool tool used to load audit rules,
either 'auditctl', or 'augenrules'
* path value of -w audit rule's argument
* required access bits value of -p audit rule's argument
* key value of -k audit rule's argument
Example call:
fix_audit_watch_rule "auditctl" "/etc/localtime" "wa" "audit_time_rules"
</ns10:description>
<ns10:value>
function fix_audit_watch_rule {
# Load function arguments into local variables
local tool="$1"
local path="$2"
local required_access_bits="$3"
local key="$4"
# Check sanity of the input
if [ $# -ne "4" ]
then
echo "Usage: fix_audit_watch_rule 'tool' 'path' 'bits' 'key'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
declare -a files_to_inspect
# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If the audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# into the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules')
# If the audit is 'augenrules', then check if rule is already defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to list of files for inspection.
# If rule isn't defined, add '/etc/audit/rules.d/$key.rules' to list of files for inspection.
elif [ "$tool" == 'augenrules' ]
then
# Case when particular audit rule is already defined in some of /etc/audit/rules.d/*.rules file
# Get pair -- filepath : matching_row into @matches array
IFS=$'\n' matches=($(grep -P "[\s]*-w[\s]+$path" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
# For each of the matched entries
for match in "${matches[@]}"
do
# Extract filepath from the match
rulesd_audit_file=$(echo $match | cut -f1 -d ':')
# Append that path into list of files for inspection
files_to_inspect=("${files_to_inspect[@]}" "$rulesd_audit_file")
done
# Case when particular audit rule isn't defined yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
# Append '/etc/audit/rules.d/$key.rules' into list of files for inspection
files_to_inspect="/etc/audit/rules.d/$key.rules"
# If the $key.rules file doesn't exist yet, create it with correct permissions
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
# Finally perform the inspection and possible subsequent audit rule
# correction for each of the files previously identified for inspection
for audit_rules_file in "${files_to_inspect[@]}"
do
# Check if audit watch file system object rule for given path already present
if grep -q -P -- "[\s]*-w[\s]+$path" "$audit_rules_file"
then
# Rule is found => verify yet if existing rule definition contains
# all of the required access type bits
# Escape slashes in path for use in sed pattern below
local esc_path=${path//$'/'/$'\/'}
# Define BRE whitespace class shortcut
local sp="[[:space:]]"
# Extract current permission access types (e.g. -p [r|w|x|a] values) from audit rule
current_access_bits=$(sed -ne "s/$sp*-w$sp\+$esc_path$sp\+-p$sp\+\([rxwa]\{1,4\}\).*/\1/p" "$audit_rules_file")
# Split required access bits string into characters array
# (to check bit's presence for one bit at a time)
for access_bit in $(echo "$required_access_bits" | grep -o .)
do
# For each from the required access bits (e.g. 'w', 'a') check
# if they are already present in current access bits for rule.
# If not, append that bit at the end
if ! grep -q "$access_bit" <<< "$current_access_bits"
then
# Concatenate the existing mask with the missing bit
current_access_bits="$current_access_bits$access_bit"
fi
done
# Propagate the updated rule's access bits (original + the required
# ones) back into the /etc/audit/audit.rules file for that rule
sed -i "s/\($sp*-w$sp\+$esc_path$sp\+-p$sp\+\)\([rxwa]\{1,4\}\)\(.*\)/\1$current_access_bits\3/" "$audit_rules_file"
else
# Rule isn't present yet. Append it at the end of $audit_rules_file file
# with proper key
echo "-w $path -p $required_access_bits -k $key" >> "$audit_rules_file"
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_package_command" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to to install or uninstall packages on RHEL and Fedora systems</ns10:title>
<ns10:description xml:lang="en-US">Function to install or uninstall packages on RHEL and Fedora systems.
Example Call(s):
package_command install aide
package_command remove telnet-server
</ns10:description>
<ns10:value>
function package_command {
# Load function arguments into local variables
local package_operation=$1
local package=$2
# Check sanity of the input
if [ $# -ne "2" ]
then
echo "Usage: package_command 'install/uninstall' 'rpm_package_name"
echo "Aborting."
exit 1
fi
# If dnf is installed, use dnf; otherwise, use yum
if [ -f "/usr/bin/dnf" ] ; then
install_util="/usr/bin/dnf"
else
install_util="/usr/bin/yum"
fi
if [ "$package_operation" != 'remove' ] ; then
# If the rpm is not installed, install the rpm
if ! /bin/rpm -q --quiet $package; then
$install_util -y $package_operation $package
fi
else
# If the rpm is installed, uninstall the rpm
if /bin/rpm -q --quiet $package; then
$install_util -y $package_operation $package
fi
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_service_command" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to enable/disable and start/stop services on RHEL
and Fedora systems</ns10:title>
<ns10:description xml:lang="en-US">Function to enable/disable and start/stop services on RHEL and
Fedora systems.
Example Call(s):
service_command enable bluetooth
service_command disable bluetooth.service
Using xinetd:
service_command disable rsh.socket xinetd=rsh
</ns10:description>
<ns10:value>
function service_command {
# Load function arguments into local variables
local service_state=$1
local service=$2
local xinetd=$(echo $3 | cut -d'=' -f2)
# Check sanity of the input
if [ $# -lt "2" ]
then
echo "Usage: service_command 'enable/disable' 'service_name.service'"
echo
echo "To enable or disable xinetd services add \'xinetd=service_name\'"
echo "as the last argument"
echo "Aborting."
exit 1
fi
# If systemctl is installed, use systemctl command; otherwise, use the service/chkconfig commands
if [ -f "/usr/bin/systemctl" ] ; then
service_util="/usr/bin/systemctl"
else
service_util="/sbin/service"
chkconfig_util="/sbin/chkconfig"
fi
# If disable is not specified in arg1, set variables to enable services.
# Otherwise, variables are to be set to disable services.
if [ "$service_state" != 'disable' ] ; then
service_state="enable"
service_operation="start"
chkconfig_state="on"
else
service_state="disable"
service_operation="stop"
chkconfig_state="off"
fi
# If chkconfig_util is not empty, use chkconfig/service commands.
if ! [ "x$chkconfig_util" = x ] ; then
$service_util $service $service_operation
$chkconfig_util --level 0123456 $service $chkconfig_state
else
$service_util $service_operation $service
$service_util $service_state $service
fi
# Test if local variable xinetd is empty using non-bashism.
# If empty, then xinetd is not being used.
if ! [ "x$xinetd" = x ] ; then
grep -qi disable /etc/xinetd.d/$xinetd && \
if ! [ "$service_operation" != 'disable' ] ; then
sed -i "s/disable.*/disable = no/gI" /etc/xinetd.d/$xinetd
else
sed -i "s/disable.*/disable = yes/gI" /etc/xinetd.d/$xinetd
fi
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_perform_audit_rules_privileged_commands_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to perform remediation for 'audit_rules_privileged_commands' rule</ns10:title>
<ns10:description xml:lang="en-US">Function to perform remediation for 'audit_rules_privileged_commands' rule
Expects two arguments:
audit_tool tool used to load audit rules
One of 'auditctl' or 'augenrules'
min_auid Minimum original ID the user logged in with
'500' for RHEL-6 and before, '1000' for RHEL-7 and after.
Example Call(s):
perform_audit_rules_privileged_commands_remediation "auditctl" "500"
perform_audit_rules_privileged_commands_remediation "augenrules" "1000"
</ns10:description>
<ns10:value>
function perform_audit_rules_privileged_commands_remediation {
#
# Load function arguments into local variables
local tool="$1"
local min_auid="$2"
# Check sanity of the input
if [ $# -ne "2" ]
then
echo "Usage: perform_audit_rules_privileged_commands_remediation 'auditctl | augenrules' '500 | 1000'"
echo "Aborting."
exit 1
fi
declare -a files_to_inspect=()
# Check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If the audit tool is 'auditctl', then:
# * add '/etc/audit/audit.rules'to the list of files to be inspected,
# * specify '/etc/audit/audit.rules' as the output audit file, where
# missing rules should be inserted
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("/etc/audit/audit.rules")
output_audit_file="/etc/audit/audit.rules"
#
# If the audit tool is 'augenrules', then:
# * add '/etc/audit/rules.d/*.rules' to the list of files to be inspected
# (split by newline),
# * specify /etc/audit/rules.d/privileged.rules' as the output file, where
# missing rules should be inserted
elif [ "$tool" == 'augenrules' ]
then
IFS=$'\n' files_to_inspect=($(find /etc/audit/rules.d -maxdepth 1 -type f -name *.rules -print))
output_audit_file="/etc/audit/rules.d/privileged.rules"
fi
# Obtain the list of SUID/SGID binaries on the particular system (split by newline)
# into privileged_binaries array
IFS=$'\n' privileged_binaries=($(find / -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null))
# Keep list of SUID/SGID binaries that have been already handled within some previous iteration
declare -a sbinaries_to_skip=()
# For each found sbinary in privileged_binaries list
for sbinary in "${privileged_binaries[@]}"
do
# Replace possible slash '/' character in sbinary definition so we could use it in sed expressions below
sbinary_esc=${sbinary//$'/'/$'\/'}
# Check if this sbinary wasn't already handled in some of the previous iterations
# Return match only if whole sbinary definition matched (not in the case just prefix matched!!!)
if [[ $(sed -ne "/${sbinary_esc}$/p" <<< ${sbinaries_to_skip[@]}) ]]
then
# If so, don't process it second time & go to process next sbinary
continue
fi
# Reset the counter of inspected files when starting to check
# presence of existing audit rule for new sbinary
local count_of_inspected_files=0
# For each audit rules file from the list of files to be inspected
for afile in "${files_to_inspect[@]}"
do
# Search current audit rules file's content for match. Match criteria:
# * existing rule is for the same SUID/SGID binary we are currently processing (but
# can contain multiple -F path= elements covering multiple SUID/SGID binaries)
# * existing rule contains all arguments from expected rule form (though can contain
# them in arbitrary order)
base_search=$(sed -e "/-a always,exit/!d" -e "/-F path=${sbinary_esc}$/!d" \
-e "/-F path=[^[:space:]]\+/!d" -e "/-F perm=.*/!d" \
-e "/-F auid>=${min_auid}/!d" -e "/-F auid!=4294967295/!d" \
-e "/-k privileged/!d" $afile)
# Increase the count of inspected files for this sbinary
count_of_inspected_files=$((count_of_inspected_files + 1))
# Define expected rule form for this binary
expected_rule="-a always,exit -F path=${sbinary} -F perm=x -F auid>=${min_auid} -F auid!=4294967295 -k privileged"
# Require execute access type to be set for existing audit rule
exec_access='x'
# Search current audit rules file's content for presence of rule pattern for this sbinary
if [[ $base_search ]]
then
# Current audit rules file already contains rule for this binary =>
# Store the exact form of found rule for this binary for further processing
concrete_rule=$base_search
# Select all other SUID/SGID binaries possibly also present in the found rule
IFS=$'\n' handled_sbinaries=($(grep -o -e "-F path=[^[:space:]]\+" <<< $concrete_rule))
IFS=$' ' handled_sbinaries=(${handled_sbinaries[@]//-F path=/})
# Merge the list of such SUID/SGID binaries found in this iteration with global list ignoring duplicates
sbinaries_to_skip=($(for i in "${sbinaries_to_skip[@]}" "${handled_sbinaries[@]}"; do echo $i; done | sort -du))
# Separate concrete_rule into three sections using hash '#'
# sign as a delimiter around rule's permission section borders
concrete_rule=$(echo $concrete_rule | sed -n "s/\(.*\)\+\(-F perm=[rwax]\+\)\+/\1#\2#/p")
# Split concrete_rule into head, perm, and tail sections using hash '#' delimiter
IFS=$'#' read rule_head rule_perm rule_tail <<< "$concrete_rule"
# Extract already present exact access type [r|w|x|a] from rule's permission section
access_type=${rule_perm//-F perm=/}
# Verify current permission access type(s) for rule contain 'x' (execute) permission
if ! grep -q "$exec_access" <<< "$access_type"
then
# If not, append the 'x' (execute) permission to the existing access type bits
access_type="$access_type$exec_access"
# Reconstruct the permissions section for the rule
new_rule_perm="-F perm=$access_type"
# Update existing rule in current audit rules file with the new permission section
sed -i "s#${rule_head}\(.*\)${rule_tail}#${rule_head}${new_rule_perm}${rule_tail}#" $afile
fi
# If the required audit rule for particular sbinary wasn't found yet, insert it under following conditions:
#
# * in the "auditctl" mode of operation insert particular rule each time
# (because in this mode there's only one file -- /etc/audit/audit.rules to be inspected for presence of this rule),
#
# * in the "augenrules" mode of operation insert particular rule only once and only in case we have already
# searched all of the files from /etc/audit/rules.d/*.rules location (since that audit rule can be defined
# in any of those files and if not, we want it to be inserted only once into /etc/audit/rules.d/privileged.rules file)
#
elif [ "$tool" == "auditctl" ] || [[ "$tool" == "augenrules" && $count_of_inspected_files -eq "${#files_to_inspect[@]}" ]]
then
# Current audit rules file's content doesn't contain expected rule for this
# SUID/SGID binary yet => append it
echo $expected_rule >> $output_audit_file
fi
done
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_populate" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to populate environment variables needed for unit testing</ns10:title>
<ns10:description xml:lang="en-US">The populate function isn't directly used by SSG at the moment but it can
ba used for testing purposes (to verify proper work of the remediation script directly
from the shell).</ns10:description>
<ns10:value>
function populate {
# Code to populate environment variables needed (for unit testing)
if [ -z "${!1}" ]; then
echo "$1 is not defined. Exiting."
exit
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function for the 'adjtimex', 'settimeofday', and 'stime'
audit system calls on Red Hat Enterprise Linux 6</ns10:title>
<ns10:description xml:lang="en-US">Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 6 OS</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
function rhel6_perform_audit_adjtimex_settimeofday_stime_remediation {
# Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 6 OS
#
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
# Create expected audit group and audit rule form for particular system call & architecture
if [ ${ARCH} = "b32" ]
then
# stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
# so append it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\|stime\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
elif [ ${ARCH} = "b64" ]
then
# stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
# therefore don't add it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
fi
# Perform the remediation itself
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_rhel7_fedora_perform_audit_adjtimex_settimeofday_stime_remediation" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function for the 'adjtimex', 'settimeofday', and 'stime'
audit system calls on Red Hat Enterprise Linux 7 or Fedora</ns10:title>
<ns10:description xml:lang="en-US">Perform the remediation for the 'adjtimex', 'settimeofday', and
'stime' audit system calls on Red Hat Enterprise Linux 7 or Fedora OSes</ns10:description>
<ns10:value>
function fix_audit_syscall_rule {
# Load function arguments into local variables
local tool="$1"
local pattern="$2"
local group="$3"
local arch="$4"
local full_rule="$5"
# Check sanity of the input
if [ $# -ne "5" ]
then
echo "Usage: fix_audit_syscall_rule 'tool' 'pattern' 'group' 'arch' 'full rule'"
echo "Aborting."
exit 1
fi
# Create a list of audit *.rules files that should be inspected for presence and correctness
# of a particular audit rule. The scheme is as follows:
#
# -----------------------------------------------------------------------------------------
# Tool used to load audit rules | Rule already defined | Audit rules file to inspect |
# -----------------------------------------------------------------------------------------
# auditctl | Doesn't matter | /etc/audit/audit.rules |
# -----------------------------------------------------------------------------------------
# augenrules | Yes | /etc/audit/rules.d/*.rules |
# augenrules | No | /etc/audit/rules.d/$key.rules |
# -----------------------------------------------------------------------------------------
#
declare -a files_to_inspect
# First check sanity of the specified audit tool
if [ "$tool" != 'auditctl' ] && [ "$tool" != 'augenrules' ]
then
echo "Unknown audit rules loading tool: $1. Aborting."
echo "Use either 'auditctl' or 'augenrules'!"
exit 1
# If audit tool is 'auditctl', then add '/etc/audit/audit.rules'
# file to the list of files to be inspected
elif [ "$tool" == 'auditctl' ]
then
files_to_inspect=("${files_to_inspect[@]}" '/etc/audit/audit.rules' )
# If audit tool is 'augenrules', then check if the audit rule is defined
# If rule is defined, add '/etc/audit/rules.d/*.rules' to the list for inspection
# If rule isn't defined yet, add '/etc/audit/rules.d/$key.rules' to the list for inspection
elif [ "$tool" == 'augenrules' ]
then
# Extract audit $key from audit rule so we can use it later
key=$(expr "$full_rule" : '.*-k[[:space:]]\([^[:space:]]\+\)')
# Check if particular audit rule is already defined
IFS=$'\n' matches=($(sed -s -n -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d;F" /etc/audit/rules.d/*.rules))
# Reset IFS back to default
unset $IFS
for match in "${matches[@]}"
do
files_to_inspect=("${files_to_inspect[@]}" "${match}")
done
# Case when particular rule isn't defined in /etc/audit/rules.d/*.rules yet
if [ ${#files_to_inspect[@]} -eq "0" ]
then
files_to_inspect="/etc/audit/rules.d/$key.rules"
if [ ! -e "$files_to_inspect" ]
then
touch "$files_to_inspect"
chmod 0640 "$files_to_inspect"
fi
fi
fi
#
# Indicator that we want to append $full_rule into $audit_file by default
local append_expected_rule=0
for audit_file in "${files_to_inspect[@]}"
do
# Filter existing $audit_file rules' definitions to select those that:
# * follow the rule pattern, and
# * meet the hardware architecture requirement, and
# * are current syscall group specific
IFS=$'\n' existing_rules=($(sed -e "/${pattern}/!d" -e "/${arch}/!d" -e "/${group}/!d" "$audit_file"))
# Reset IFS back to default
unset $IFS
# Process rules found case-by-case
for rule in "${existing_rules[@]}"
do
# Found rule is for same arch & key, but differs (e.g. in count of -S arguments)
if [ "${rule}" != "${full_rule}" ]
then
# If so, isolate just '(-S \w)+' substring of that rule
rule_syscalls=$(echo $rule | grep -o -P '(-S \w+ )+')
# Check if list of '-S syscall' arguments of that rule is subset
# of '-S syscall' list of expected $full_rule
if grep -q -- "$rule_syscalls" <<< "$full_rule"
then
# Rule is covered (i.e. the list of -S syscalls for this rule is
# subset of -S syscalls of $full_rule => existing rule can be deleted
# Thus delete the rule from audit.rules & our array
sed -i -e "/$rule/d" "$audit_file"
existing_rules=("${existing_rules[@]//$rule/}")
else
# Rule isn't covered by $full_rule - it besides -S syscall arguments
# for this group contains also -S syscall arguments for other syscall
# group. Example: '-S lchown -S fchmod -S fchownat' => group='chown'
# since 'lchown' & 'fchownat' share 'chown' substring
# Therefore:
# * 1) delete the original rule from audit.rules
# (original '-S lchown -S fchmod -S fchownat' rule would be deleted)
# * 2) delete the -S syscall arguments for this syscall group, but
# keep those not belonging to this syscall group
# (original '-S lchown -S fchmod -S fchownat' would become '-S fchmod'
# * 3) append the modified (filtered) rule again into audit.rules
# if the same rule not already present
#
# 1) Delete the original rule
sed -i -e "/$rule/d" "$audit_file"
# 2) Delete syscalls for this group, but keep those from other groups
# Convert current rule syscall's string into array splitting by '-S' delimiter
IFS=$'-S' read -a rule_syscalls_as_array <<< "$rule_syscalls"
# Reset IFS back to default
unset $IFS
# Declare new empty string to hold '-S syscall' arguments from other groups
new_syscalls_for_rule=''
# Walk through existing '-S syscall' arguments
for syscall_arg in "${rule_syscalls_as_array[@]}"
do
# Skip empty $syscall_arg values
if [ "$syscall_arg" == '' ]
then
continue
fi
# If the '-S syscall' doesn't belong to current group add it to the new list
# (together with adding '-S' delimiter back for each of such item found)
if grep -q -v -- "$group" <<< "$syscall_arg"
then
new_syscalls_for_rule="$new_syscalls_for_rule -S $syscall_arg"
fi
done
# Replace original '-S syscall' list with the new one for this rule
updated_rule=${rule//$rule_syscalls/$new_syscalls_for_rule}
# Squeeze repeated whitespace characters in rule definition (if any) into one
updated_rule=$(echo "$updated_rule" | tr -s '[:space:]')
# 3) Append the modified / filtered rule again into audit.rules
# (but only in case it's not present yet to prevent duplicate definitions)
if ! grep -q -- "$updated_rule" "$audit_file"
then
echo "$updated_rule" >> "$audit_file"
fi
fi
else
# $audit_file already contains the expected rule form for this
# architecture & key => don't insert it second time
append_expected_rule=1
fi
done
# We deleted all rules that were subset of the expected one for this arch & key.
# Also isolated rules containing system calls not from this system calls group.
# Now append the expected rule if it's not present in $audit_file yet
if [[ ${append_expected_rule} -eq "0" ]]
then
echo "$full_rule" >> "$audit_file"
fi
done
}
function rhel7_fedora_perform_audit_adjtimex_settimeofday_stime_remediation {
# Perform the remediation for the 'adjtimex', 'settimeofday', and 'stime' audit
# system calls on Red Hat Enterprise Linux 7 or Fedora OSes
#
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=${ARCH} -S .* -k *"
# Create expected audit group and audit rule form for particular system call & architecture
if [ ${ARCH} = "b32" ]
then
# stime system call is known at 32-bit arch (see e.g "$ ausyscall i386 stime" 's output)
# so append it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\|stime\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -S stime -k audit_time_rules"
elif [ ${ARCH} = "b64" ]
then
# stime system call isn't known at 64-bit arch (see "$ ausyscall x86_64 stime" 's output)
# therefore don't add it to the list of time group system calls to be audited
GROUP="\(adjtimex\|settimeofday\)"
FULL_RULE="-a always,exit -F arch=${ARCH} -S adjtimex -S settimeofday -k audit_time_rules"
fi
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
fix_audit_syscall_rule "augenrules" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_replace_or_append" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting in config file or
add the configuration setting if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting in config file or add
the configuration setting if it does not exist.
Expects four arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
cce: The CCE identifier or '$CCENUM' if no CCE identifier exists
Optional arguments:
format: Optional argument to specify the format of how key/value should be
modified/appended in the configuration file. The default is key = value.
Example Call(s):
With default format of 'key = value':
replace_or_append '/etc/sysctl.conf' '^kernel.randomize_va_space' '2' '$CCENUM'
With custom key/value format:
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' 'disabled' '$CCENUM' '%s=%s'
With a variable:
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' $var_selinux_state '$CCENUM' '%s=%s'
</ns10:description>
<ns10:value>
function replace_or_append {
local config_file=$1
local key=$2
local value=$3
local cce=$4
local format=$5
# Check sanity of the input
if [ $# -lt "3" ]
then
echo "Usage: replace_or_append 'config_file_location' 'key_to_search' 'new_value'"
echo
echo "If symlinks need to be taken into account, add yes/no to the last argument"
echo "to allow to 'follow_symlinks'."
echo "Aborting."
exit 1
fi
# Test if the config_file is a symbolic link. If so, use --follow-symlinks with sed.
# Otherwise, regular sed command will do.
if test -L $config_file; then
sed_command="sed -i --follow-symlinks"
else
sed_command="sed -i"
fi
# Test that the cce arg is not empty or does not equal $CCENUM.
# If $CCENUM exists, it means that there is no CCE assigned.
if ! [ "x$cce" = x ] && [ "$cce" != '$CCENUM' ]; then
cce="CCE-${cce}"
else
cce="CCE"
fi
# Strip any search characters in the key arg so that the key can be replaced without
# adding any search characters to the config file.
stripped_key=$(sed "s/[\^=\$,;+]*//g" <<< $key)
# If there is no print format specified in the last arg, use the default format.
if ! [ "x$format" = x ] ; then
printf -v formatted_output "$format" $stripped_key $value
else
formatted_output="$stripped_key = $value"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -qi $key $config_file` ; then
$sed_command "s/$key.*/$formatted_output/g" $config_file
else
echo -ne "\n# Per $cce: Set $formatted_output in $config_file" >> $config_file
echo -ne "\n$formatted_output" >> $config_file
fi
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_firefox_js_setting" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting(s) in the Firefox
preferences JavaScript file or add the preference if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting(s) in the Firefox
preferences JavaScript file or add the preference if it does not exist.
Expects three arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
Example Call(s):
Without string or variable:
firefox_js_setting "stig_settings.js" "general.config.obscure_value" "0"
With string:
firefox_js_setting "stig_settings.js" "general.config.filename" "\"stig.cfg\""
With a string variable:
firefox_js_setting "stig_settings.js" "general.config.filename" "\"$var_config_file_name\""
</ns10:description>
<ns10:value>
function firefox_js_setting {
local firefox_js=$1
local key=$2
local value=$3
local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"
local firefox_pref="/defaults/pref"
local firefox_preferences="/defaults/preferences"
# Check sanity of input
if [ $# -lt "3" ]
then
echo "Usage: firefox_js_setting 'config_javascript_file' 'key_to_search' 'new_value'"
echo
echo "Aborting."
exit 1
fi
# Check the possible Firefox install directories
for firefox_dir in ${firefox_dirs}; do
# If the Firefox directory exists, then Firefox is installed
if [ -d "${firefox_dir}" ]; then
# Different versions of Firefox have different preferences directories, check for them and set the right one
if [ -d "${firefox_dir}/${firefox_pref}" ] ; then
local firefox_pref_dir="${firefox_dir}/${firefox_pref}"
elif [ -d "${firefox_dir}/${firefox_preferences}" ] ; then
local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
else
mkdir -m 755 -p "${firefox_dir}/${firefox_preferences}"
local firefox_pref_dir="${firefox_dir}/${firefox_preferences}"
fi
# Make sure the Firefox .js file exists and has the appropriate permissions
if ! [ -f "${firefox_pref_dir}/${firefox_js}" ] ; then
touch "${firefox_pref_dir}/${firefox_js}"
chmod 644 "${firefox_pref_dir}/${firefox_js}"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -q "^pref(\"${key}\", " "${firefox_pref_dir}/${firefox_js}"` ; then
sed -i "s/pref(\"${key}\".*/pref(\"${key}\", ${value});/g" "${firefox_pref_dir}/${firefox_js}"
else
echo "pref(\"${key}\", ${value});" >> "${firefox_pref_dir}/${firefox_js}"
fi
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value hidden="true" id="xccdf_org.ssgproject.content_value_function_firefox_cfg_setting" operator="equals" prohibitChanges="true" type="string">
<ns10:title xml:lang="en-US">Remediation function to replace configuration setting(s) in the Firefox
preferences configuration (.cfg) file or add the preference if it does not exist yet</ns10:title>
<ns10:description xml:lang="en-US">Function to replace configuration setting(s) in the Firefox
preferences configuration (.cfg) file or add the preference if it does not exist.
Expects three arguments:
config_file: Configuration file that will be modified
key: Configuration option to change
value: Value of the configuration option to change
Example Call(s):
Without string or variable:
firefox_cfg_setting "stig.cfg" "extensions.update.enabled" "false"
With string:
firefox_cfg_setting "stig.cfg" "security.default_personal_cert" "\"Ask Every Time\""
With a string variable:
firefox_cfg_setting "stig.cfg" "browser.startup.homepage\" "\"${var_default_home_page}\""
</ns10:description>
<ns10:value>
function firefox_cfg_setting {
local firefox_cfg=$1
local key=$2
local value=$3
local firefox_dirs="/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox"
# Check sanity of input
if [ $# -lt "3" ]
then
echo "Usage: firefox_cfg_setting 'config_cfg_file' 'key_to_search' 'new_value'"
echo
echo "Aborting."
exit 1
fi
# Check the possible Firefox install directories
for firefox_dir in ${firefox_dirs}; do
# If the Firefox directory exists, then Firefox is installed
if [ -d "${firefox_dir}" ]; then
# Make sure the Firefox .cfg file exists and has the appropriate permissions
if ! [ -f "${firefox_dir}/${firefox_cfg}" ] ; then
touch "${firefox_dir}/${firefox_cfg}"
chmod 644 "${firefox_dir}/${firefox_cfg}"
fi
# If the key exists, change it. Otherwise, add it to the config_file.
if `grep -q "^lockPref(\"${key}\", " "${firefox_dir}/${firefox_cfg}"` ; then
sed -i "s/lockPref(\"${key}\".*/lockPref(\"${key}\", ${value});/g" "${firefox_dir}/${firefox_cfg}"
else
echo "lockPref(\"${key}\", ${value});" >> "${firefox_dir}/${firefox_cfg}"
fi
fi
done
}
</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">Inactivity timeout</ns10:title>
<ns10:description xml:lang="en-US">Choose allowed duration of inactive SSH connections, shells, and X sessions</ns10:description>
<ns10:value>900</ns10:value>
<ns10:value selector="5_minutes">300</ns10:value>
<ns10:value selector="10_minutes">600</ns10:value>
<ns10:value selector="15_minutes">900</ns10:value>
<ns10:value selector="30_minutes">1800</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_removable_partition" operator="equals" type="string">
<ns10:title xml:lang="en-US">Removable Partition</ns10:title>
<ns10:description xml:lang="en-US">This value is used by the checks mount_option_nodev_removable_partitions, mount_option_nodev_removable_partitions,
and mount_option_nodev_removable_partitions to ensure that the correct mount options are set on partitions mounted from
removable media such as CD-ROMs, USB keys, and floppy drives. This value should be modified to reflect any removable
partitions that are required on the local system.</ns10:description>
<ns10:value selector="dev_cdrom">/dev/cdrom</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_umask_for_daemons" operator="equals" type="string">
<ns10:title xml:lang="en-US">daemon umask</ns10:title>
<ns10:description xml:lang="en-US">Enter umask for daemons</ns10:description>
<ns10:value>022</ns10:value>
<ns10:value selector="022">022</ns10:value>
<ns10:value selector="027">027</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_selinux_state" operator="equals" type="string">
<ns10:title xml:lang="en-US">SELinux state</ns10:title>
<ns10:description xml:lang="en-US">enforcing - SELinux security policy is enforced.
<html:br />permissive - SELinux prints warnings instead of enforcing.
<html:br />disabled - SELinux is fully disabled.</ns10:description>
<ns10:value>enforcing</ns10:value>
<ns10:value selector="enforcing">enforcing</ns10:value>
<ns10:value selector="permissive">permissive</ns10:value>
<ns10:value selector="disabled">disabled</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_selinux_policy_name" operator="equals" type="string">
<ns10:title xml:lang="en-US">SELinux policy</ns10:title>
<ns10:description xml:lang="en-US">Type of policy in use. Possible values are:
<html:br />targeted - Only targeted network daemons are protected.
<html:br />strict - Full SELinux protection.
<html:br />mls - Multiple levels of security</ns10:description>
<ns10:value>targeted</ns10:value>
<ns10:value selector="targeted">targeted</ns10:value>
<ns10:value selector="mls">mls</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" type="number">
<ns10:title xml:lang="en-US">minimum password length</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters in password</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only check new passwords</ns10:warning>
<ns10:value>14</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="8">8</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="12">12</ns10:value>
<ns10:value selector="14">14</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" type="number">
<ns10:title xml:lang="en-US">maximum password age</ns10:title>
<ns10:description xml:lang="en-US">Maximum age of password in days</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>60</ns10:value>
<ns10:value selector="60">60</ns10:value>
<ns10:value selector="90">90</ns10:value>
<ns10:value selector="120">120</ns10:value>
<ns10:value selector="180">180</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" type="number">
<ns10:title xml:lang="en-US">minimum password age</ns10:title>
<ns10:description xml:lang="en-US">Minimum age of password in days</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>7</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" type="number">
<ns10:title xml:lang="en-US">warning days before password expires</ns10:title>
<ns10:description xml:lang="en-US">The number of days' warning given before a password expires.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>7</ns10:value>
<ns10:value selector="0">0</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="14">14</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" type="number">
<ns10:title xml:lang="en-US">number of days after a password expires until the account is permanently disabled</ns10:title>
<ns10:description xml:lang="en-US">The number of days to wait after a password expires, until the account will be permanently disabled.</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This will only apply to newly created accounts</ns10:warning>
<ns10:value>35</ns10:value>
<ns10:value selector="30">30</ns10:value>
<ns10:value selector="35">35</ns10:value>
<ns10:value selector="40">40</ns10:value>
<ns10:value selector="60">60</ns10:value>
<ns10:value selector="90">90</ns10:value>
<ns10:value selector="180">180</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" operator="equals" type="number">
<ns10:title xml:lang="en-US">remember</ns10:title>
<ns10:description xml:lang="en-US">The last n passwords for each user are saved in
<html:code>/etc/security/opasswd</html:code> in order to force password change history and
keep the user from alternating between the same password too
frequently.</ns10:description>
<ns10:value>5</ns10:value>
<ns10:value selector="0">0</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="24">24</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_retry" operator="equals" type="number">
<ns10:title xml:lang="en-US">retry</ns10:title>
<ns10:description xml:lang="en-US">Number of retry attempts before erroring out</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" operator="equals" type="number">
<ns10:title xml:lang="en-US">maxrepeat</ns10:title>
<ns10:description xml:lang="en-US">Maximum Number of Consecutive Repeating Characters in a Password</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_minlen" operator="equals" type="number">
<ns10:title xml:lang="en-US">minlen</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters in password</ns10:description>
<ns10:value>14</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="7">7</ns10:value>
<ns10:value selector="8">8</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="12">12</ns10:value>
<ns10:value selector="14">14</ns10:value>
<ns10:value selector="15">15</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">dcredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of digits in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">ocredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of other (special characters) in
password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">lcredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of lower case in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" operator="equals" type="number">
<ns10:title xml:lang="en-US">ucredit</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of upper case in password</ns10:description>
<ns10:value>-1</ns10:value>
<ns10:value selector="2">-2</ns10:value>
<ns10:value selector="1">-1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_difok" operator="equals" type="number">
<ns10:title xml:lang="en-US">difok</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of characters not present in old
password</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Keep this high for short
passwords</ns10:warning>
<ns10:value>4</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="5">5</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_password_pam_minclass" operator="equals" type="number">
<ns10:title xml:lang="en-US">minclass</ns10:title>
<ns10:description xml:lang="en-US">Minimum number of categories of characters that must exist in a password</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="4">4</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_deny</ns10:title>
<ns10:description xml:lang="en-US">Number of failed login attempts before account lockout</ns10:description>
<ns10:value>3</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="10">10</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_unlock_time</ns10:title>
<ns10:description xml:lang="en-US">Seconds before automatic unlocking after excessive failed logins</ns10:description>
<ns10:value>604800</ns10:value>
<ns10:value selector="900">900</ns10:value>
<ns10:value selector="1800">1800</ns10:value>
<ns10:value selector="3600">3600</ns10:value>
<ns10:value selector="86400">86400</ns10:value>
<ns10:value selector="604800">604800</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" operator="equals" type="number">
<ns10:title xml:lang="en-US">fail_interval</ns10:title>
<ns10:description xml:lang="en-US">Interval for counting failed login attempts before account lockout</ns10:description>
<ns10:value>900</ns10:value>
<ns10:value selector="900">900</ns10:value>
<ns10:value selector="1800">1800</ns10:value>
<ns10:value selector="3600">3600</ns10:value>
<ns10:value selector="86400">86400</ns10:value>
<ns10:value selector="100000000">100000000</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" operator="equals" type="number">
<ns10:title xml:lang="en-US">Maximum concurrent login sessions</ns10:title>
<ns10:description xml:lang="en-US">Maximum number of concurrent sessions by a user</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="15">15</ns10:value>
<ns10:value selector="20">20</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_tmout" operator="equals" type="number">
<ns10:title xml:lang="en-US">Account Inactivity Timeout (minutes)</ns10:title>
<ns10:description xml:lang="en-US">In an interactive shell, the value is interpreted as the
number of seconds to wait for input after issueing the primary prompt.
Bash terminates after waiting for that number of seconds if input does
not arrive.</ns10:description>
<ns10:value>600</ns10:value>
<ns10:value selector="5_min">300</ns10:value>
<ns10:value selector="10_min">600</ns10:value>
<ns10:value selector="15_min">900</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" operator="equals" type="string">
<ns10:title xml:lang="en-US">Sensible umask</ns10:title>
<ns10:description xml:lang="en-US">Enter default user umask</ns10:description>
<ns10:value>027</ns10:value>
<ns10:value selector="007">007</ns10:value>
<ns10:value selector="022">022</ns10:value>
<ns10:value selector="027">027</ns10:value>
<ns10:value selector="077">077</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_login_banner_text" operator="equals" type="string">
<ns10:title xml:lang="en-US">Login Banner Verbiage</ns10:title>
<ns10:description xml:lang="en-US">Enter an appropriate login banner for your organization. Please note that new lines must
be expressed by the '\n' character and special characters like parentheses and quotation marks must be escaped with '\'.</ns10:description>
<ns10:value selector="usgcb_default">--[\s\n]+WARNING[\s\n]+--[\s\n]*This[\s\n]+system[\s\n]+is[\s\n]+for[\s\n]+the[\s\n]+use[\s\n]+of[\s\n]+authorized[\s\n]+users[\s\n]+only.[\s\n]+Individuals[\s\n]*using[\s\n]+this[\s\n]+computer[\s\n]+system[\s\n]+without[\s\n]+authority[\s\n]+or[\s\n]+in[\s\n]+excess[\s\n]+of[\s\n]+their[\s\n]*authority[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+having[\s\n]+all[\s\n]+their[\s\n]+activities[\s\n]+on[\s\n]+this[\s\n]+system[\s\n]*monitored[\s\n]+and[\s\n]+recorded[\s\n]+by[\s\n]+system[\s\n]+personnel.[\s\n]+Anyone[\s\n]+using[\s\n]+this[\s\n]*system[\s\n]+expressly[\s\n]+consents[\s\n]+to[\s\n]+such[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+advised[\s\n]+that[\s\n]*if[\s\n]+such[\s\n]+monitoring[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+criminal[\s\n]+activity[\s\n]*system[\s\n]+personal[\s\n]+may[\s\n]+provide[\s\n]+the[\s\n]+evidence[\s\n]+of[\s\n]+such[\s\n]+monitoring[\s\n]+to[\s\n]+law[\s\n]*enforcement[\s\n]+officials.</ns10:value>
<ns10:value selector="dod_default">You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+\(USG\)[\s\n]+Information[\s\n]+System[\s\n]+\(IS\)[\s\n]+that[\s\n]+is[\s\n]+provided[\s\n]+for[\s\n]+USG-authorized[\s\n]+use[\s\n]+only.[\s\n]*By[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+\(which[\s\n]+includes[\s\n]+any[\s\n]+device[\s\n]+attached[\s\n]+to[\s\n]+this[\s\n]+IS\),[\s\n]+you[\s\n]+consent[\s\n]+to[\s\n]+the[\s\n]+following[\s\n]+conditions\:[\s\n]*-[\s\n]*The[\s\n]+USG[\s\n]+routinely[\s\n]+intercepts[\s\n]+and[\s\n]+monitors[\s\n]+communications[\s\n]+on[\s\n]+this[\s\n]+IS[\s\n]+for[\s\n]+purposes[\s\n]+including,[\s\n]+but[\s\n]+not[\s\n]+limited[\s\n]+to,[\s\n]+penetration[\s\n]+testing,[\s\n]+COMSEC[\s\n]+monitoring,[\s\n]+network[\s\n]+operations[\s\n]+and[\s\n]+defense,[\s\n]+personnel[\s\n]+misconduct[\s\n]+\(PM\),[\s\n]+law[\s\n]+enforcement[\s\n]+\(LE\),[\s\n]+and[\s\n]+counterintelligence[\s\n]+\(CI\)[\s\n]+investigations.[\s\n]*-[\s\n]*At[\s\n]+any[\s\n]+time,[\s\n]+the[\s\n]+USG[\s\n]+may[\s\n]+inspect[\s\n]+and[\s\n]+seize[\s\n]+data[\s\n]+stored[\s\n]+on[\s\n]+this[\s\n]+IS.[\s\n]*-[\s\n]*Communications[\s\n]+using,[\s\n]+or[\s\n]+data[\s\n]+stored[\s\n]+on,[\s\n]+this[\s\n]+IS[\s\n]+are[\s\n]+not[\s\n]+private,[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+routine[\s\n]+monitoring,[\s\n]+interception,[\s\n]+and[\s\n]+search,[\s\n]+and[\s\n]+may[\s\n]+be[\s\n]+disclosed[\s\n]+or[\s\n]+used[\s\n]+for[\s\n]+any[\s\n]+USG-authorized[\s\n]+purpose.[\s\n]*-[\s\n]*This[\s\n]+IS[\s\n]+includes[\s\n]+security[\s\n]+measures[\s\n]+\(e.g.,[\s\n]+authentication[\s\n]+and[\s\n]+access[\s\n]+controls\)[\s\n]+to[\s\n]+protect[\s\n]+USG[\s\n]+interests[\s\n]+--[\s\n]+not[\s\n]+for[\s\n]+your[\s\n]+personal[\s\n]+benefit[\s\n]+or[\s\n]+privacy.[\s\n]*-[\s\n]*Notwithstanding[\s\n]+the[\s\n]+above,[\s\n]+using[\s\n]+this[\s\n]+IS[\s\n]+does[\s\n]+not[\s\n]+constitute[\s\n]+consent[\s\n]+to[\s\n]+PM,[\s\n]+LE[\s\n]+or[\s\n]+CI[\s\n]+investigative[\s\n]+searching[\s\n]+or[\s\n]+monitoring[\s\n]+of[\s\n]+the[\s\n]+content[\s\n]+of[\s\n]+privileged[\s\n]+communications,[\s\n]+or[\s\n]+work[\s\n]+product,[\s\n]+related[\s\n]+to[\s\n]+personal[\s\n]+representation[\s\n]+or[\s\n]+services[\s\n]+by[\s\n]+attorneys,[\s\n]+psychotherapists,[\s\n]+or[\s\n]+clergy,[\s\n]+and[\s\n]+their[\s\n]+assistants.[\s\n]+Such[\s\n]+communications[\s\n]+and[\s\n]+work[\s\n]+product[\s\n]+are[\s\n]+private[\s\n]+and[\s\n]+confidential.[\s\n]+See[\s\n]+User[\s\n]+Agreement[\s\n]+for[\s\n]+details.</ns10:value>
<ns10:value selector="dss_odaa_default">[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.[\s\n]+This[\s\n]+is[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+and[\s\n]+related[\s\n]+equipment[\s\n]+are[\s\n]+intended[\s\n]+for[\s\n]+the[\s\n]+communication,[\s\n]+transmission,[\s\n]+processing,[\s\n]+and[\s\n]+storage[\s\n]+of[\s\n]+official[\s\n]+U.S.[\s\n]+Government[\s\n]+or[\s\n]+other[\s\n]+authorized[\s\n]+information[\s\n]+only.[\s\n]+All[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times[\s\n]+to[\s\n]+ensure[\s\n]+proper[\s\n]+functioning[\s\n]+of[\s\n]+equipment[\s\n]+and[\s\n]+systems[\s\n]+including[\s\n]+security[\s\n]+devices[\s\n]+and[\s\n]+systems,[\s\n]+to[\s\n]+prevent[\s\n]+unauthorized[\s\n]+use[\s\n]+and[\s\n]+violations[\s\n]+of[\s\n]+statutes[\s\n]+and[\s\n]+security[\s\n]+regulations,[\s\n]+to[\s\n]+deter[\s\n]+criminal[\s\n]+activity,[\s\n]+and[\s\n]+for[\s\n]+other[\s\n]+similar[\s\n]+purposes.[\s\n]+Any[\s\n]+user[\s\n]+of[\s\n]+a[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+should[\s\n]+be[\s\n]+aware[\s\n]+that[\s\n]+any[\s\n]+information[\s\n]+placed[\s\n]+in[\s\n]+the[\s\n]+system[\s\n]+is[\s\n]+subject[\s\n]+to[\s\n]+monitoring[\s\n]+and[\s\n]+is[\s\n]+not[\s\n]+subject[\s\n]+to[\s\n]+any[\s\n]+expectation[\s\n]+of[\s\n]+privacy.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+reveals[\s\n]+possible[\s\n]+evidence[\s\n]+of[\s\n]+violation[\s\n]+of[\s\n]+criminal[\s\n]+statutes,[\s\n]+this[\s\n]+evidence[\s\n]+and[\s\n]+any[\s\n]+other[\s\n]+related[\s\n]+information,[\s\n]+including[\s\n]+identification[\s\n]+information[\s\n]+about[\s\n]+the[\s\n]+user,[\s\n]+may[\s\n]+be[\s\n]+provided[\s\n]+to[\s\n]+law[\s\n]+enforcement[\s\n]+officials.[\s\n]+If[\s\n]+monitoring[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+reveals[\s\n]+violations[\s\n]+of[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+unauthorized[\s\n]+use,[\s\n]+employees[\s\n]+who[\s\n]+violate[\s\n]+security[\s\n]+regulations[\s\n]+or[\s\n]+make[\s\n]+unauthorized[\s\n]+use[\s\n]+of[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+systems[\s\n]+are[\s\n]+subject[\s\n]+to[\s\n]+appropriate[\s\n]+disciplinary[\s\n]+action.[\s\n]+Use[\s\n]+of[\s\n]+this[\s\n]+or[\s\n]+any[\s\n]+other[\s\n]+DoD[\s\n]+interest[\s\n]+computer[\s\n]+system[\s\n]+constitutes[\s\n]+consent[\s\n]+to[\s\n]+monitoring[\s\n]+at[\s\n]+all[\s\n]+times.</ns10:value>
<ns10:value selector="dod_short">I\'ve[\s\n]+read[\s\n]+\&[\s\n]+consent[\s\n]+to[\s\n]+terms[\s\n]+in[\s\n]+IS[\s\n]+user[\s\n]+agreem\'t.</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Disable ICMP Redirect Acceptance</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.secure_redirects</ns10:title>
<ns10:description xml:lang="en-US">Enable to prevent hijacking of routing path by only
allowing redirects from gateways known in routing
table.</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.log_martians</ns10:title>
<ns10:description xml:lang="en-US">Disable so you don't Log Spoofed Packets, Source
Routed Packets, Redirect Packets</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Disable IP source routing?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Disable ICMP Redirect Acceptance?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.secure_redirects</ns10:title>
<ns10:description xml:lang="en-US">Log packets with impossible addresses to kernel
log?</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.icmp_echo_ignore_broadcasts</ns10:title>
<ns10:description xml:lang="en-US">Ignore all ICMP ECHO and TIMESTAMP requests sent to it
via broadcast/multicast</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.icmp_ignore_bogus_error_responses</ns10:title>
<ns10:description xml:lang="en-US">Enable to prevent unnecessary logging</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.tcp_syncookies</ns10:title>
<ns10:description xml:lang="en-US">Enable to turn on TCP SYN Cookie
Protection</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.all.rp_filter</ns10:title>
<ns10:description xml:lang="en-US">Enable to enforce sanity checking, also called ingress
filtering or egress filtering. The point is to drop a packet if the
source and destination IP addresses in the IP header do not make
sense when considered in light of the physical interface on which
it arrived.</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv4.conf.default.rp_filter</ns10:title>
<ns10:description xml:lang="en-US">Enables source route verification</ns10:description>
<ns10:value>1</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysconfig_network_IPV6_AUTOCONF_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">IPV6_AUTOCONF</ns10:title>
<ns10:description xml:lang="en-US">Toggle global IPv6 auto-configuration (only, if global
forwarding is disabled)</ns10:description>
<ns10:value>no</ns10:value>
<ns10:value selector="enabled">yes</ns10:value>
<ns10:value selector="disabled">no</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_ra</ns10:title>
<ns10:description xml:lang="en-US">Accept default router advertisements by default?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_ra_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_ra</ns10:title>
<ns10:description xml:lang="en-US">Accept all router advertisements?</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Toggle ICMP Redirect Acceptance By Default</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_redirects_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.accept_redirects</ns10:title>
<ns10:description xml:lang="en-US">Toggle ICMP Redirect Acceptance</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_source_route_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.default.accept_source_route</ns10:title>
<ns10:description xml:lang="en-US">Trackers could be using source-routed packets to
generate traffic that seems to be intra-net, but actually was
created outside and has been redirected.</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_forwarding_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">net.ipv6.conf.all.forwarding</ns10:title>
<ns10:description xml:lang="en-US">Toggle IPv6 Forwarding</ns10:description>
<ns10:value>0</ns10:value>
<ns10:value selector="enabled">1</ns10:value>
<ns10:value selector="disabled">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_file_owner_logfiles_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">User who owns log files</ns10:title>
<ns10:description xml:lang="en-US">Specify user owner of all logfiles specified in
<html:code>/etc/rsyslog.conf</html:code>.</ns10:description>
<ns10:value selector="root">root</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_file_groupowner_logfiles_value" operator="equals" type="string">
<ns10:title xml:lang="en-US">group who owns log files</ns10:title>
<ns10:description xml:lang="en-US">Specify group owner of all logfiles specified in
<html:code>/etc/rsyslog.conf.</html:code></ns10:description>
<ns10:value selector="root">root</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_num_logs" type="number">
<ns10:title xml:lang="en-US">Number of log files for auditd to retain</ns10:title>
<ns10:description xml:lang="en-US">The setting for num_logs in /etc/audit/auditd.conf</ns10:description>
<ns10:value>5</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="4">4</ns10:value>
<ns10:value selector="3">3</ns10:value>
<ns10:value selector="2">2</ns10:value>
<ns10:value selector="1">1</ns10:value>
<ns10:value selector="0">0</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" type="number">
<ns10:title xml:lang="en-US">Maximum audit log file size for auditd</ns10:title>
<ns10:description xml:lang="en-US">The setting for max_log_size in /etc/audit/auditd.conf</ns10:description>
<ns10:value>6</ns10:value>
<ns10:value selector="20">20</ns10:value>
<ns10:value selector="10">10</ns10:value>
<ns10:value selector="6">6</ns10:value>
<ns10:value selector="5">5</ns10:value>
<ns10:value selector="1">1</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when log files reach their maximum size</ns10:title>
<ns10:description xml:lang="en-US">The setting for max_log_file_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>rotate</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="rotate">rotate</ns10:value>
<ns10:value selector="keep_logs">keep_logs</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when disk space just starts to run low</ns10:title>
<ns10:description xml:lang="en-US">The setting for space_left_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>email</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="email">email</ns10:value>
<ns10:value selector="exec">exec</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="single">single</ns10:value>
<ns10:value selector="halt">halt</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" type="string">
<ns10:title xml:lang="en-US">Action for auditd to take when disk space runs dangerously low</ns10:title>
<ns10:description xml:lang="en-US">The setting for space_left_action in /etc/audit/auditd.conf</ns10:description>
<ns10:value>single</ns10:value>
<ns10:value selector="ignore">ignore</ns10:value>
<ns10:value selector="syslog">syslog</ns10:value>
<ns10:value selector="email">email</ns10:value>
<ns10:value selector="exec">exec</ns10:value>
<ns10:value selector="suspend">suspend</ns10:value>
<ns10:value selector="single">single</ns10:value>
<ns10:value selector="halt">halt</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" type="string">
<ns10:title xml:lang="en-US">Account for auditd to send email when actions occurs</ns10:title>
<ns10:description xml:lang="en-US">The setting for action_mail_acct in /etc/audit/auditd.conf</ns10:description>
<ns10:value>root</ns10:value>
<ns10:value selector="root">root</ns10:value>
<ns10:value selector="admin">admin</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_var_auditd_flush" type="string">
<ns10:title xml:lang="en-US">Auditd priority for flushing data to disk</ns10:title>
<ns10:description xml:lang="en-US">The setting for flush in /etc/audit/auditd.conf</ns10:description>
<ns10:value>data</ns10:value>
<ns10:value selector="none">none</ns10:value>
<ns10:value selector="incremental">incremental</ns10:value>
<ns10:value selector="data">data</ns10:value>
<ns10:value selector="sync">sync</ns10:value>
</ns10:Value>
<ns10:Value id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" operator="equals" type="number">
<ns10:title xml:lang="en-US">SSH session Idle time</ns10:title>
<ns10:description xml:lang="en-US">Specify duration of allowed idle time.</ns10:description>
<ns10:value>300</ns10:value>
<ns10:value selector="5_minutes">300</ns10:value>
<ns10:value selector="10_minutes">600</ns10:value>
<ns10:value selector="15_minutes">900</ns10:value>
<ns10:value selector="60_minutes">3600</ns10:value>
<ns10:value selector="120_minutes">7200</ns10:value>
</ns10:Value>
</ns10:Group><ns10:Group id="xccdf_org.ssgproject.content_group_non-pci-dss" selected="true"><ns10:title>Non PCI-DSS</ns10:title><ns10:description>Rules that are not part of PCI-DSS</ns10:description><ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_disable_entropy_contribution_for_solid_state_drives" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Solid State Drives Do Not Contribute To Random-Number Entropy Pool</ns10:title>
<ns10:description xml:lang="en-US">For each solid-state drive on the system, run:
<html:pre> # echo 0 > /sys/block/DRIVE/queue/add_random</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
In contrast to traditional electromechanical magnetic disks, containing
spinning disks and / or movable read / write heads, the solid-state storage
devices (SSDs) do not contain moving / mechanical components. Therefore the
I/O operation completion times are much more predictable for them.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="kernel_disable_entropy_contribution_for_solid_state_drives" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First obtain the list of block devices present on system into array
#
# Used lsblk options:
# -o NAME Display only block device name
# -a Display all devices (including empty ones) in the list
# -d Don't print device holders or slaves information
# -n Suppress printing of introductory heading line in the list
SYSTEM_BLOCK_DEVICES=($(/bin/lsblk -o NAME -a -d -n))
# For each SSD block device from that list
# (device where /sys/block/DEVICE/queue/rotation == 0)
for BLOCK_DEVICE in "${SYSTEM_BLOCK_DEVICES[@]}"
do
# Verify the block device is SSD
if grep -q "0" /sys/block/${BLOCK_DEVICE}/queue/rotational
then
# If particular SSD is configured to contribute to
# random-number entropy pool, disable it
if grep -q "1" /sys/block/${BLOCK_DEVICE}/queue/add_random
then
echo "0" > /sys/block/${BLOCK_DEVICE}/queue/add_random
fi
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_disable_entropy_contribution_for_solid_state_drives:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_tmp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /tmp Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>/tmp</html:code> directory is a world-writable directory used
for temporary file storage. Ensure it has its own partition or
logical volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>/tmp</html:code> partition is used as temporary storage by many programs.
Placing <html:code>/tmp</html:code> in its own partition enables the setting of more
restrictive mount options, which can help protect programs which use it.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_tmp:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_tmp_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>/var</html:code> directory is used by daemons and other system
services to store frequently-changing data. Ensure that <html:code>/var</html:code> has its own partition
or logical volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring that <html:code>/var</html:code> is mounted on its own partition enables the
setting of more restrictive mount options. This helps protect
system services such as daemons or other programs which use it.
It is not uncommon for the <html:code>/var</html:code> directory to contain
world-writable directories installed by other software packages.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var/log Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
System logs are stored in the <html:code>/var/log</html:code> directory.
Ensure that it has its own partition or logical
volume at installation time, or migrate it using LVM.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Placing <html:code>/var/log</html:code> in its own partition
enables better separation between log files
and other files in <html:code>/var/</html:code>.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var_log:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_log_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /var/log/audit Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
Audit logs are stored in the <html:code>/var/log/audit</html:code> directory. Ensure that it
has its own partition or logical volume at installation time, or migrate it
later using LVM. Make absolutely certain that it is large enough to store all
audit logs that will be created by the auditing daemon.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">137</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">138</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Placing <html:code>/var/log/audit</html:code> in its own partition
enables better separation between audit files
and other files, and helps ensure that
auditing cannot be halted due to the partition running out
of space.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_partition_for_home" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure /home Located On Separate Partition</ns10:title>
<ns10:description xml:lang="en-US">
If user home directories will be stored locally, create a separate partition
for <html:code>/home</html:code> at installation time (or migrate it later using LVM). If
<html:code>/home</html:code> will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1208</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring that <html:code>/home</html:code> is mounted on its own partition enables the
setting of more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-partition_for_home:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-partition_for_home_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_encrypt_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Encrypt Partitions</ns10:title>
<ns10:description xml:lang="en-US">
Red Hat Enterprise Linux 6 natively supports partition encryption through the
Linux Unified Key Setup-on-disk-format (LUKS) technology. The easiest way to
encrypt a partition is during installation time.
<html:br /><html:br />
For manual installations, select the <html:code>Encrypt</html:code> checkbox during
partition creation to encrypt the partition. When this
option is selected the system will prompt for a passphrase to use in
decrypting the partition. The passphrase will subsequently need to be entered manually
every time the system boots.
<html:br /><html:br />
For automated/unattended installations, it is possible to use Kickstart by adding
the <html:code>--encrypted</html:code> and <html:code>--passphrase=</html:code> options to the definition of each partition to be
encrypted. For example, the following line would encrypt the root partition:
<html:pre>part / --fstype=ext3 --size=100 --onpart=hda1 --encrypted --passphrase=<html:i>PASSPHRASE</html:i></html:pre>
Any <html:i>PASSPHRASE</html:i> is stored in the Kickstart in plaintext, and the Kickstart must then be protected accordingly.
Omitting the <html:code>--passphrase=</html:code> option from the partition definition will cause the
installer to pause and interactively ask for the passphrase during installation.
<html:br /><html:br />
Detailed information on encrypting partitions using LUKS can be found on
the Red Hat Documentation web site:<html:br />
<html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-Security_Guide-Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-Security_Guide-Encryption.html#sect-Security_Guide-LUKS_Disk_Encryption</html:a>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1019</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1199</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1200</ns10:reference>
<ns10:rationale xml:lang="en-US">
The risk of a system's physical compromise, particularly mobile systems such as
laptops, places its data at risk of compromise. Encrypting this data mitigates
the risk of its loss if the system is lost.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-encrypt_partitions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_redhat_gpgkey_installed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Red Hat GPG Key Installed</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the system can cryptographically verify base software
packages come from Red Hat (and to connect to the Red Hat Network to
receive them), the Red Hat GPG key must properly be installed.
To install the Red Hat GPG key, run:
<html:pre>$ sudo rhn_register</html:pre>
If the system is not connected to the Internet or an RHN Satellite,
then install the Red Hat GPG key from trusted media such as
the Red Hat installation CD-ROM or DVD. Assuming the disc is mounted
in <html:code>/media/cdrom</html:code>, use the following command as the root user to import
it into the keyring:
<html:pre>$ sudo rpm --import /media/cdrom/RPM-GPG-KEY</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">351</ns10:reference>
<ns10:rationale xml:lang="en-US">
The Red Hat GPG key is necessary to cryptographically verify packages
are from Red Hat.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_redhat_gpgkey_installed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># The two fingerprints below are retrieved from https://access.redhat.com/security/team/key
readonly REDHAT_RELEASE_2_FINGERPRINT="567E 347A D004 4ADE 55BA 8A5F 199E 2F91 FD43 1D51"
readonly REDHAT_AUXILIARY_FINGERPRINT="43A6 E49C 4A38 F4BE 9ABF 2A53 4568 9C88 2FA6 58E0"
# Location of the key we would like to import (once it's integrity verified)
readonly REDHAT_RELEASE_KEY="/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release"
RPM_GPG_DIR_PERMS=$(stat -c %a "$(dirname "$REDHAT_RELEASE_KEY")")
# Verify /etc/pki/rpm-gpg directory permissions are safe
if [ "${RPM_GPG_DIR_PERMS}" -le "755" ]
then
# If they are safe, try to obtain fingerprints from the key file
# (to ensure there won't be e.g. CRC error)
IFS=$'\n' GPG_OUT=($(gpg --with-fingerprint "${REDHAT_RELEASE_KEY}"))
GPG_RESULT=$?
# No CRC error, safe to proceed
if [ "${GPG_RESULT}" -eq "0" ]
then
for ITEM in "${GPG_OUT[@]}"
do
# Filter just hexadecimal fingerprints from gpg's output from
# processing of a key file
RESULT=$(echo ${ITEM} | sed -n "s/[[:space:]]*Key fingerprint = \(.*\)/\1/p" | tr -s '[:space:]')
# If fingerprint matches Red Hat's release 2 or auxiliary key import the key
if [[ ${RESULT} ]] && ([[ ${RESULT} = "${REDHAT_RELEASE_2_FINGERPRINT}" ]] || \
[[ ${RESULT} = "${REDHAT_AUXILIARY_FINGERPRINT}" ]])
then
rpm --import "${REDHAT_RELEASE_KEY}"
fi
done
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_redhat_gpgkey_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_redhat_gpgkey_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_globally_activated" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure gpgcheck Enabled In Main Yum Configuration</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>gpgcheck</html:code> option controls whether
RPM packages' signatures are always checked prior to installation.
To configure yum to check package signatures before installing
them, ensure the following line appears in <html:code>/etc/yum.conf</html:code> in
the <html:code>[main]</html:code> section:
<html:pre>gpgcheck=1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">663</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring the validity of packages' cryptographic signatures prior to
installation ensures the authenticity of the software and
protects against malicious tampering.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_gpgcheck_globally_activated" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/gpgcheck=.*/gpgcheck=1/g' /etc/yum.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_gpgcheck_globally_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_gpgcheck_globally_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_gpgcheck_never_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure gpgcheck Enabled For All Yum Package Repositories</ns10:title>
<ns10:description xml:lang="en-US">To ensure signature checking is not disabled for
any repos, remove any lines from files in <html:code>/etc/yum.repos.d</html:code> of the form:
<html:pre>gpgcheck=0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">663</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring all packages' cryptographic signatures are valid prior to
installation ensures the authenticity of the software and
protects against malicious tampering.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="ensure_gpgcheck_never_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/gpgcheck=.*/gpgcheck=1/g' /etc/yum.repos.d/*
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_gpgcheck_never_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_gpgcheck_never_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_security_patches_up_to_date" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Software Patches Installed</ns10:title>
<ns10:description xml:lang="en-US">If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
or a yum server, run the following command to install updates:
<html:pre>$ sudo yum update</html:pre>
If the system is not configured to use one of these sources, updates (in the form of RPM packages)
can be manually downloaded from the Red Hat Network and installed using <html:code>rpm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-1(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1227</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1233</ns10:reference>
<ns10:rationale xml:lang="en-US">
Installing software updates is a fundamental mitigation against
the exploitation of publicly-known vulnerabilities.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="security_patches_up_to_date" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">yum -y update
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="http://www.redhat.com/security/data/oval/Red_Hat_Enterprise_Linux_6.xml" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-security_patches_up_to_date_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_prelink" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Prelinking</ns10:title>
<ns10:description xml:lang="en-US">
The prelinking feature changes binaries in an attempt to decrease their startup
time. In order to disable it, change or add the following line inside the file
<html:code>/etc/sysconfig/prelink</html:code>:
<html:pre>PRELINKING=no</html:pre>
Next, run the following command to return binaries to a normal, non-prelinked state:
<html:pre>$ sudo /usr/sbin/prelink -ua</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Because the prelinking feature changes binaries, it can interfere with the
operation of certain software and/or modes such as AIDE, FIPS, etc.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_prelink" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Disable prelinking altogether
#
if grep -q ^PRELINKING /etc/sysconfig/prelink
then
sed -i 's/PRELINKING.*/PRELINKING=no/g' /etc/sysconfig/prelink
else
echo -e "\n# Set PRELINKING=no per security requirements" >> /etc/sysconfig/prelink
echo "PRELINKING=no" >> /etc/sysconfig/prelink
fi
#
# Undo previous prelink changes to binaries
#
/usr/sbin/prelink -ua
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_prelink:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_aide_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install AIDE</ns10:title>
<ns10:description xml:lang="en-US">
Install the AIDE package with the command:
<html:pre>$ sudo yum install aide</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:rationale xml:lang="en-US">
The AIDE package must be installed if it is to be available for integrity checking.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install aide
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure aide is installed
package:
name="{{item}}"
state=present
with_items:
- aide
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_aide_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=aide
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_aide_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_aide_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_aide_build_database" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Build and Test AIDE Database</ns10:title>
<ns10:description xml:lang="en-US">Run the following command to generate a new database:
<html:pre>$ sudo /usr/sbin/aide --init</html:pre>
By default, the database will be written to the file <html:code>/var/lib/aide/aide.db.new.gz</html:code>.
Storing the database, the configuration file <html:code>/etc/aide.conf</html:code>, and the binary
<html:code>/usr/sbin/aide</html:code> (or hashes of these files), in a secure location (such as on read-only media) provides additional assurance about their integrity.
The newly-generated database can be installed as follows:
<html:pre>$ sudo cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz</html:pre>
To initiate a manual check, run the following command:
<html:pre>$ sudo /usr/sbin/aide --check</html:pre>
If this check produces any unexpected output, investigate.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">416</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1297</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">
For AIDE to be effective, an initial database of "known-good" information about files
must be captured and it should be able to be verified against the installed files.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="aide_build_database" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">/usr/sbin/aide --init
/bin/cp -p /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-aide_build_database:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-aide_build_database_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Periodic Execution of AIDE</ns10:title>
<ns10:description xml:lang="en-US">
To implement a daily execution of AIDE at 4:05am using cron, add the following line to <html:code>/etc/crontab</html:code>:
<html:pre>05 4 * * * root /usr/sbin/aide --check</html:pre>
AIDE can be executed periodically through other means; this is merely one example.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-3(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">416</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1069</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1297</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">
By default, AIDE does not install itself for periodic execution. Periodically
running AIDE is necessary to reveal unexpected changes in installed files.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="aide_periodic_cron_checking" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "05 4 * * * root /usr/sbin/aide --check" >> /etc/crontab
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-aide_periodic_cron_checking:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-aide_periodic_cron_checking_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rpm_verify_permissions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify and Correct File Permissions with RPM</ns10:title>
<ns10:description xml:lang="en-US">
The RPM package management system can check file access
permissions of installed software packages, including many that are
important to system security.
After locating a file with incorrect permissions, run the following command to determine which package owns it:
<html:pre>$ rpm -qf <html:i>FILENAME</html:i></html:pre>
Next, run the following command to reset its permissions to
the correct values:
<html:pre>$ sudo rpm --setperms <html:i>PACKAGENAME</html:i></html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">
<html:b>Note: Due to a bug in the <html:code>gdm</html:code> package,
the RPM verify command may continue to fail even after file permissions have
been correctly set on <html:code>/var/log/gdm</html:code>. This is being tracked in Red Hat
Bugzilla #1277603.</html:b>
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1493</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1494</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1495</ns10:reference>
<ns10:rationale xml:lang="en-US">
Permissions on system binaries and configuration files that are too generous
could allow an unauthorized user to gain privileges that they should not have.
The permissions set by the vendor should be maintained. Any deviations from
this baseline should be investigated.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="rpm_verify_permissions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Declare array to hold list of RPM packages we need to correct permissions for
declare -a SETPERMS_RPM_LIST
# Create a list of files on the system having permissions different from what
# is expected by the RPM database
FILES_WITH_INCORRECT_PERMS=($(rpm -Va --nofiledigest | grep '^.M'))
# For each file path from that list:
# * Determine the RPM package the file path is shipped by,
# * Include it into SETPERMS_RPM_LIST array
for FILE_PATH in "${FILES_WITH_INCORRECT_PERMS[@]}"
do
RPM_PACKAGE=$(rpm -qf "$FILE_PATH")
SETPERMS_RPM_LIST=("${SETPERMS_RPM_LIST[@]}" "$RPM_PACKAGE")
done
# Remove duplicate mention of same RPM in $SETPERMS_RPM_LIST (if any)
SETPERMS_RPM_LIST=( $(echo "${SETPERMS_RPM_LIST[@]}" | sort -n | uniq) )
# For each of the RPM packages left in the list -- reset its permissions to the
# correct values
for RPM_PACKAGE in "${SETPERMS_RPM_LIST[@]}"
do
rpm --setperms "${RPM_PACKAGE}"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rpm_verify_permissions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rpm_verify_permissions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rpm_verify_hashes" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify File Hashes with RPM</ns10:title>
<ns10:description xml:lang="en-US">The RPM package management system can check the hashes of
installed software packages, including many that are important to system
security. Run the following command to list which files on the system
have hashes that differ from what is expected by the RPM database:
<html:pre>$ rpm -Va | grep '^..5'</html:pre>
A "c" in the second column indicates that a file is a configuration file, which
may appropriately be expected to change. If the file was not expected to
change, investigate the cause of the change using audit logs or other means.
The package can then be reinstalled to restore the file.
Run the following command to determine which package owns the file:
<html:pre>$ rpm -qf <html:i>FILENAME</html:i></html:pre>
The package can be reinstalled from a yum repository using the command:
<html:pre>$ sudo yum reinstall <html:i>PACKAGENAME</html:i></html:pre>
Alternatively, the package can be reinstalled from trusted media using the command:
<html:pre>$ sudo rpm -Uvh <html:i>PACKAGENAME</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1496</ns10:reference>
<ns10:rationale xml:lang="en-US">
The hashes of important files like system executables should match the
information given by the RPM database. Executables with erroneous hashes could
be a sign of nefarious activity on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rpm_verify_hashes:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rpm_verify_hashes_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_hids" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install Intrusion Detection Software</ns10:title>
<ns10:description xml:lang="en-US">
The base Red Hat platform already includes a sophisticated auditing system that
can detect intruder activity, as well as SELinux, which provides host-based
intrusion prevention capabilities by confining privileged programs and user
sessions which may become compromised.<html:br />
In DoD environments, supplemental intrusion detection tools, such as, the McAfee
Host-based Security System, are available to integrate with existing infrastructure.
When these supplemental tools interfere with the proper functioning of SELinux, SELinux
takes precedence.
<html:br />
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:rationale xml:lang="en-US">
Host-based intrusion detection tools provide a system-level defense when an
intruder gains access to a system or network.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-install_hids_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_antivirus" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install Virus Scanning Software</ns10:title>
<ns10:description xml:lang="en-US">
Install virus scanning software, which uses signatures to search for the
presence of viruses on the filesystem.
The McAfee VirusScan Enterprise for Linux virus scanning tool is provided for DoD systems.
Ensure virus definition files are no older than 7 days, or their last release.
Configure the virus scanning software to perform scans dynamically on all
accessed files. If this is not possible, configure the
system to scan all altered files on the system on a daily
basis. If the system processes inbound SMTP mail, configure the virus scanner
to scan all received mail.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-28</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1239</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1668</ns10:reference>
<ns10:rationale xml:lang="en-US">
Virus scanning software can be used to detect if a system has been compromised by
computer viruses, as well as to limit their spread to other systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-install_antivirus:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-install_antivirus_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dracut-fips_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the dracut-fips Package</ns10:title>
<ns10:description xml:lang="en-US">
To enable FIPS, the system requires that the <html:code>dracut-fips</html:code>
package be installed.
The <html:code>dracut-fips</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install dracut-fips</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dracut-fips_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dracut-fips_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_grub_enable_fips_mode" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable FIPS Mode in GRUB</ns10:title>
<ns10:description xml:lang="en-US">
To ensure FIPS mode is enabled, rebuild <html:code>initramfs</html:code> by running the following command:
<html:pre>dracut -f</html:pre>
After the <html:code>dracut</html:code> command has been run, add the argument <html:code>fips=1</html:code> to the default
GRUB kernel line for the Linux operating system in
<html:code>/etc/grub.conf</html:code>, in the manner below:
<html:pre>kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet fips=1</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Running <html:pre>dracut -f</html:pre> will overwrite the existing initramfs file.</ns10:warning>
<ns10:warning category="general" xml:lang="en-US">The system needs to be rebooted for these changes to take effect.</ns10:warning>
<ns10:warning category="general" xml:lang="en-US">The ability to enable FIPS does not denote FIPS compliancy or certification.
Red Hat, Inc. and Red Hat Enterprise Linux are respectively FIPS certified and compliant. Community
projects such as CentOS, Scientific Linux, etc. do not necessarily meet FIPS certification and compliancy.
Therefore, non-certified vendors and/or projects do not meet this requirement even if technically feasible.
<html:br /><html:br />
See <html:b><html:a href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm">http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm</html:a></html:b> for a list of FIPS certified
vendors.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to
protect data. The operating system must implement cryptographic modules adhering to the higher
standards approved by the federal government since this provides assurance they have been tested
and validated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-grub_enable_fips_mode:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-grub_enable_fips_mode_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_installed_OS_is_certified" selected="false" severity="high">
<ns10:title xml:lang="en-US">The Installed Operating System Is Vendor Supported and Certified</ns10:title>
<ns10:description xml:lang="en-US">
The installed operating system must be maintained and certified by a vendor.
Red Hat Enterprise Linux is supported by Red Hat, Inc. As the Red Hat Enterprise
Linux vendor, Red Hat, Inc. is responsible for providing security patches as well
as meeting and maintaining goverment certifications and standards.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-2(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
An operating system is considered "supported" if the vendor continues to provide
security patches for the product as well as maintain government certification requirements.
With an unsupported release, it will not be possible to resolve security issue discovered in
the system software as well as meet government certifications.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-installed_OS_is_certified:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-installed_OS_is_certified_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_automatic_login" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable GDM Automatic Login</ns10:title>
<ns10:description xml:lang="en-US">The GNOME Display Manager (GDM) can allow users to automatically login without
user interaction or credentials. User should always be required to authenticate themselves
to the system that they are authorized to use. To disable user ability to automatically
login to the system, set the <html:code>AutomaticLoginEnable</html:code> to <html:code>false</html:code> in the
<html:code>[daemon]</html:code> section in <html:code>/etc/gdm/custom.conf</html:code>. For example:
<html:pre>[daemon]
AutomaticLoginEnable=false</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failure to restrict system access to authenticated users negatively impacts operating
system security.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gnome_gdm_disable_automatic_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gnome_gdm_disable_automatic_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gnome_gdm_disable_guest_login" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable GDM Guest Login</ns10:title>
<ns10:description xml:lang="en-US">The GNOME Display Manager (GDM) can allow users to login without credentials
which can be useful for public kiosk scenarios. Allowing users to login without credentials
or "guest" account access has inherent security risks and should be disabled. To do disable
timed logins or guest account access, set the <html:code>TimedLoginEnable</html:code> to <html:code>false</html:code> in
the <html:code>[daemon]</html:code> section in <html:code>/etc/gdm/custom.conf</html:code>. For example:
<html:pre>[daemon]
TimedLoginEnable=false</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failure to restrict system access to authenticated users negatively impacts operating
system security.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gnome_gdm_disable_guest_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gnome_gdm_disable_guest_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_disable_user_list" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the User List</ns10:title>
<ns10:description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that displays
all known users. This functionality should be disabled.
<html:br /><html:br />
Run the following command to disable the user list:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/disable_user_list true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-23</ns10:reference>
<ns10:rationale xml:lang="en-US">Leaving the user list enabled is a security risk since it allows anyone
with physical access to the system to quickly enumerate known user accounts
without logging in.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_disable_user_list" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Disable displaying of all known system users in the GNOME Display Manager's
# login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gdm/simple-greeter/disable_user_list true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_disable_user_list:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_disable_user_list_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_restart_shutdown" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable the GNOME Login Restart and Shutdown Buttons</ns10:title>
<ns10:description xml:lang="en-US">In the default graphical environment, users logging
directly into the system are greeted with a login screen that allows
any user, known or unknown, the ability shutdown or restart
the system. This functionality should be disabled by running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/disable_restart_buttons true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
A user who is at the console can reboot the system at the login screen. If restart or shutdown buttons
are pressed at the login screen, this can create the risk of short-term loss of availability of systems
due to reboot.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_restart_shutdown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_restart_shutdown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_delay" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Inactivity Timeout</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the idle time-out value for
inactivity in the GNOME desktop to <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /> minutes:
<html:pre>$ sudo gconftool-2 \
--direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type int \
--set /desktop/gnome/session/idle_delay <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the idle delay controls when the
screensaver will start, and can be combined with
screen locking to prevent access from passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_idle_delay" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
inactivity_timeout_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" />"
# Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the idle time-out value for inactivity in the GNOME desktop to meet the
# requirement
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type int \
--set /desktop/gnome/session/idle_delay ${inactivity_timeout_value}
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_idle_delay:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_idle_delay_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_idle_activation_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">GNOME Desktop Screensaver Mandatory Use</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate the screensaver
in the GNOME desktop after a period of inactivity:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gnome-screensaver/idle_activation_enabled true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Enabling idle activation of the screensaver ensures the screensaver will
be activated after the idle delay. Applications requiring continuous,
real-time screen display (such as network management products) require the
login session does not have administrator rights and the display station is located in a
controlled-access area.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_idle_activation_enabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver activation in the GNOME desktop after a period of inactivity
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gnome-screensaver/idle_activation_enabled true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_idle_activation_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_idle_activation_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_lock_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Screen Lock Activation After Idle Period</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gnome-screensaver/lock_enabled true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">57</ns10:reference>
<ns10:rationale xml:lang="en-US">
Enabling the activation of the screen lock after an idle period
ensures password entry will be required in order to
access the system, preventing access by passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_lock_enabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver locking activation in the GNOME desktop when the
# screensaver is activated
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gnome-screensaver/lock_enabled true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_lock_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_lock_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_mode_blank" selected="false" severity="low">
<ns10:title xml:lang="en-US">Implement Blank Screensaver</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the screensaver mode
in the GNOME desktop to a blank screen:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gnome-screensaver/mode blank-only</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-11(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">60</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the screensaver mode to blank-only conceals the
contents of the display from passersby.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gnome_screensaver_mode_blank" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Set the screensaver mode in the GNOME desktop to a blank screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type string \
--set /apps/gnome-screensaver/mode blank-only
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_mode_blank:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_mode_blank_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_time" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set the maximum allowed period of inactivity for an
inactive user in the GNOME desktop to <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /> minutes:
<html:pre>$ sudo gconftool-2 \
--direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type int \
--set /desktop/gnome/session/max_idle_time <ns10:sub idref="xccdf_org.ssgproject.content_value_inactivity_timeout_value" use="legacy" /></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_max_idle_time:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_max_idle_time_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_screensaver_max_idle_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GNOME Login Maximum Allowed Inactivity Action</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to set force logout an inactive user when the
maximum allowed inactivity period has expired:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /desktop/gnome/session/max_idle_action "forced-logout"</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Terminating an idle session within a short time period reduces the window of
opportunity for unauthorized personnel to take control of a management session
and will also free up resources utilized by an idle session.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-inactivity_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_inactivity_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_screensaver_max_idle_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_screensaver_max_idle_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_ctrlaltdel_reboot" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> will reboot the system if the <html:code>Ctrl-Alt-Del</html:code>
key sequence is pressed.
<html:br />
To configure the system to ignore the <html:code>Ctrl-Alt-Del</html:code> key sequence from the
Graphical User Interface (GUI) instead of rebooting the system, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gnome_settings_daemon/keybindings/power ""</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="">TBD</ns10:reference>
<ns10:rationale xml:lang="en-US">
A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_ctrlaltdel_reboot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_ctrlaltdel_reboot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_temperature" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the GNOME Clock Temperature Feature</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/panel/applets/clock/prefs/show_temperature false</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Disabling the temperature feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_clock_temperature:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_clock_temperature_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_clock_weather" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable the GNOME Clock Weather Feature</ns10:title>
<ns10:description xml:lang="en-US">
Run the following command to activate locking of the screensaver
in the GNOME desktop when it is activated:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/panel/applets/clock/prefs/show_weather false</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Disabling the weather feature in the GNOME clock prevents the
system from connecting to the internet and diclosing the system
location when set by a user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_clock_weather:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_clock_weather_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_create" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Connection Creation in GNOME</ns10:title>
<ns10:description xml:lang="en-US"><html:code>GNOME</html:code> allows users to create ad-hoc wireless connections through the
<html:code>NetworkManager</html:code> applet. Wireless connections should be disabled by
running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-wifi-create true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_create:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_create_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_disconnect" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Disconnect Notification in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> disables WIFI notification when disconnecting from a
wireless network. This should be permanently set so that users do not connect to
a wireless network when the system finds one. While useful for mobile devices,
this setting should be disabled for all other systems. To configure the system
to disable the WIFI notication, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-disconnected-notifications true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_disconnect:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_disconnect_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_wifi_notification" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable WIFI Network Connection Notification in GNOME</ns10:title>
<ns10:description xml:lang="en-US">
By default, <html:code>GNOME</html:code> disables WIFI notification when connecting to a wireless
network. This should be permanently set so that users do not connect to a wireless
network when the system finds one. While useful for mobile devices, this setting
should be disabled for all other systems. To configure the system to disable the
WIFI notication, run the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nm-applet/disable-connected-notifications true</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Wireless network connections should not be allowed to be configured by general
users on a given system as it could open the system to backdoor attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_wifi_notification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_wifi_notification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_automount" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable GNOME Automounting</ns10:title>
<ns10:description xml:lang="en-US">The system's default desktop environment, GNOME, will mount
devices and removable media (such as DVDs, CDs and USB flash drives) whenever
they are inserted into the system. Disable automount and autorun within GNOME
by running the following:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nautilus/preferences/media_automount false
$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/nautilus/preferences/media_autorun_never true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling automatic mounting in GNOME can prevent
the introduction of malware via removable media.
It will, however, also prevent desktop users from legitimate use
of removable media.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_automount:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_automount_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gnome_disable_thumbnailers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable All GNOME Thumbnailers</ns10:title>
<ns10:description xml:lang="en-US">The system's default desktop environment, GNOME, uses
a number of different thumbnailer programs to generate thumbnails
for any new or modified content in an opened folder. The following
command can disable the execution of these thumbnail applications:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /desktop/gnome/thumbnailers/disable_all true</html:pre>
This effectively prevents an attacker from gaining access to a
system through a flaw in GNOME's Nautilus thumbnail creators.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">An attacker with knowledge of a flaw in a GNOME3 thumbnailer application could craft a malicious
file to exploit this flaw. Assuming the attacker could place the malicious file on the local filesystem
(via a web upload for example) and assuming a user browses the same location using Nautilus, the
malicious file would exploit the thumbnailer with the potential for malicious code execution. It
is best to disable these thumbnailer applications unless they are explicitly required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gnome_disable_thumbnailers:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gnome_disable_thumbnailers_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_nonroot_local_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to Non-Root Local Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices.
Legitimate character and block devices should exist only in
the <html:code>/dev</html:code> directory on the root partition or within chroot
jails built for system services.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any non-root local partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices. The only legitimate location
for device files is the <html:code>/dev</html:code> directory located on the root partition.
The only exception to this is chroot jails, for which it is not advised
to set <html:code>nodev</html:code> on these filesystems.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_nodev_nonroot_local_partitions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# NOTE: Run-time reconfiguration of partitions' mount options is not possible.
# After performing this remediation be sure to also subsequently reboot the
# system as soon as possible for the remediation to take the effect!
# Shortened ID for frequently used character class
SP="[:space:]"
# Load /etc/fstab's content with LABEL= and UUID= tags expanded to real
# device names into FSTAB_REAL_DEVICES array splitting items by newline
IFS=$'\n' FSTAB_REAL_DEVICES=($(findmnt --fstab --evaluate --noheadings))
for line in ${FSTAB_REAL_DEVICES[@]}
do
# For each line:
# * squeeze multiple space characters into one,
# * split line content info four columns (target, source, fstype, and
# mount options) by space delimiter
IFS=$' ' read TARGET SOURCE FSTYPE MOUNT_OPTIONS <<< "$(echo $line | tr -s ' ')"
# Filter the targets according to the following criteria:
# * don't include record for root partition,
# * include the target only if it has the form of '/word.*' (not to include
# special entries like e.g swap),
# * include the target only if its source has the form of '/dev.*'
# (to process only local partitions)
if [[ ! $TARGET =~ ^\/$ ]] && # Don't include root partition
[[ $TARGET =~ ^\/[A-Za-z0-9_] ]] && # Include if target =~ '/word.*'
[[ $SOURCE =~ ^\/dev ]] # Include if source =~ '/dev.*'
then
# Check the mount options column if it doesn't contain 'nodev' keyword yet
if ! grep -q "nodev" <<< "$MOUNT_OPTIONS"
then
# Check if current mount options is empty string ('') meaning
# particular /etc/fstab row contain just 'defaults' keyword
if [[ ${#MOUNT_OPTIONS} == "0" ]]
then
# If so, add 'defaults' back and append 'nodev' keyword
MOUNT_OPTIONS="defaults,nodev"
else
# Otherwise append just 'nodev' keyword
MOUNT_OPTIONS="$MOUNT_OPTIONS,nodev"
fi
# Escape possible slash ('/') characters in target for use as sed
# expression below
TARGET_ESCAPED=${TARGET//$'/'/$'\/'}
# This target doesn't contain 'nodev' in mount options yet (and meets
# the above filtering criteria). Therefore obtain particular /etc/fstab's
# row into FSTAB_TARGET_ROW variable separating the mount options field with
# hash '#' character
FSTAB_TARGET_ROW=$(sed -n "s/\(.*$TARGET_ESCAPED[$SP]\+$FSTYPE[$SP]\+\)\([^$SP]\+\)/\1#\2#/p" /etc/fstab)
# Split the retrieved value by the hash '#' delimiter to get the
# row's head & tail (i.e. columns other than mount options) which won't
# get modified
IFS=$'#' read TARGET_HEAD TARGET_OPTS TARGET_TAIL <<< "$FSTAB_TARGET_ROW"
# Replace old mount options for particular /etc/fstab's row (for this target
# and fstype) with new mount options
sed -i "s#${TARGET_HEAD}\(.*\)${TARGET_TAIL}#${TARGET_HEAD}${MOUNT_OPTIONS}${TARGET_TAIL}#" /etc/fstab
fi
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_nonroot_local_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option prevents files from being
interpreted as character or block devices.
Legitimate character and block devices should exist only in
the <html:code>/dev</html:code> directory on the root partition or within chroot
jails built for system services.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. An exception to this is chroot jails, and it is
not advised to set <html:code>nodev</html:code> on partitions which contain their root
filesystems.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_removable_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_noexec_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option prevents the direct
execution of binaries on the mounted filesystem.
Preventing the direct execution of binaries from removable media (such as a USB
key) provides a defense against malicious software that may be present on such
untrusted media.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">87</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from removable media such as USB keys exposes
the system to potential compromise.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_noexec_removable_partitions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_noexec_removable_partitions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nosuid_removable_partitions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to Removable Media Partitions</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option prevents set-user-identifier (SUID)
and set-group-identifier (SGID) permissions from taking effect. These permissions
allow users to execute binaries with the same permissions as the owner and group
of the file respectively. Users should not be allowed to introduce SUID and SGID
files into the system via partitions mounted from removeable media.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any removable media partitions.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Allowing
users to introduce SUID or SGID binaries from partitions mounted off of
removable media would allow them to introduce their own highly-privileged programs.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_removable_partition:var:1" value-id="xccdf_org.ssgproject.content_value_var_removable_partition" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nosuid_removable_partitions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_nodev" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>nodev</html:code> mount option can be used to prevent device files from
being created in <html:code>/tmp</html:code>.
Legitimate character and block devices should not exist
within temporary directories like <html:code>/tmp</html:code>.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. The only exception to this is chroot jails.</ns10:rationale>
<ns10:fix complexity="low" disruption="high" id="mount_option_tmp_nodev" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
part /tmp -mountoptions="nodev"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_nodev:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_noexec" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option can be used to prevent binaries
from being executed out of <html:code>/tmp</html:code>.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from world-writable directories
such as <html:code>/tmp</html:code> should never be necessary in normal operation and
can expose the system to potential compromise.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_noexec:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_tmp_nosuid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option can be used to prevent
execution of setuid programs in <html:code>/tmp</html:code>. The SUID and SGID permissions
should not be required in these world-writable directories.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/tmp</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from temporary storage partitions.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_tmp_nosuid:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nodev" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nodev Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nodev</html:code> mount option can be used to prevent creation
of device files in <html:code>/dev/shm</html:code>.
Legitimate character and block devices should not exist
within temporary directories like <html:code>/dev/shm</html:code>.
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The only legitimate location for device files is the <html:code>/dev</html:code> directory
located on the root partition. The only exception to this is chroot jails.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_nodev" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'dev' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)dev'
if [ $? -eq 0 ]
then
# 'dev' option found, replace with 'nodev'
DEV_SHM_OPTS=${DEV_SHM_OPTS//dev/nodev}
fi
# at least one 'nodev' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'nodev'
if [ $? -eq 0 ]
then
# 'nodev' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,nodev"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_nodev:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_noexec" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add noexec Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>noexec</html:code> mount option can be used to prevent binaries
from being executed out of <html:code>/dev/shm</html:code>.
It can be dangerous to allow the execution of binaries
from world-writable temporary storage directories such as <html:code>/dev/shm</html:code>.
Add the <html:code>noexec</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing users to execute binaries from world-writable directories
such as <html:code>/dev/shm</html:code> can expose the system to potential compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_noexec" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'exec' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)exec'
if [ $? -eq 0 ]
then
# 'exec' option found, replace with 'noexec'
DEV_SHM_OPTS=${DEV_SHM_OPTS//exec/noexec}
fi
# at least one 'noexec' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'noexec'
if [ $? -eq 0 ]
then
# 'noexec' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,noexec"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_noexec:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_dev_shm_nosuid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Add nosuid Option to /dev/shm</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>nosuid</html:code> mount option can be used to prevent execution
of setuid programs in <html:code>/dev/shm</html:code>. The SUID and SGID permissions should not
be required in these world-writable directories.
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
<html:code>/dev/shm</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of SUID and SGID executables should be tightly controlled. Users
should not be able to execute SUID or SGID binaries from temporary storage partitions.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_dev_shm_nosuid" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Load /etc/fstab's /dev/shm row into DEV_SHM_FSTAB variable separating start &
# end of the filesystem mount options (4-th field) with the '#' character
DEV_SHM_FSTAB=$(sed -n "s/\(.*[[:space:]]\+\/dev\/shm[[:space:]]\+tmpfs[[:space:]]\+\)\([^[:space:]]\+\)/\1#\2#/p" /etc/fstab)
#Rest of script can trash /etc/fstab if $DEV_SHM_FSTAB is empty, check before continuing.
echo $DEV_SHM_FSTAB | grep -q -P '/dev/shm'
if [ $? -eq 0 ]; then
# Save the:
# * 1-th, 2-nd, 3-rd fields into DEV_SHM_HEAD variable
# * 4-th field into DEV_SHM_OPTS variable, and
# * 5-th, and 6-th fields into DEV_SHM_TAIL variable
# splitting DEV_SHM_FSTAB variable value based on the '#' separator
IFS='#' read DEV_SHM_HEAD DEV_SHM_OPTS DEV_SHM_TAIL <<< "$DEV_SHM_FSTAB"
# Replace occurrence of 'defaults' key with the actual list of mount options
# for Red Hat Enterprise Linux 6
DEV_SHM_OPTS=${DEV_SHM_OPTS//defaults/rw,suid,dev,exec,auto,nouser,async,relatime}
# 'suid' option (not prefixed with 'no') present in the list?
echo $DEV_SHM_OPTS | grep -q -P '(?<!no)suid'
if [ $? -eq 0 ]
then
# 'suid' option found, replace with 'nosuid'
DEV_SHM_OPTS=${DEV_SHM_OPTS//suid/nosuid}
fi
# at least one 'nosuid' present in the options list?
echo $DEV_SHM_OPTS | grep -q -v 'nosuid'
if [ $? -eq 0 ]
then
# 'nosuid' not found yet, append it
DEV_SHM_OPTS="$DEV_SHM_OPTS,nosuid"
fi
# DEV_SHM_OPTS now contains final list of mount options. Replace original form of /dev/shm row
# in /etc/fstab with the corrected version
sed -i "s#${DEV_SHM_HEAD}\(.*\)${DEV_SHM_TAIL}#${DEV_SHM_HEAD}${DEV_SHM_OPTS}${DEV_SHM_TAIL}#" /etc/fstab
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_dev_shm_nosuid:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_var_tmp_bind" selected="false" severity="low">
<ns10:title xml:lang="en-US">Bind Mount /var/tmp To /tmp</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>/var/tmp</html:code> directory is a world-writable directory.
Bind-mount it to <html:code>/tmp</html:code> in order to consolidate temporary storage into
one location protected by the same techniques as <html:code>/tmp</html:code>. To do so, edit
<html:code>/etc/fstab</html:code> and add the following line:
<html:pre>/tmp /var/tmp none rw,nodev,noexec,nosuid,bind 0 0</html:pre>
See the <html:code>mount(8)</html:code> man page for further explanation of bind mounting.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Having multiple locations for temporary storage is not required. Unless absolutely
necessary to meet requirements, the storage location <html:code>/var/tmp</html:code> should be bind mounted to
<html:code>/tmp</html:code> and thus share the same protections.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="mount_option_var_tmp_bind" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Delete particular /etc/fstab's row if /var/tmp is already configured to
# represent a mount point (for some device or filesystem other than /tmp)
if grep -q -P '.*\/var\/tmp.*' /etc/fstab
then
sed -i '/.*\/var\/tmp.*/d' /etc/fstab
fi
# Bind-mount /var/tmp to /tmp via /etc/fstab (preserving the /etc/fstab form)
printf "%-24s%-24s%-8s%-32s%-3s\n" "/tmp" "/var/tmp" "none" "rw,nodev,noexec,nosuid,bind" "0 0" >> /etc/fstab
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_var_tmp_bind:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_usb-storage_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Modprobe Loading of USB Storage Driver</ns10:title>
<ns10:description xml:lang="en-US">
To prevent USB storage devices from being used, configure the kernel module loading system
to prevent automatic loading of the USB storage driver.
To configure the system to prevent the <html:code>usb-storage</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install usb-storage /bin/true</html:pre>
This will prevent the <html:code>modprobe</html:code> program from loading the <html:code>usb-storage</html:code>
module, but will not prevent an administrator (or another program) from using the
<html:code>insmod</html:code> program to load the module manually.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">USB storage devices such as thumb drives can be used to introduce
malicious software.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_usb-storage_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install usb-storage /bin/true" > /etc/modprobe.d/usb-storage.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_usb-storage_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'usb-storage' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- usb-storage
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_usb-storage_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_usb-storage_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_nousb_argument" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Kernel Support for USB via Bootloader Configuration</ns10:title>
<ns10:description xml:lang="en-US">
All USB support can be disabled by adding the <html:code>nousb</html:code>
argument to the kernel's boot loader configuration. To do so,
append "nousb" to the kernel line in <html:code>/etc/grub.conf</html:code> as shown:
<html:pre>kernel /vmlinuz-<html:i>VERSION</html:i> ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet nousb</html:pre>
<html:i><html:b>WARNING:</html:b> Disabling all kernel support for USB will cause problems for
systems with USB-based keyboards, mice, or printers. This configuration is
infeasible for systems which require USB devices, which is common.</html:i></ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the USB subsystem within the Linux kernel at system boot will
protect against potentially malicious USB devices, although it is only practical
in specialized systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_nousb_argument:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_disable_usb_boot" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Booting from USB Devices in Boot Firmware</ns10:title>
<ns10:description xml:lang="en-US">Configure the system boot firmware (historically called BIOS on PC
systems) to disallow booting from USB drives.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1250</ns10:reference>
<ns10:rationale xml:lang="en-US">Booting a system from a USB device would allow an attacker to
circumvent any security measures provided by the operating system. Attackers
could mount partitions and modify the configuration of the OS.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_assign_password" selected="false" severity="low">
<ns10:title xml:lang="en-US">Assign Password to Prevent Changes to Boot Firmware Configuration</ns10:title>
<ns10:description xml:lang="en-US">Assign a password to the system boot firmware (historically called BIOS on PC
systems) to require a password for any configuration changes.
</ns10:description>
<ns10:rationale xml:lang="en-US">Assigning a password to the system boot firmware prevents anyone
with physical access from configuring the system to boot
from local media and circumvent the operating system's access controls.
For systems in physically secure locations, such as
a data center or Sensitive Compartmented Information Facility (SCIF), this risk must be weighed
against the risk of administrative personnel being unable to conduct recovery operations in
a timely fashion.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_autofs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable the Automounter</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>autofs</html:code> daemon mounts and unmounts filesystems, such as user
home directories shared via NFS, on demand. In addition, autofs can be used to handle
removable media, and the default configuration provides the cdrom device as <html:code>/misc/cd</html:code>.
However, this method of providing access to removable media is not common, so autofs
can almost always be disabled if NFS is not in use. Even if NFS is required, it may be
possible to configure filesystem mounts statically by editing <html:code>/etc/fstab</html:code>
rather than relying on the automounter.
<html:br /><html:br />
The <html:code>autofs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig autofs off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-19(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the automounter permits the administrator to
statically control filesystem mounting through <html:code>/etc/fstab</html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_autofs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable autofs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_autofs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service autofs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- autofs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_autofs_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_autofs_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_cramfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of cramfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>cramfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install cramfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_cramfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install cramfs /bin/true" > /etc/modprobe.d/cramfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_cramfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'cramfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- cramfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_cramfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_freevxfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of freevxfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>freevxfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install freevxfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_freevxfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install freevxfs /bin/true" > /etc/modprobe.d/freevxfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_freevxfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'freevxfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- freevxfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_freevxfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_jffs2_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of jffs2</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>jffs2</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install jffs2 /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_jffs2_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install jffs2 /bin/true" > /etc/modprobe.d/jffs2.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_jffs2_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'jffs2' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- jffs2
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_jffs2_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_hfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of hfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>hfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install hfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install hfs /bin/true" > /etc/modprobe.d/hfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'hfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- hfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_hfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_hfsplus_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of hfsplus</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>hfsplus</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install hfsplus /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfsplus_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install hfsplus /bin/true" > /etc/modprobe.d/hfsplus.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_hfsplus_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'hfsplus' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- hfsplus
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_hfsplus_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_squashfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of squashfs</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>squashfs</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install squashfs /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_squashfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install squashfs /bin/true" > /etc/modprobe.d/squashfs.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_squashfs_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'squashfs' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- squashfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_squashfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_udf_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Mounting of udf</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to prevent the <html:code>udf</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install udf /bin/true</html:pre>
This effectively prevents usage of this uncommon filesystem.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Linux kernel modules which implement filesystems that are not needed by the
local system should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_udf_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install udf /bin/true" > /etc/modprobe.d/udf.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_udf_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'udf' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- udf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_udf_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_userowner_shadow_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/shadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="userowner_shadow_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-userowner_shadow_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-userowner_shadow_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_groupowner_shadow_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/shadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file stores password hashes. Protection of this file is
critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="groupowner_shadow_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-groupowner_shadow_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-groupowner_shadow_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_shadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on shadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/shadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0000 /etc/shadow</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/shadow</html:code> file contains the list of local
system accounts and stores password hashes. Protection of this file is
critical for system security. Failure to give ownership of this file
to root provides the designated owner with access to sensitive information
which could weaken the system security posture.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_shadow" reboot="false" strategy="configure" system="urn:xccdf:fix:script:sh">chmod 0000 /etc/shadow
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_shadow" reboot="false" strategy="configure" system="urn:xccdf:fix:script:ansible">- name: Ensure permission 0000 on /etc/shadow
file:
path="{{item}}"
mode=0000
with_items:
- /etc/shadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_shadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_shadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/group </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/group </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_group" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on group File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/group</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 644 /etc/group</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/group</html:code> file contains information regarding groups that are configured
on the system. Protection of this file is important for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_group" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 644 /etc/group
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_group:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_group_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/gshadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/gshadow </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_gshadow" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on gshadow File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/gshadow</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0000 /etc/gshadow</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/gshadow</html:code> file contains group password hashes. Protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_gshadow" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 0000 /etc/gshadow
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_gshadow:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_gshadow_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_owner_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify User Who Owns passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/passwd </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_owner_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_owner_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_owner_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_groupowner_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Group Who Owns passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the group owner of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/passwd </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>/etc/passwd</html:code> file contains information about the users that are configured on
the system. Protection of this file is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_groupowner_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_groupowner_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_groupowner_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_etc_passwd" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Permissions on passwd File</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the permissions of <html:code>/etc/passwd</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 0644 /etc/passwd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">If the <html:code>/etc/passwd</html:code> file is writable by a group-owner or the
world the risk of its compromise is increased. The file contains the list of
accounts on the system and associated information, and protection of this file
is critical for system security.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_etc_passwd" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 0644 /etc/passwd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_etc_passwd:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_etc_passwd_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_library_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that Shared Library Files Have Restrictive Permissions</ns10:title>
<ns10:description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre>/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are
stored in <html:code>/lib/modules</html:code>. All files in these directories
should not be group-writable or world-writable. If any file in these
directories is found to be group-writable or world-writable, correct
its permission with the following command:
<html:pre>$ sudo chmod go-w <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Restrictive permissions are necessary to protect the integrity of the system.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_library_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">DIRS="/lib /lib64 /usr/lib /usr/lib64"
for dirPath in $DIRS; do
find $dirPath -perm /022 -type f -exec chmod go-w '{}' \;
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_library_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_library_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_library_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that Shared Library Files Have Root Ownership</ns10:title>
<ns10:description xml:lang="en-US">System-wide shared library files, which are linked to executables
during process load time or run time, are stored in the following directories
by default:
<html:pre>/lib
/lib64
/usr/lib
/usr/lib64
</html:pre>
Kernel modules, which can be added to the kernel during runtime, are also
stored in <html:code>/lib/modules</html:code>. All files in these directories should be
owned by the <html:code>root</html:code> user. If the directory, or any file in these
directories, is found to be owned by a user other than root correct its
ownership with the following command:
<html:pre>$ sudo chown root <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">Files from shared library directories are loaded into the address
space of processes (including privileged ones) or of the kernel itself at
runtime. Proper ownership is necessary to protect the integrity of the system.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_library_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">for LIBDIR in /usr/lib /usr/lib64 /lib /lib64
do
if [ -d $LIBDIR ]
then
find -L $LIBDIR \! -user root -exec chown root {} \;
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_library_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_library_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_binary_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that System Executables Have Restrictive Permissions</ns10:title>
<ns10:description xml:lang="en-US">
System executables are stored in the following directories by default:
<html:pre>/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should not be group-writable or world-writable.
If any file <html:i>FILE</html:i> in these directories is found
to be group-writable or world-writable, correct its permission with the
following command:
<html:pre>$ sudo chmod go-w <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">System binaries are executed by privileged users, as well as system services,
and restrictive permissions are necessary to ensure execution of these programs
cannot be co-opted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_binary_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">DIRS="/bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin /usr/libexec"
for dirPath in $DIRS; do
find "$dirPath" -perm /022 -exec chmod go-w '{}' \;
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_binary_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_binary_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_binary_dirs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify that System Executables Have Root Ownership</ns10:title>
<ns10:description xml:lang="en-US">
System executables are stored in the following directories by default:
<html:pre>/bin
/sbin
/usr/bin
/usr/libexec
/usr/local/bin
/usr/local/sbin
/usr/sbin</html:pre>
All files in these directories should be owned by the <html:code>root</html:code> user.
If any file <html:i>FILE</html:i> in these directories is found
to be owned by a user other than root, correct its ownership with the
following command:
<html:pre>$ sudo chown root <html:i>FILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:rationale xml:lang="en-US">System binaries are executed by privileged users as well as system services,
and restrictive permissions are necessary to ensure that their
execution of these programs cannot be co-opted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_binary_dirs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">find /bin/ \
/usr/bin/ \
/usr/local/bin/ \
/sbin/ \
/usr/sbin/ \
/usr/local/sbin/ \
/usr/libexec \
\! -user root -execdir chown root {} \;
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_binary_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_binary_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_sticky_bits" selected="false" severity="low">
<ns10:title xml:lang="en-US">Verify that All World-Writable Directories Have Sticky Bits Set</ns10:title>
<ns10:description xml:lang="en-US">When the so-called 'sticky bit' is set on a directory,
only the owner of a given file may remove that file from the
directory. Without the sticky bit, any user with write access to a
directory may remove any file in the directory. Setting the sticky
bit prevents users from removing each other's files. In cases where
there is no reason for a directory to be world-writable, a better
solution is to remove that permission rather than to set the sticky
bit. However, if a directory is used by a particular application,
consult that application's documentation instead of blindly
changing modes.
<html:br />
To set the sticky bit on a world-writable directory <html:i>DIR</html:i>, run the
following command:
<html:pre>$ sudo chmod +t <html:i>DIR</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure.
<html:br /><html:br />
The only authorized public directories are those temporary directories supplied with the system,
or those designed to be temporary file repositories. The setting is normally reserved for directories
used by the system, by users for temporary file storage (such as <html:code>/tmp</html:code>), and for directories
requiring global read/write access.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_world_writable_sticky_bits:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-dir_perms_world_writable_sticky_bits_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_world_writable" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure No World-Writable Files Exist</ns10:title>
<ns10:description xml:lang="en-US">It is generally a good idea to remove global (other) write
access to a file when it is discovered. However, check with
documentation for specific applications before making changes.
Also, monitor for recurring world-writable files, as these may be
symptoms of a misconfigured application or user
account.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Data in world-writable files can be modified by any
user on the system. In almost all circumstances, files can be
configured using a combination of user and group permissions to
support whatever legitimate access is needed without the risk
caused by world-writable files.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_world_writable:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_world_writable_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_sgid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All SGID Executables Are Authorized</ns10:title>
<ns10:description xml:lang="en-US">The SGID (set group id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SGID files.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Executable files with the SGID permission run with the privileges of
the owner of the file. SGID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_sgid:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_sgid_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_unauthorized_suid" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All SUID Executables Are Authorized</ns10:title>
<ns10:description xml:lang="en-US">The SUID (set user id) bit should be set only on files that were
installed via authorized means. A straightforward means of identifying
unauthorized SGID files is determine if any were not installed as part of an
RPM package, which is cryptographically verified. Investigate the origin
of any unpackaged SUID files.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Executable files with the SUID permission run with the privileges of
the owner of the file. SUID files of uncertain provenance could allow for
unprivileged users to elevate privileges. The presence of these files should be
strictly controlled on the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_unauthorized_suid:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_unauthorized_suid_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_files_unowned_by_user" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Files Are Owned by a User</ns10:title>
<ns10:description xml:lang="en-US">If any files are not owned by a user, then the
cause of their lack of ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate user.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">224</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_files_unowned_by_user:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_files_unowned_by_user_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_ungroupowned" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Files Are Owned by a Group</ns10:title>
<ns10:description xml:lang="en-US">If any files are not owned by a group, then the
cause of their lack of group-ownership should be investigated.
Following this, the files should be deleted or assigned to an
appropriate group.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">224</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unowned files do not directly imply a security problem, but they are generally
a sign that something is amiss. They may
be caused by an intruder, by incorrect software installation or
draft software removal, or by failure to remove all files belonging
to a deleted account. The files should be repaired so they
will not cause problems when accounts are created in the future,
and the cause should be discovered and addressed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_ungroupowned:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_ungroupowned_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_world_writable_system_owned" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All World-Writable Directories Are Owned by a System Account</ns10:title>
<ns10:description xml:lang="en-US">All directories in local partitions which are
world-writable should be owned by root or another
system account. If any world-writable directories are not
owned by a system account, this should be investigated.
Following this, the files should be deleted or assigned to an
appropriate group.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">
Allowing a user account to own a world-writable directory is
undesirable because it allows the owner of that directory to remove
or replace any files that may be placed in the directory by other
users.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_world_writable_system_owned:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-dir_perms_world_writable_system_owned_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_umask_for_daemons" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Daemon Umask</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/init.d/functions</html:code> includes initialization
parameters for most or all daemons started at boot time. The default umask of
022 prevents creation of group- or world-writable files. To set the default
umask for daemons, edit the following line, inserting 022 or 027 for
<html:i>umask</html:i> appropriately:
<html:pre>umask <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" use="legacy" /></html:i></html:pre>
Setting the umask to too restrictive a setting can cause serious errors at
runtime. Many daemons on the system already individually restrict themselves to
a umask of 077 in their own init scripts.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask influences the permissions assigned to files created by a
process at run time. An unnecessarily permissive umask could result in files
being created with insecure permissions.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="umask_for_daemons" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_umask_for_daemons="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_umask_for_daemons" use="legacy" />"
grep -q ^umask /etc/init.d/functions && \
sed -i "s/umask.*/umask $var_umask_for_daemons/g" /etc/init.d/functions
if ! [ $? -eq 0 ]; then
echo "umask $var_umask_for_daemons" >> /etc/init.d/functions
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_umask_for_daemons:var:1" value-id="xccdf_org.ssgproject.content_value_var_umask_for_daemons" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-umask_for_daemons:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-umask_for_daemons_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_users_coredumps" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Core Dumps for All Users</ns10:title>
<ns10:description xml:lang="en-US">To disable core dumps for all users, add the following line to
<html:code>/etc/security/limits.conf</html:code>:
<html:pre>* hard core 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:rationale xml:lang="en-US">A core dump includes a memory image taken at the time the operating system
terminates an application. The memory image could contain sensitive data and is generally useful
only for developers trying to debug problems.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_users_coredumps" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "* hard core 0" >> /etc/security/limits.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_users_coredumps:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_users_coredumps_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Core Dumps for SUID programs</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>fs.suid_dumpable</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w fs.suid_dumpable=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">fs.suid_dumpable = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:rationale xml:lang="en-US">The core dump of a setuid program is more likely to contain
sensitive data, as the program itself runs with greater privileges than the
user who initiated execution of the program. Disabling the ability for any
setuid program to write a core file decreases the risk of unauthorized access
of such data.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_fs_suid_dumpable" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for fs.suid_dumpable
#
/sbin/sysctl -q -n -w fs.suid_dumpable=0
#
# If fs.suid_dumpable present in /etc/sysctl.conf, change value to "0"
# else, add "fs.suid_dumpable = 0" to /etc/sysctl.conf
#
if grep --silent ^fs.suid_dumpable /etc/sysctl.conf ; then
sed -i 's/^fs.suid_dumpable.*/fs.suid_dumpable = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set fs.suid_dumpable to 0 per security requirements" >> /etc/sysctl.conf
echo "fs.suid_dumpable = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_fs_suid_dumpable:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_fs_suid_dumpable_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_exec_shield" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable ExecShield</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.exec-shield</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.exec-shield=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.exec-shield = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-39</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2530</ns10:reference>
<ns10:rationale xml:lang="en-US">ExecShield uses the segmentation feature on all x86 systems
to prevent execution in memory higher than a certain address. It
writes an address as a limit in the code segment descriptor, to
control where code can be executed, on a per-process basis. When
the kernel places a process's memory regions such as the stack and
heap higher than this address, the hardware prevents execution in that
address range.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_exec_shield" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.exec-shield
#
/sbin/sysctl -q -n -w kernel.exec-shield=1
#
# If kernel.exec-shield present in /etc/sysctl.conf, change value to "1"
# else, add "kernel.exec-shield = 1" to /etc/sysctl.conf
#
if grep --silent ^kernel.exec-shield /etc/sysctl.conf ; then
sed -i 's/^kernel.exec-shield.*/kernel.exec-shield = 1/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.exec-shield to 1 per security requirements" >> /etc/sysctl.conf
echo "kernel.exec-shield = 1" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_exec_shield:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_exec_shield_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Randomized Layout of Virtual Address Space</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.randomize_va_space</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.randomize_va_space=2</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.randomize_va_space = 2</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-30(2)</ns10:reference>
<ns10:rationale xml:lang="en-US"> Address space layout randomization (ASLR) makes it more difficult
for an attacker to predict the location of attack code they have introduced
into a process's address space during an attempt at exploitation. Additionally, ASLR
makes it more difficult for an attacker to know the location of existing code
in order to re-purpose it using return oriented programming (ROP) techniques.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_randomize_va_space" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.randomize_va_space
#
/sbin/sysctl -q -n -w kernel.randomize_va_space=2
#
# If kernel.randomize_va_space present in /etc/sysctl.conf, change value to "2"
# else, add "kernel.randomize_va_space = 2" to /etc/sysctl.conf
#
if grep --silent ^kernel.randomize_va_space /etc/sysctl.conf ; then
sed -i 's/^kernel.randomize_va_space.*/kernel.randomize_va_space = 2/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.randomize_va_space to 2 per security requirements" >> /etc/sysctl.conf
echo "kernel.randomize_va_space = 2" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_randomize_va_space:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_randomize_va_space_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_install_PAE_kernel_on_x86-32" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install PAE Kernel on Supported 32-bit x86 Systems</ns10:title>
<ns10:description xml:lang="en-US">Systems that are using the 64-bit x86 kernel package
do not need to install the kernel-PAE package because the 64-bit
x86 kernel already includes this support. However, if the system is
32-bit and also supports the PAE and NX features as
determined in the previous section, the kernel-PAE package should
be installed to enable XD or NX support:
<html:pre>$ sudo yum install kernel-PAE</html:pre>
The installation process should also have configured the
bootloader to load the new kernel at boot. Verify this at reboot
and modify <html:code>/etc/grub.conf</html:code> if necessary.</ns10:description>
<ns10:warning category="hardware" xml:lang="en-US">The kernel-PAE package should not be
installed on older systems that do not support the XD or NX bit, as
this may prevent them from booting.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:rationale xml:lang="en-US">On 32-bit systems that support the XD or NX bit, the vendor-supplied
PAE kernel is required to enable either Execute Disable (XD) or No Execute (NX) support.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bios_enable_execution_restrictions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable NX or XD Support in the BIOS</ns10:title>
<ns10:description xml:lang="en-US">Reboot the system and enter the BIOS or Setup configuration menu.
Navigate the BIOS configuration menu and make sure that the option is enabled. The setting may be located
under a Security section. Look for Execute Disable (XD) on Intel-based systems and No Execute (NX)
on AMD-based systems.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:rationale xml:lang="en-US">Computers with the ability to prevent this type of code execution frequently put an option in the BIOS that will
allow users to turn the feature on or off at will.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_kernel_dmesg_restrict" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Access to Kernel Message Buffer</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>kernel.dmesg_restrict</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w kernel.dmesg_restrict=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">kernel.dmesg_restrict = 1</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unprivileged access to the kernel syslog can expose sensitive kernel
address information.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_kernel_dmesg_restrict" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for kernel.dmesg_restrict
#
/sbin/sysctl -q -n -w kernel.dmesg_restrict=1
#
# If kernel.dmesg_restrict present in /etc/sysctl.conf, change value to "1"
# else, add "kernel.dmesg_restrict = 1" to /etc/sysctl.conf
#
if grep --silent ^kernel.dmesg_restrict /etc/sysctl.conf ; then
sed -i 's/^kernel.dmesg_restrict.*/kernel.dmesg_restrict = 1/g' /etc/sysctl.conf
else
echo -e "\n# Set kernel.dmesg_restrict to 1 per security requirements" >> /etc/sysctl.conf
echo "kernel.dmesg_restrict = 1" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_kernel_dmesg_restrict:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_kernel_dmesg_restrict_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_enable_selinux_bootloader" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure SELinux Not Disabled in /etc/grub.conf</ns10:title>
<ns10:description xml:lang="en-US">SELinux can be disabled at boot time by an argument in
<html:code>/etc/grub.conf</html:code>.
Remove any instances of <html:code>selinux=0</html:code> from the kernel arguments in that
file to prevent SELinux from being disabled at boot.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling a major host protection feature, such as SELinux, at boot time prevents
it from confining system services at boot time. Further, it increases
the chances that it will remain off during system operation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="enable_selinux_bootloader" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i --follow-symlinks "s/selinux=0//gI" /etc/grub.conf
sed -i --follow-symlinks "s/enforcing=0//gI" /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-enable_selinux_bootloader:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-enable_selinux_bootloader_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_state" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure SELinux State is Enforcing</ns10:title>
<ns10:description xml:lang="en-US">The SELinux state should be set to <html:code><ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" /></html:code> at
system boot time. In the file <html:code>/etc/selinux/config</html:code>, add or correct the
following line to configure the system to boot into enforcing mode:
<html:pre>SELINUX=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">26</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the SELinux state to enforcing ensures SELinux is able to confine
potentially compromised processes to the security policy, which is designed to
prevent them from causing damage to the system or further elevating their
privileges.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="selinux_state" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_selinux_state="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_state" use="legacy" />"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/sysconfig/selinux' '^SELINUX=' $var_selinux_state 'CCE-26969-6' '%s=%s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_selinux_state:var:1" value-id="xccdf_org.ssgproject.content_value_var_selinux_state" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_state:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_state_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_policytype" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure SELinux Policy</ns10:title>
<ns10:description xml:lang="en-US">The SELinux <html:code>targeted</html:code> policy is appropriate for
general-purpose desktops and servers, as well as systems in many other roles.
To configure the system to use this policy, add or correct the following line
in <html:code>/etc/selinux/config</html:code>:
<html:pre>SELINUXTYPE=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" /></html:pre>
Other policies, such as <html:code>mls</html:code>, provide additional security labeling
and greater confinement but are not compatible with many general-purpose
use cases.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the SELinux policy to <html:code>targeted</html:code> or a more specialized policy
ensures the system will confine processes that are likely to be
targeted for exploitation, such as network or system services.
Note: During the development or debugging of SELinux modules, it is common to
temporarily place non-production systems in <html:code>permissive</html:code> mode. In such
temporary cases, SELinux policies should be developed, and once work
is completed, the system should be reconfigured to
<html:code><ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" /></html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="selinux_policytype" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_selinux_policy_name="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_selinux_policy_name" use="legacy" />"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/sysconfig/selinux' '^SELINUXTYPE=' $var_selinux_policy_name 'CCE-26875-5' '%s=%s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_selinux_policy_name:var:1" value-id="xccdf_org.ssgproject.content_value_var_selinux_policy_name" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_policytype:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_policytype_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_restorecond_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable the SELinux Context Restoration Service (restorecond)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>restorecond</html:code> service utilizes <html:code>inotify</html:code> to look
for the creation of new files listed in the
<html:code>/etc/selinux/restorecond.conf</html:code> configuration file. When a file is
created, <html:code>restorecond</html:code> ensures the file receives the proper SELinux
security context.
The <html:code>restorecond</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 restorecond on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>restorecond</html:code> service helps ensure that the default SELinux
file context is applied to files. This allows automatic correction
of file contexts created by some programs.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_restorecond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable restorecond
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_restorecond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service restorecond
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- restorecond
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_restorecond_enabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_setroubleshoot_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall setroubleshoot Package</ns10:title>
<ns10:description xml:lang="en-US">The SETroubleshoot service notifies desktop users of SELinux
denials. The service provides information around configuration errors,
unauthorized intrusions, and other potential errors.
The <html:code>setroubleshoot</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase setroubleshoot</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">The SETroubleshoot service is an unnecessary daemon to
have running on a server</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_setroubleshoot_removed:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_mcstrans_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall mcstrans Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>mcstransd</html:code> daemon provides category label information
to client processes requesting information. The label translations are defined
in <html:code>/etc/selinux/targeted/setrans.conf</html:code>.
The <html:code>mcstrans</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase mcstrans</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Since this service is not used very often, disable it to reduce the
amount of potentially vulnerable code running on the system.
NOTE: This rule was added in support of the CIS RHEL6 v1.2.0 benchmark. Please
note that Red Hat does not feel this rule is security relevant.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_mcstrans_removed:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_confinement_of_daemons" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure No Daemons are Unconfined by SELinux</ns10:title>
<ns10:description xml:lang="en-US">
Daemons for which the SELinux policy does not contain rules will inherit the
context of the parent process. Because daemons are launched during
startup and descend from the <html:code>init</html:code> process, they inherit the <html:code>initrc_t</html:code> context.
<html:br />
<html:br />
To check for unconfined daemons, run the following command:
<html:pre>$ sudo ps -eZ | egrep "initrc" | egrep -vw "tr|ps|egrep|bash|awk" | tr ':' ' ' | awk '{ print $NF }'</html:pre>
It should produce no output in a well-configured system.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Daemons which run with the <html:code>initrc_t</html:code> context may cause AVC denials,
or allow privileges that the daemon does not require.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_confinement_of_daemons:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_selinux_all_devicefiles_labeled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure No Device Files are Unknown to SELinux</ns10:title>
<ns10:description xml:lang="en-US">Device files, which are used for communication with important
system resources, should be labeled with proper SELinux types. If any device
files carry the SELinux type <html:code>device_t</html:code>, report the bug so that policy can be corrected. Supply information about what the device is and what programs use it.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">22</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:rationale xml:lang="en-US">
If a device file carries the SELinux type <html:code>device_t</html:code>, then SELinux
cannot properly restrict access to the device file.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-selinux_all_devicefiles_labeled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-selinux_all_devicefiles_labeled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_direct_root_logins" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Direct root Logins Not Allowed</ns10:title>
<ns10:description xml:lang="en-US">To further limit access to the <html:code>root</html:code> account, administrators
can disable root logins at the console by editing the <html:code>/etc/securetty</html:code> file.
This file lists all devices the root user is allowed to login to. If the file does
not exist at all, the root user can login through any communication device on the
system, whether via the console or via a raw network interface. This is dangerous
as user can login to his machine as root via Telnet, which sends the password in
plain text over the network. By default, Red Hat Enteprise Linux's
<html:code>/etc/securetty</html:code> file only allows the root user to login at the console
physically attached to the machine. To prevent root from logging in, remove the
contents of this file. To prevent direct root logins, remove the contents of this
file by typing the following command:
<html:pre>
$ sudo echo > /etc/securetty
</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling direct root logins ensures proper accountability and multifactor
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_direct_root_logins" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo > /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_direct_root_logins:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_direct_root_logins_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_securetty_root_login_console_only" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Restrict Virtual Console Root Logins</ns10:title>
<ns10:description xml:lang="en-US">
To restrict root logins through the (deprecated) virtual console devices,
ensure lines of this form do not appear in <html:code>/etc/securetty</html:code>:
<html:pre>vc/1
vc/2
vc/3
vc/4</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing direct root login to virtual console devices
helps ensure accountability for actions taken on the system
using the root account.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="securetty_root_login_console_only" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i '/^vc\//d' /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-securetty_root_login_console_only:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-securetty_root_login_console_only_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_restrict_serial_port_logins" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Serial Port Root Logins</ns10:title>
<ns10:description xml:lang="en-US">To restrict root logins on serial ports,
ensure lines of this form do not appear in <html:code>/etc/securetty</html:code>:
<html:pre>ttyS0
ttyS1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing direct root login to serial port interfaces
helps ensure accountability for actions taken on the systems
using the root account.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="restrict_serial_port_logins" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i '/ttyS/d' /etc/securetty
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-restrict_serial_port_logins:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-restrict_serial_port_logins_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_root_webbrowsing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Web Browser Use for Administrative Accounts</ns10:title>
<ns10:description xml:lang="en-US">
Enforce policy requiring administrative accounts use web browsers only for
local service administration.
</ns10:description>
<ns10:rationale xml:lang="en-US">
If a browser vulnerability is exploited while running with administrative privileges,
the entire system could be compromised. Specific exceptions for local service
administration should be documented in site-defined policy.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_root_webbrowsing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_shelllogin_for_systemaccounts" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure that System Accounts Do Not Run a Shell Upon Login</ns10:title>
<ns10:description xml:lang="en-US">
Some accounts are not associated with a human user of the system, and exist to
perform some administrative function. Should an attacker be able to log into
these accounts, they should not be granted access to a shell.
<html:br /><html:br />
The login shell for each local account is stored in the last field of each line
in <html:code>/etc/passwd</html:code>. System accounts are those user accounts with a user ID
less than UID_MIN, where value of the UID_MIN directive is set in
/etc/login.defs configuration file. In the default configuration UID_MIN is set
to 500, thus system accounts are those user accounts with a user ID less than
500. The user ID is stored in the third field. If any system account
<html:i>SYSACCT</html:i> (other than root) has a login shell, disable it with the
command: <html:pre>$ sudo usermod -s /sbin/nologin <html:i>SYSACCT</html:i></html:pre>
</ns10:description>
<ns10:warning category="functionality" xml:lang="en-US">
Do not perform the steps in this section on the root account. Doing so might
cause the system to become inaccessible.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">178</ns10:reference>
<ns10:rationale xml:lang="en-US">
Ensuring shells are not given to system accounts upon login makes it more
difficult for attackers to make use of system accounts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_shelllogin_for_systemaccounts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_shelllogin_for_systemaccounts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_no_uid_except_zero" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify Only Root Has UID 0</ns10:title>
<ns10:description xml:lang="en-US">
If any account other than root has a UID of 0,
this misconfiguration should be investigated and the
accounts other than root should be removed or have their UID changed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
An account has root authority if it has a UID of 0. Multiple accounts
with a UID of 0 afford more opportunity for potential intruders to
guess a password for a privileged account. Proper configuration of
sudo is recommended to afford multiple system administrators
access to root privileges in an accountable manner.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_no_uid_except_zero" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">awk -F: '$3 == 0 && $1 != "root" { print $1 }' /etc/passwd | xargs passwd -l
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_no_uid_except_zero:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_no_uid_except_zero_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_root_path_default" selected="false" severity="low">
<ns10:title xml:lang="en-US">Root Path Must Be Vendor Default</ns10:title>
<ns10:description xml:lang="en-US">
Assuming root shell is bash, edit the following files:
<html:pre>~/.profile</html:pre>
<html:pre>~/.bashrc</html:pre>
Change any <html:code>PATH</html:code> variables to the vendor default for root and remove any
empty <html:code>PATH</html:code> entries or references to relative paths.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:rationale xml:lang="en-US">
The root account's executable search path must be the vendor default, and must
contain only absolute paths.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-root_path_default_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_empty_passwords" selected="false" severity="high">
<ns10:title xml:lang="en-US">Prevent Log In to Accounts With Empty Password</ns10:title>
<ns10:description xml:lang="en-US">If an account is configured for password authentication
but does not have an assigned password, it may be possible to log
onto the account without authentication. Remove any instances of the <html:code>nullok</html:code>
option in <html:code>/etc/pam.d/system-auth</html:code> to
prevent logins with empty passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:rationale xml:lang="en-US">
If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational
environments.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_empty_passwords" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed --follow-symlinks -i 's/\<nullok\>//g' /etc/pam.d/system-auth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_empty_passwords:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_empty_passwords_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_all_shadowed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify All Account Password Hashes are Shadowed</ns10:title>
<ns10:description xml:lang="en-US">
If any password hashes are stored in <html:code>/etc/passwd</html:code> (in the second field,
instead of an <html:code>x</html:code>), the cause of this misconfiguration should be
investigated. The account should have its password reset and the hash should be
properly stored, or the account should be deleted entirely.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">201</ns10:reference>
<ns10:rationale xml:lang="en-US">
The hashes for all user account passwords should be stored in
the file <html:code>/etc/shadow</html:code> and never in <html:code>/etc/passwd</html:code>,
which is readable by all users.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_all_shadowed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_all_shadowed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gid_passwd_group_same" selected="false" severity="low">
<ns10:title xml:lang="en-US">All GIDs referenced in /etc/passwd must be defined in /etc/group</ns10:title>
<ns10:description xml:lang="en-US">
Add a group to the system for each GID referenced without a corresponding group.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Inconsistency in GIDs between <html:code>/etc/passwd</html:code> and <html:code>/etc/group</html:code> could lead to a user having unintended rights.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gid_passwd_group_same:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gid_passwd_group_same_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_netrc_files" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify No netrc Files Exist</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>.netrc</html:code> files contain login information
used to auto-login into FTP servers and reside in the user's home
directory. These files may contain unencrypted passwords to
remote FTP servers making them susceptible to access by unauthorized
users and should not be used. Any <html:code>.netrc</html:code> files should be removed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(h)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">196</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unencrypted passwords for remote FTP servers may be stored in <html:code>.netrc</html:code>
files. DoD policy requires passwords be encrypted in storage and not used
in access scripts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_netrc_files:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_netrc_files_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_minlen_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Minimum Length in login.defs</ns10:title>
<ns10:description xml:lang="en-US">To specify password length requirements for new accounts,
edit the file <html:code>/etc/login.defs</html:code> and add or correct the following
lines:
<html:pre>PASS_MIN_LEN <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy" /></html:pre>
<html:br /><html:br />
As of the DISA Red Hat 6 STIG - Ver 1, Rel 13 (28-OCT-2016), the DoD requirement is now <html:code>15</html:code>.
The FISMA requirement is <html:code>12</html:code>.
If a program consults <html:code>/etc/login.defs</html:code> and also another PAM module
(such as <html:code>pam_cracklib</html:code>) during a password change operation,
then the most restrictive must be satisfied. See PAM section
for more information about enforcing password quality requirements.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">205</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum password length makes password
cracking attacks more difficult by ensuring a larger
search space. However, any security benefit from an onerous requirement
must be carefully weighed against usability problems, support costs, or counterproductive
behavior that may result.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_minlen_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_password_minlen_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" use="legacy" />"
grep -q ^PASS_MIN_LEN /etc/login.defs && \
sed -i "s/PASS_MIN_LEN.*/PASS_MIN_LEN $var_accounts_password_minlen_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MIN_LEN $var_accounts_password_minlen_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_password_minlen_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_minlen_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_minlen_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_minlen_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_minimum_age_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Minimum Age</ns10:title>
<ns10:description xml:lang="en-US">To specify password minimum age for new accounts,
edit the file <html:code>/etc/login.defs</html:code>
and add or correct the following line:
<html:pre>PASS_MIN_DAYS <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy" /></html:i></html:pre>
A value of 1 day is considered for sufficient for many
environments.
The DoD requirement is 1.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">198</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the minimum password age protects against
users cycling back to a favorite password
after satisfying the password reuse requirement.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_minimum_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_minimum_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" use="legacy" />"
grep -q ^PASS_MIN_DAYS /etc/login.defs && \
sed -i "s/PASS_MIN_DAYS.*/PASS_MIN_DAYS $var_accounts_minimum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MIN_DAYS $var_accounts_minimum_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_minimum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_minimum_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_minimum_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_minimum_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_maximum_age_login_defs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Maximum Age</ns10:title>
<ns10:description xml:lang="en-US">To specify password maximum age for new accounts,
edit the file <html:code>/etc/login.defs</html:code>
and add or correct the following line:
<html:pre>PASS_MAX_DAYS <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy" /></html:i></html:pre>
A value of 180 days is sufficient for many environments.
The DoD requirement is 60.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(g)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(d)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">180</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">199</ns10:reference>
<ns10:reference href="">76</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password maximum age ensures users are required to
periodically change their passwords. This could possibly decrease
the utility of a stolen password. Requiring shorter password lifetimes
increases the risk of users writing down the password in a convenient
location subject to physical compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_maximum_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_maximum_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" use="legacy" />"
grep -q ^PASS_MAX_DAYS /etc/login.defs && \
sed -i "s/PASS_MAX_DAYS.*/PASS_MAX_DAYS $var_accounts_maximum_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_MAX_DAYS $var_accounts_maximum_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_maximum_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_maximum_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_maximum_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_maximum_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_warn_age_login_defs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Warning Age</ns10:title>
<ns10:description xml:lang="en-US">To specify how many days prior to password
expiration that a warning will be issued to users,
edit the file <html:code>/etc/login.defs</html:code> and add or correct
the following line:
<html:pre>PASS_WARN_AGE <html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy" /></html:i></html:pre>
The DoD requirement is 7.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password warning age enables users to
make the change at a practical time.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_warn_age_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_password_warn_age_login_defs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" use="legacy" />"
grep -q ^PASS_WARN_AGE /etc/login.defs && \
sed -i "s/PASS_WARN_AGE.*/PASS_WARN_AGE $var_accounts_password_warn_age_login_defs/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "PASS_WARN_AGE $var_accounts_password_warn_age_login_defs" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_password_warn_age_login_defs:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_password_warn_age_login_defs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_warn_age_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_warn_age_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Account Expiration Following Inactivity</ns10:title>
<ns10:description xml:lang="en-US">To specify the number of days after a password expires (which
signifies inactivity) until an account is permanently disabled, add or correct
the following lines in <html:code>/etc/default/useradd</html:code>, substituting
<html:code><html:i>NUM_DAYS</html:i></html:code> appropriately:
<html:pre>INACTIVE=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_rule_account_disable_post_pw_expiration" use="legacy" /></html:i></html:pre>
A value of 35 is recommended.
If a password is currently on the
verge of expiration, then 35 days remain until the account is automatically
disabled. However, if the password will not expire for another 60 days, then 95
days could elapse until the account would be automatically disabled. See the
<html:code>useradd</html:code> man page for more information. Determining the inactivity
timeout must be done with careful consideration of the length of a "normal"
period of inactivity for users in the particular environment. Setting
the timeout too low incurs support costs and also has the potential to impact
availability of the system to legitimate users.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">16</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">17</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">795</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling inactive accounts ensures that accounts which may not
have been responsibly removed are not available to attackers
who may have compromised their credentials.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="account_disable_post_pw_expiration" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_account_disable_post_pw_expiration="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" use="legacy" />"
grep -q ^INACTIVE /etc/default/useradd && \
sed -i "s/INACTIVE.*/INACTIVE=$var_account_disable_post_pw_expiration/g" /etc/default/useradd
if ! [ $? -eq 0 ]; then
echo "INACTIVE=$var_account_disable_post_pw_expiration" >> /etc/default/useradd
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_account_disable_post_pw_expiration:var:1" value-id="xccdf_org.ssgproject.content_value_var_account_disable_post_pw_expiration" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-account_disable_post_pw_expiration:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_disable_post_pw_expiration_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_unique_name" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure All Accounts on the System Have Unique Names</ns10:title>
<ns10:description xml:lang="en-US">
Change usernames, or delete accounts, so each has a unique name.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unique usernames allow for accountability on the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-account_unique_name:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_unique_name_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_account_temp_expire_date" selected="false" severity="low">
<ns10:title xml:lang="en-US">Assign Expiration Date to Temporary Accounts</ns10:title>
<ns10:description xml:lang="en-US">
In the event temporary or emergency accounts are required, configure the system
to terminate them after a documented time period. For every temporary and
emergency account, run the following command to set an expiration date on it,
substituting <html:code><html:i>USER</html:i></html:code> and <html:code><html:i>YYYY-MM-DD</html:i></html:code> appropriately:
<html:pre>$ sudo chage -E <html:i>YYYY-MM-DD USER</html:i></html:pre>
<html:code><html:i>YYYY-MM-DD</html:i></html:code> indicates the documented expiration date for the account.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">16</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1682</ns10:reference>
<ns10:rationale xml:lang="en-US">
When temporary and emergency accounts are created, there is a risk they may
remain in place and active after the need for them no longer exists. Account
expiration greatly reduces the risk of accounts being misused or hijacked.
<html:br />
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-account_temp_expire_date_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_display_login_attempts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Last Login/Access Notification</ns10:title>
<ns10:description xml:lang="en-US">To configure the system to notify users of last login/access
using <html:code>pam_lastlog</html:code>, add the following line immediately after <html:code>session required pam_limits.so</html:code>:
<html:pre>session required pam_lastlog.so showfailed</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Users need to be aware of activity that occurs regarding
their account. Providing users with information regarding the number
of unsuccessful attempts that were made to login to their account
allows the user to determine if any unauthorized activity has occurred
and gives them an opportunity to notify administrators.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="display_login_attempts" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i --follow-symlinks '/pam_limits.so/a session\t required\t pam_lastlog.so showfailed' /etc/pam.d/system-auth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-display_login_attempts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-display_login_attempts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_retry" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Retry Prompts Permitted Per-Session</ns10:title>
<ns10:description xml:lang="en-US">To configure the number of retry prompts that are permitted per-session:
<html:br /><html:br />
Edit the <html:code>pam_cracklib.so</html:code> statement in <html:code>/etc/pam.d/system-auth</html:code> to
show <html:code>retry=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_retry" use="legacy" /></html:code>, or a lower value if site policy is more restrictive.
<html:br /><html:br />
The DoD requirement is a maximum of 3 prompts per session.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:rationale xml:lang="en-US">
Setting the password retry prompts that are permitted on a per-session basis to a low value
requires some software, such as SSH, to re-connect. This can slow down and
draw additional attention to some types of password-guessing attacks. Note that this
is different from account lockout, which is provided by the pam_faillock module.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_retry:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_retry" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_retry:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_retry_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_maxrepeat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password to Maximum of Three Consecutive Repeating Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>maxrepeat</html:code> parameter controls requirements for
consecutive repeating characters. When set to a positive number, it will reject passwords
which contain more than that number of consecutive characters. Add <html:code>maxrepeat=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /></html:code>
after pam_cracklib.so to prevent a run of (<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /> + 1) or more identical characters:<html:br />
<html:pre>password required pam_cracklib.so maxrepeat=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_maxrepeat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_maxrepeat="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" use="legacy" />"
if grep -q "maxrepeat=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(maxrepeat *= *\).*/\1$var_password_pam_maxrepeat/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ maxrepeat=$var_password_pam_maxrepeat/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_maxrepeat:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_maxrepeat" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_maxrepeat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_maxrepeat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_dcredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Digit Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>dcredit</html:code> parameter controls requirements for
usage of digits in a password. When set to a negative number, any password will be required to
contain that many digits. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each digit.
Add <html:code>dcredit=-1</html:code> after pam_cracklib.so to require use of a digit in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">194</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring digits makes password guessing attacks more difficult by ensuring a larger
search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_dcredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_dcredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" use="legacy" />"
if grep -q "dcredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(dcredit *= *\).*/\1$var_password_pam_dcredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ dcredit=$var_password_pam_dcredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_dcredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_dcredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_dcredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_dcredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_minlen" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Minimum Length</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>minlen</html:code> parameter controls requirements for
minimum characters required in a password. Add <html:code>minlen=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy" /></html:code>
after pam_pwquality to set minimum password length requirements.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">205</ns10:reference>
<ns10:rationale xml:lang="en-US">
Password length is one factor of several that helps to determine
strength and how long it takes to crack a password. Use of more characters in
a password helps to exponentially increase the time and/or resources
required to compromise the password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_minlen" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_minlen="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minlen" use="legacy" />"
if grep -q "minlen=" /etc/pam.d/system-auth
then
sed -i --follow-symlinks "s/\(minlen *= *\).*/\1$var_password_pam_minlen/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ minlen=$var_password_pam_minlen/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_minlen:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_minlen" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_minlen:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_minlen_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_ucredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Uppercase Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>ucredit=</html:code> parameter controls requirements for
usage of uppercase letters in a password. When set to a negative number, any password will be required to
contain that many uppercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each uppercase character.
Add <html:code>ucredit=-1</html:code> after pam_cracklib.so to require use of an upper case character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">192</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of uppercase characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_ucredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_ucredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" use="legacy" />"
if grep -q "ucredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(ucredit *= *\).*/\1$var_password_pam_ucredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ ucredit=$var_password_pam_ucredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_ucredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_ucredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_ucredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_ucredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_ocredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Special Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>ocredit=</html:code> parameter controls requirements for
usage of special (or ``other'') characters in a password. When set to a negative number, any password will be required to
contain that many special characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each special character.
Add <html:code>ocredit=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" use="legacy" /></html:code> after pam_cracklib.so to require use of a special character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1619</ns10:reference>
<ns10:reference href="">266</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of special characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_ocredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_ocredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" use="legacy" />"
if grep -q "ocredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(ocredit *= *\).*/\1$var_password_pam_ocredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ ocredit=$var_password_pam_ocredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_ocredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_ocredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_ocredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_ocredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_lcredit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Lowercase Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>lcredit=</html:code> parameter controls requirements for
usage of lowercase letters in a password. When set to a negative number, any password will be required to
contain that many lowercase characters. When set to a positive number, pam_cracklib will grant +1 additional
length credit for each lowercase character.
Add <html:code>lcredit=-1</html:code> after pam_cracklib.so to require use of a lowercase character in passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">193</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of lowercase characters makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_lcredit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_lcredit="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" use="legacy" />"
if grep -q "lcredit=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(lcredit *= *\).*/\1$var_password_pam_lcredit/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ lcredit=$var_password_pam_lcredit/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_lcredit:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_lcredit" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_lcredit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_lcredit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_difok" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Different Characters</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>difok</html:code> parameter controls requirements for
usage of different characters during a password change.
Add <html:code>difok=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy" /></html:i></html:code> after pam_cracklib.so to require differing
characters when changing passwords. The DoD requirement is <html:code>4</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">195</ns10:reference>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of different characters during password changes ensures that
newly changed passwords should not resemble previously compromised ones.
Note that passwords which are changed on compromised systems will still be compromised, however.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_difok" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_difok="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_difok" use="legacy" />"
if grep -q "difok=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(difok *= *\).*/\1$var_password_pam_difok/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/pam_cracklib.so/ s/$/ difok=$var_password_pam_difok/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_difok:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_difok" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_difok:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_difok_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_minclass" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Password Strength Minimum Different Categories</ns10:title>
<ns10:description xml:lang="en-US">The pam_cracklib module's <html:code>minclass</html:code> parameter controls requirements for
usage of different character classes, or types, of character that must exist in a password
before it is considered valid. For example, setting this value to three (3) requires that
any password must have characters from at least three different categories in order to be
approved. The default value is zero (0), meaning there are no required classes. There are
four categories available:
<html:pre>
* Upper-case characters
* Lower-case characters
* Digits
* Special characters (for example, punctuation)
</html:pre>
Add <html:code>minclass=<html:i><ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" /></html:i></html:code> after pam_cracklib.so entry into the
<html:code>/etc/pam.d/system-auth</html:code> file in order to require <ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" /> differing categories of
characters when changing passwords.
For example to require at least three character classes to be used in password, use <html:code>minclass=3</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Requiring a minimum number of character categories makes password guessing attacks
more difficult by ensuring a larger search space.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_minclass" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_minclass="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_minclass" use="legacy" />"
grep -q minclass /etc/pam.d/system-auth
if [ $? = "0" ]; then
sed --follow-symlinks -i "/pam_cracklib.so/s/minclass=[0-$var_password_pam_minclass]/minclass=$var_password_pam_minclass/" /etc/pam.d/system-auth
else
sed --follow-symlinks -i "/pam_cracklib.so/s/pam_cracklib.so /pam_cracklib.so minclass=$var_password_pam_minclass /" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_minclass:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_minclass" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_minclass:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_minclass_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Deny For Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to lock out accounts after a number of incorrect login
attempts using <html:code>pam_faillock.so</html:code>, modify the content of both
<html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">44</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts
prevents direct password guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_deny" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_deny="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, deny directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*deny=" $pamFile; then
# both pam_faillock.so & deny present, just correct deny directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(deny *= *\).*/\1\2$var_accounts_passwords_pam_faillock_deny/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(deny *= *\).*/\1\2$var_accounts_passwords_pam_faillock_deny/" $pamFile
# pam_faillock.so present, but deny directive not yet
else
# append correct deny value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ deny=$var_accounts_passwords_pam_faillock_deny/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ deny=$var_accounts_passwords_pam_faillock_deny/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'deny' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent deny=$var_accounts_passwords_pam_faillock_deny" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail deny=$var_accounts_passwords_pam_faillock_deny" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_deny:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_deny:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_deny_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_unlock_time" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Lockout Time For Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system to lock out accounts after a number of incorrect login
attempts and require an administrator to unlock the account using <html:code>pam_faillock.so</html:code>,
modify the content of both <html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">47</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts
prevents direct password guessing attacks. Ensuring that an administrator is
involved in unlocking locked accounts draws appropriate attention to such
situations.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_unlock_time" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_unlock_time="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, unlock_time directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*unlock_time=" $pamFile; then
# both pam_faillock.so & unlock_time present, just correct unlock_time directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(unlock_time *= *\).*/\1\2$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(unlock_time *= *\).*/\1\2$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
# pam_faillock.so present, but unlock_time directive not yet
else
# append correct unlock_time value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ unlock_time=$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ unlock_time=$var_accounts_passwords_pam_faillock_unlock_time/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'unlock_time' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent unlock_time=$var_accounts_passwords_pam_faillock_unlock_time" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail unlock_time=$var_accounts_passwords_pam_faillock_unlock_time" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_unlock_time:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_unlock_time:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_unlock_time_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_interval" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Interval For Counting Failed Password Attempts</ns10:title>
<ns10:description xml:lang="en-US">
Utilizing <html:code>pam_faillock.so</html:code>, the <html:code>fail_interval</html:code> directive configures the system to lock out accounts after a number of incorrect login
attempts. Modify the content of both <html:code>/etc/pam.d/system-auth</html:code> and <html:code>/etc/pam.d/password-auth</html:code> as follows:
<html:br /><html:br />
<html:ul><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth required pam_faillock.so preauth silent deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>after</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>AUTH</html:code> section:
<html:pre>auth [default=die] pam_faillock.so authfail deny=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_deny" use="legacy" /> unlock_time=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_unlock_time" use="legacy" /> fail_interval=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" /></html:pre></html:li><html:li> Add the following line immediately <html:code>before</html:code> the <html:code>pam_unix.so</html:code> statement in the <html:code>ACCOUNT</html:code> section:
<html:pre>account required pam_faillock.so</html:pre></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-7(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1452</ns10:reference>
<ns10:rationale xml:lang="en-US">
Locking out user accounts after a number of incorrect attempts within a
specific period of time prevents direct password guessing attacks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_passwords_pam_faillock_interval" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_passwords_pam_faillock_fail_interval="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" use="legacy" />"
AUTH_FILES[0]="/etc/pam.d/system-auth"
AUTH_FILES[1]="/etc/pam.d/password-auth"
for pamFile in "${AUTH_FILES[@]}"
do
# pam_faillock.so already present?
if grep -q "^auth.*pam_faillock.so.*" $pamFile; then
# pam_faillock.so present, 'fail_interval' directive present?
if grep -q "^auth.*[default=die].*pam_faillock.so.*authfail.*fail_interval=" $pamFile; then
# both pam_faillock.so & 'fail_interval' present, just correct 'fail_interval' directive value
sed -i --follow-symlinks "s/\(^auth.*required.*pam_faillock.so.*preauth.*silent.*\)\(fail_interval *= *\).*/\1\2$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
sed -i --follow-symlinks "s/\(^auth.*[default=die].*pam_faillock.so.*authfail.*\)\(fail_interval *= *\).*/\1\2$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
# pam_faillock.so present, but 'fail_interval' directive not yet
else
# append correct 'fail_interval' value to appropriate places
sed -i --follow-symlinks "/^auth.*required.*pam_faillock.so.*preauth.*silent.*/ s/$/ fail_interval=$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
sed -i --follow-symlinks "/^auth.*[default=die].*pam_faillock.so.*authfail.*/ s/$/ fail_interval=$var_accounts_passwords_pam_faillock_fail_interval/" $pamFile
fi
# pam_faillock.so not present yet
else
# insert pam_faillock.so preauth & authfail rows with proper value of the 'fail_interval' option
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/i auth required pam_faillock.so preauth silent fail_interval=$var_accounts_passwords_pam_faillock_fail_interval" $pamFile
sed -i --follow-symlinks "/^auth.*sufficient.*pam_unix.so.*/a auth [default=die] pam_faillock.so authfail fail_interval=$var_accounts_passwords_pam_faillock_fail_interval" $pamFile
sed -i --follow-symlinks "/^account.*required.*pam_unix.so/i account required pam_faillock.so" $pamFile
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_passwords_pam_faillock_fail_interval:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_passwords_pam_faillock_fail_interval" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_passwords_pam_faillock_interval:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_passwords_pam_faillock_interval_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_password_pam_unix_remember" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Limit Password Reuse</ns10:title>
<ns10:description xml:lang="en-US">Do not allow users to reuse recent passwords. This can be
accomplished by using the <html:code>remember</html:code> option for the <html:code>pam_unix</html:code>
or <html:code>pam_pwhistory</html:code> PAM modules. In the file
<html:code>/etc/pam.d/system-auth</html:code>, append <html:code>remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:code>
to the line which refers to the <html:code>pam_unix.so</html:code> or
<html:code>pam_pwhistory.so</html:code>module, as shown below:
<html:ul><html:li>for the <html:code>pam_unix.so</html:code> case:
<html:pre>password sufficient pam_unix.so <html:i>existing_options</html:i> remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:pre>
</html:li><html:li>for the <html:code>pam_pwhistory.so</html:code> case:
<html:pre>password requisite pam_pwhistory.so <html:i>existing_options</html:i> remember=<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" /></html:pre>
</html:li></html:ul>
The DoD STIG requirement is 5 passwords.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(f)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(e)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">200</ns10:reference>
<ns10:rationale xml:lang="en-US">
Preventing re-use of previous passwords helps ensure that a compromised password is not re-used by a user.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_password_pam_unix_remember" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_password_pam_unix_remember="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" use="legacy" />"
if grep -q "remember=" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "s/\(^password.*sufficient.*pam_unix.so.*\)\(\(remember *= *\)[^ $]*\)/\1remember=$var_password_pam_unix_remember/" /etc/pam.d/system-auth
else
sed -i --follow-symlinks "/^password[[:space:]]\+sufficient[[:space:]]\+pam_unix.so/ s/$/ remember=$var_password_pam_unix_remember/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_password_pam_unix_remember:var:1" value-id="xccdf_org.ssgproject.content_value_var_password_pam_unix_remember" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_password_pam_unix_remember:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_password_pam_unix_remember_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_systemauth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/pam.d/system-auth</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/pam.d/system-auth</html:code>, the <html:code>password</html:code> section of
the file controls which PAM modules execute during a password change.
Set the <html:code>pam_unix.so</html:code> module in the
<html:code>password</html:code> section to include the argument <html:code>sha512</html:code>, as shown below:
<html:pre>password sufficient pam_unix.so sha512 <html:i>other arguments...</html:i></html:pre>
This will help ensure when local users change their passwords, hashes for the new
passwords will be generated using the SHA-512 algorithm.
This is the default.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_password_hashing_algorithm_systemauth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">if ! grep -q "^password.*sufficient.*pam_unix.so.*sha512" /etc/pam.d/system-auth; then
sed -i --follow-symlinks "/^password.*sufficient.*pam_unix.so/ s/$/ sha512/" /etc/pam.d/system-auth
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_systemauth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_systemauth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_logindefs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/login.defs</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/login.defs</html:code>, add or correct the following line to ensure
the system will use SHA-512 as the hashing algorithm:
<html:pre>ENCRYPT_METHOD SHA512</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_password_hashing_algorithm_logindefs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">if grep --silent ^ENCRYPT_METHOD /etc/login.defs ; then
sed -i 's/^ENCRYPT_METHOD.*/ENCRYPT_METHOD SHA512/g' /etc/login.defs
else
echo "" >> /etc/login.defs
echo "ENCRYPT_METHOD SHA512" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_logindefs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_logindefs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_password_hashing_algorithm_libuserconf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Password Hashing Algorithm in /etc/libuser.conf</ns10:title>
<ns10:description xml:lang="en-US">
In <html:code>/etc/libuser.conf</html:code>, add or correct the following line in its
<html:code>[defaults]</html:code> section to ensure the system will use the SHA-512
algorithm for password hashing:
<html:pre>crypt_style = sha512</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using a stronger hashing algorithm makes password cracking attacks more difficult.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_password_hashing_algorithm_libuserconf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_password_hashing_algorithm_libuserconf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_tmout" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Interactive Session Timeout</ns10:title>
<ns10:description xml:lang="en-US">
Terminating an idle session within a short time period reduces
the window of opportunity for unauthorized personnel to take control of a
management session enabled on the console or console port that has been
left unattended.
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_tmout:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_tmout" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_tmout:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_tmout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_max_concurrent_login_sessions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit the Number of Concurrent Login Sessions Allowed Per User</ns10:title>
<ns10:description xml:lang="en-US">
Limiting the number of allowed users and sessions per user can limit risks related to Denial of
Service attacks. This addresses concurrent sessions for a single account and does not address
concurrent sessions by a single user via multiple accounts. The DoD requirement is 10. To set the number of concurrent
sessions per user add the following line in <html:code>/etc/security/limits.conf</html:code>:
<html:pre>* hard maxlogins <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-10</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">54</ns10:reference>
<ns10:rationale xml:lang="en-US">Limiting simultaneous user logins can insulate the system from denial of service
problems caused by excessive logins. Automated login processes operating improperly or
maliciously may result in an exceptional number of simultaneous login sessions.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_max_concurrent_login_sessions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_max_concurrent_login_sessions="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" use="legacy" />"
if grep -q '^[^#]*\<maxlogins\>' /etc/security/limits.d/*.conf; then
sed -i "/^[^#]*\<maxlogins\>/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.d/*.conf
elif grep -q '^[^#]*\<maxlogins\>' /etc/security/limits.conf; then
sed -i "/^[^#]*\<maxlogins\>/ s/maxlogins.*/maxlogins $var_accounts_max_concurrent_login_sessions/" /etc/security/limits.conf
else
echo "* hard maxlogins $var_accounts_max_concurrent_login_sessions" >> /etc/security/limits.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_max_concurrent_login_sessions:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_max_concurrent_login_sessions" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_max_concurrent_login_sessions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_max_concurrent_login_sessions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_root_path_no_dot" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that Root's Path Does Not Include Relative Paths or Null Directories</ns10:title>
<ns10:description xml:lang="en-US">
Ensure that none of the directories in root's path is equal to a single
<html:code>.</html:code> character, or
that it contains any instances that lead to relative path traversal, such as
<html:code>..</html:code> or beginning a path without the slash (<html:code>/</html:code>) character.
Also ensure that there are no "empty" elements in the path, such as in these examples:
<html:pre>PATH=:/bin
PATH=/bin:
PATH=/bin::/sbin</html:pre>
These empty elements have the same effect as a single <html:code>.</html:code> character.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Including these entries increases the risk that root could
execute code from an untrusted location.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-root_path_no_dot:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_root_path_dirs_no_write" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that Root's Path Does Not Include World or Group-Writable Directories</ns10:title>
<ns10:description xml:lang="en-US">
For each element in root's path, run:
<html:pre>$ sudo ls -ld <html:i>DIR</html:i></html:pre>
and ensure that write permissions are disabled for group and
other.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Such entries increase the risk that root could
execute code provided by unprivileged users,
and potentially malicious code.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_root_path_dirs_no_write:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_root_path_dirs_no_write_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_home_dirs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure that User Home Directories are not Group-Writable or World-Readable</ns10:title>
<ns10:description xml:lang="en-US">For each human user of the system, view the
permissions of the user's home directory:
<html:pre>$ sudo ls -ld /home/<html:i>USER</html:i></html:pre>
Ensure that the directory is not group-writable and that it
is not world-readable. If necessary, repair the permissions:
<html:pre>$ sudo chmod g-w /home/<html:i>USER</html:i>
$ sudo chmod o-rwx /home/<html:i>USER</html:i></html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">This action may involve
modifying user home directories. Notify your user community, and
solicit input if appropriate, before making this type of
change.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:rationale xml:lang="en-US">
User home directories contain many configuration files which
affect the behavior of a user's account. No user should ever have
write permission to another user's home directory. Group shared
directories can be configured in sub-directories or elsewhere in the
filesystem if they are needed. Typically, user home directories
should not be world-readable, as it would disclose file names
to other users. If a subset of users need read access
to one another's home directories, this can be provided using
groups or ACLs.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_home_dirs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_home_dirs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_bashrc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Bash Umask is Set Correctly</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask for users of the Bash shell is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/bashrc</html:code> to read
as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_bashrc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/bashrc && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/bashrc
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/bashrc
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_bashrc:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_bashrc_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_csh_cshrc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default C Shell Umask is Set Correctly</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask for users of the C shell is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/csh.cshrc</html:code> to read as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_csh_cshrc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/csh.cshrc && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/csh.cshrc
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/csh.cshrc
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_csh_cshrc:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_csh_cshrc_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_profile" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Umask is Set Correctly in /etc/profile</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask controlled by <html:code>/etc/profile</html:code> is set properly,
add or correct the <html:code>umask</html:code> setting in <html:code>/etc/profile</html:code> to read as follows:
<html:pre>umask <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read or
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_profile" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q umask /etc/profile && \
sed -i "s/umask.*/umask $var_accounts_user_umask/g" /etc/profile
if ! [ $? -eq 0 ]; then
echo "umask $var_accounts_user_umask" >> /etc/profile
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_profile:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_profile_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_accounts_umask_etc_login_defs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure the Default Umask is Set Correctly in login.defs</ns10:title>
<ns10:description xml:lang="en-US">
To ensure the default umask controlled by <html:code>/etc/login.defs</html:code> is set properly,
add or correct the <html:code>UMASK</html:code> setting in <html:code>/etc/login.defs</html:code> to read as follows:
<html:pre>UMASK <ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The umask value influences the permissions assigned to files when they are created.
A misconfigured umask value could result in files with excessive permissions that can be read and
written to by unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="accounts_umask_etc_login_defs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_accounts_user_umask="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_accounts_user_umask" use="legacy" />"
grep -q UMASK /etc/login.defs && \
sed -i "s/UMASK.*/UMASK $var_accounts_user_umask/g" /etc/login.defs
if ! [ $? -eq 0 ]; then
echo "UMASK $var_accounts_user_umask" >> /etc/login.defs
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_accounts_user_umask:var:1" value-id="xccdf_org.ssgproject.content_value_var_accounts_user_umask" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-accounts_umask_etc_login_defs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-accounts_umask_etc_login_defs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_user_owner_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /etc/grub.conf User Ownership</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/grub.conf</html:code> should
be owned by the <html:code>root</html:code> user to prevent destruction
or modification of the file.
To properly set the owner of <html:code>/etc/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /etc/grub.conf </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
Only root should be able to modify important boot parameters.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_user_owner_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chown root /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_user_owner_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_user_owner_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_group_owner_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /etc/grub.conf Group Ownership</ns10:title>
<ns10:description xml:lang="en-US">The file <html:code>/etc/grub.conf</html:code> should
be group-owned by the <html:code>root</html:code> group to prevent
destruction or modification of the file.
To properly set the group owner of <html:code>/etc/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chgrp root /etc/grub.conf </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>root</html:code> group is a highly-privileged group. Furthermore, the group-owner of this
file should not have any access privileges anyway.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_group_owner_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chgrp root /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_group_owner_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_group_owner_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_grub_conf" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify /boot/grub/grub.conf Permissions</ns10:title>
<ns10:description xml:lang="en-US">File permissions for <html:code>/boot/grub/grub.conf</html:code> should be set to 600, which
is the default.
To properly set the permissions of <html:code>/boot/grub/grub.conf</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chmod 600 /boot/grub/grub.conf</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(7)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">225</ns10:reference>
<ns10:rationale xml:lang="en-US">
Proper permissions ensure that only the root user can modify important boot
parameters.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_grub_conf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">chmod 600 /boot/grub/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_grub_conf:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_grub_conf_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_password" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Boot Loader Password</ns10:title>
<ns10:description xml:lang="en-US">The grub boot loader should have password protection
enabled to protect boot-time settings.
To do so, select a password and then generate a hash from it by running the following command:
<html:pre>$ grub-crypt --sha-512</html:pre>
When prompted to enter a password, insert the following line into <html:code>/etc/grub.conf</html:code>
immediately after the header comments. (Use the output from <html:code>grub-crypt</html:code> as the
value of <html:b>password-hash</html:b>):
<html:pre>password --encrypted <html:b>password-hash</html:b></html:pre>
NOTE: To meet FISMA Moderate, the bootloader password MUST differ from the root password.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(e) AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
Password protection on the boot loader configuration ensures
users with physical access cannot trivially alter
important bootloader settings. These include which kernel to use,
and whether to enter single-user mode.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_password:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-bootloader_password_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_require_singleuser_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Require Authentication for Single User Mode</ns10:title>
<ns10:description xml:lang="en-US">Single-user mode is intended as a system recovery
method, providing a single user root access to the system by
providing a boot option at startup. By default, no authentication
is performed if single-user mode is selected.
<html:br /><html:br />
To require entry of the root password even if the system is
started in single-user mode, add or correct the following line in the
file <html:code>/etc/sysconfig/init</html:code>:
<html:pre>SINGLE=/sbin/sulogin</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
This prevents attackers with physical access from trivially bypassing security
on the machine and gaining root access. Such accesses are further prevented
by configuring the bootloader password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="require_singleuser_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^SINGLE /etc/sysconfig/init && \
sed -i "s/SINGLE.*/SINGLE=\/sbin\/sulogin/g" /etc/sysconfig/init
if ! [ $? -eq 0 ]; then
echo "SINGLE=/sbin/sulogin" >> /etc/sysconfig/init
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-require_singleuser_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-require_singleuser_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable Ctrl-Alt-Del Reboot Activation</ns10:title>
<ns10:description xml:lang="en-US">
By default, the system includes the following line in
<html:code>/etc/init/control-alt-delete.conf</html:code>
to reboot the system when the Ctrl-Alt-Del key sequence is pressed:
<html:pre>exec /sbin/shutdown -r now "Control-Alt-Delete pressed"</html:pre>
<html:br />
To configure the system to log a message instead of
rebooting the system, alter that line to read as follows:
<html:pre>exec /usr/bin/logger -p security.info "Control-Alt-Delete pressed"</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Disabling the <html:code>Ctrl-Alt-Del</html:code> key sequence
in <html:code>/etc/init/control-alt-delete.conf</html:code> DOES NOT disable the <html:code>Ctrl-Alt-Del</html:code>
key sequence if running in <html:code>runlevel 6</html:code> (e.g. in GNOME, KDE, etc.)! The
<html:code>Ctrl-Alt-Del</html:code> key sequence will only be disabled if running in
the non-graphical <html:code>runlevel 3</html:code>.
</ns10:warning>
<ns10:rationale xml:lang="en-US">
A locally logged-in user who presses Ctrl-Alt-Del, when at the console,
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot.
In the GNOME graphical environment, risk of unintentional reboot from the
Ctrl-Alt-Del sequence is reduced because the user will be
prompted before any action is taken.
NOTE: When updating the <html:code>initscripts</html:code> package on a Red Hat Enterprise
Linux 6 system, custom changes to <html:code>/etc/init/control-alt-delete.conf</html:code>
may be overwritten. Refer to <html:b><html:a href="https://access.redhat.com/site/solutions/70464">https://access.redhat.com/site/solutions/70464</html:a></html:b>
for additional information.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_ctrlaltdel_reboot" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># If system does not contain control-alt-delete.override,
if [ ! -f /etc/init/control-alt-delete.override ]; then
# but does have control-alt-delete.conf file,
if [ -f /etc/init/control-alt-delete.conf ]; then
# then copy .conf to .override to maintain persistency
cp /etc/init/control-alt-delete.conf /etc/init/control-alt-delete.override
fi
fi
sed -i 's,^exec.*$,exec /usr/bin/logger -p authpriv.notice -t init "Ctrl-Alt-Del was pressed and ignored",' /etc/init/control-alt-delete.override
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_ctrlaltdel_reboot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_ctrlaltdel_reboot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_interactive_boot" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Interactive Boot</ns10:title>
<ns10:description xml:lang="en-US">
To disable the ability for users to perform interactive startups, perform both
of the following:
<html:ol><html:li>Edit the file <html:code>/etc/sysconfig/init</html:code>. Add or correct the line:
<html:pre>PROMPT=no</html:pre></html:li><html:li>Inspect the kernel boot arguments (which follow the word <html:code>kernel</html:code>)
in <html:code>/etc/grub.conf</html:code> and ensure the <html:code>confirm</html:code> argument is <html:b>not</html:b>
present.</html:li></html:ol>
Both the <html:code>PROMPT</html:code> option of the <html:code>/etc/sysconfig/init</html:code> file and
the <html:code>confirm</html:code> kernel boot argument of the <html:code>/etc/grub.conf</html:code> file
allow the console user to perform an interactive system startup, in which it is
possible to select the set of services which are started on boot.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-2</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">213</ns10:reference>
<ns10:rationale xml:lang="en-US">
Using interactive boot, the console user could disable auditing, firewalls, or
other services, weakening system security.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_interactive_boot" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Ensure value of PROMPT key in /etc/sysconfig/init is set to 'no'
grep -q ^PROMPT /etc/sysconfig/init && \
sed -i "s/PROMPT.*/PROMPT=no/g" /etc/sysconfig/init
if ! [ $? -eq 0 ]; then
echo "PROMPT=no" >> /etc/sysconfig/init
fi
# Ensure 'confirm' kernel boot argument is not present in some of
# kernel lines in /etc/grub.conf
sed -i --follow-symlinks "s/confirm//gI" /etc/grub.conf
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_interactive_boot:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_interactive_boot_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_screen_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install the screen Package</ns10:title>
<ns10:description xml:lang="en-US">
To enable console screen locking, install the <html:code>screen</html:code> package:
<html:pre>$ sudo yum install screen</html:pre>
Instruct users to begin new terminal sessions with the following command:
<html:pre>$ screen</html:pre>
The console can now be locked with the following key combination:
<html:pre>ctrl+a x</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">58</ns10:reference>
<ns10:rationale xml:lang="en-US">
Installing <html:code>screen</html:code> ensures a console locking capability is available
for users who may need to suspend console logins.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install screen
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure screen is installed
package:
name="{{item}}"
state=present
with_items:
- screen
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_screen
class install_screen {
package { 'screen':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_screen_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=screen
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_screen_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_screen_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_smartcard_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable Smart Card Login</ns10:title>
<ns10:description xml:lang="en-US">
To enable smart card authentication, consult the documentation at:
<html:ul><html:li><html:b><html:a href="https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/enabling-smart-card-login.html">https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/enabling-smart-card-login.html</html:a></html:b></html:li></html:ul>
For guidance on enabling SSH to authenticate against a Common Access Card (CAC), consult documentation at:
<html:ul><html:li><html:b><html:a href="https://access.redhat.com/solutions/82273">https://access.redhat.com/solutions/82273</html:a></html:b></html:li></html:ul>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">767</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">768</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">771</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">772</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">884</ns10:reference>
<ns10:rationale xml:lang="en-US">Smart card login provides two-factor authentication stronger than
that provided by a username and password combination. Smart cards leverage PKI
(public key infrastructure) in order to provide and verify credentials.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="smartcard_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Install required packages
yum -y install esc
yum -y install pam_pkcs11
# Enable pcscd service
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable pcscd
# Configure the expected /etc/pam.d/system-auth{,-ac} settings directly
#
# The code below will configure system authentication in the way smart card
# logins will be enabled, but also user login(s) via other method to be allowed
#
# NOTE: In contrast to Red Hat Enterprise Linux 7 version of this remediation
# script (based on the testing) it does NOT seem to be possible to use
# the 'authconfig' command to perform the remediation for us. Because:
#
# * calling '/usr/sbin/authconfig --enablesmartcard --update'
# does not update all the necessary files, while
#
# * calling '/usr/sbin/authconfig --enablesmartcard --updateall'
# discards the necessary changes on /etc/pam_pkcs11/pam_pkcs11.conf
# performed subsequently below
#
# Therefore we configure /etc/pam.d/system-auth{,-ac} settings directly.
#
# Define system-auth config location
SYSTEM_AUTH_CONF="/etc/pam.d/system-auth"
# Define expected 'pam_env.so' row in $SYSTEM_AUTH_CONF
PAM_ENV_SO="auth.*required.*pam_env.so"
# Define 'pam_succeed_if.so' row to be appended past $PAM_ENV_SO row into $SYSTEM_AUTH_CONF
SYSTEM_AUTH_PAM_SUCCEED="\
auth \[success=1 default=ignore\] pam_succeed_if.so service notin \
login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver quiet use_uid"
# Define 'pam_pkcs11.so' row to be appended past $SYSTEM_AUTH_PAM_SUCCEED
# row into SYSTEM_AUTH_CONF file
SYSTEM_AUTH_PAM_PKCS11="\
auth \[success=done authinfo_unavail=ignore ignore=ignore default=die\] \
pam_pkcs11.so card_only"
# Define smartcard-auth config location
SMARTCARD_AUTH_CONF="/etc/pam.d/smartcard-auth"
# Define 'pam_pkcs11.so' auth section to be appended past $PAM_ENV_SO into $SMARTCARD_AUTH_CONF
SMARTCARD_AUTH_SECTION="\
auth [success=done ignore=ignore default=die] pam_pkcs11.so wait_for_card card_only"
# Define expected 'pam_permit.so' row in $SMARTCARD_AUTH_CONF
PAM_PERMIT_SO="account.*required.*pam_permit.so"
# Define 'pam_pkcs11.so' password section
SMARTCARD_PASSWORD_SECTION="\
password required pam_pkcs11.so"
# First Correct the SYSTEM_AUTH_CONF configuration
if ! grep -q 'pam_pkcs11.so' "$SYSTEM_AUTH_CONF"
then
# Append (expected) pam_succeed_if.so row past the pam_env.so into SYSTEM_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_ENV_SO"'/a '"$SYSTEM_AUTH_PAM_SUCCEED" "$SYSTEM_AUTH_CONF"
# Append (expected) pam_pkcs11.so row past the pam_succeed_if.so into SYSTEM_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$SYSTEM_AUTH_PAM_SUCCEED"'/a '"$SYSTEM_AUTH_PAM_PKCS11" "$SYSTEM_AUTH_CONF"
fi
# Then also correct the SMARTCARD_AUTH_CONF
if ! grep -q 'pam_pkcs11.so' "$SMARTCARD_AUTH_CONF"
then
# Append (expected) SMARTCARD_AUTH_SECTION row past the pam_env.so into SMARTCARD_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_ENV_SO"'/a '"$SMARTCARD_AUTH_SECTION" "$SMARTCARD_AUTH_CONF"
# Append (expected) SMARTCARD_PASSWORD_SECTION row past the pam_permit.so into SMARTCARD_AUTH_CONF file
sed -i --follow-symlinks -e '/^'"$PAM_PERMIT_SO"'/a '"$SMARTCARD_PASSWORD_SECTION" "$SMARTCARD_AUTH_CONF"
fi
# Perform /etc/pam_pkcs11/pam_pkcs11.conf settings below
# Define selected constants for later reuse
SP="[:space:]"
PAM_PKCS11_CONF="/etc/pam_pkcs11/pam_pkcs11.conf"
# Ensure OCSP is turned on in $PAM_PKCS11_CONF
# 1) First replace any occurrence of 'none' value of 'cert_policy' key setting with the correct configuration
# On Red Hat Enterprise Linux 6 a space isn't required between 'cert_policy' key and value assignment !!!
sed -i "s/^[$SP]*cert_policy=none;/ cert_policy=ca, ocsp_on, signature;/g" "$PAM_PKCS11_CONF"
# 2) Then append 'ocsp_on' value setting to each 'cert_policy' key in $PAM_PKCS11_CONF configuration line,
# which does not contain it yet
# On Red Hat Enterprise Linux 6 a space isn't required between 'cert_policy' key and value assignment !!!
sed -i "/ocsp_on/! s/^[$SP]*cert_policy=\(.*\);/ cert_policy=\1, ocsp_on;/" "$PAM_PKCS11_CONF"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-smartcard_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-smartcard_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_banner_etc_issue" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Modify the System Login Banner</ns10:title>
<ns10:description xml:lang="en-US">
To configure the system login banner:
<html:br /><html:br />
Edit <html:code>/etc/issue</html:code>. Replace the default text with a message
compliant with the local site policy or a legal disclaimer.
The DoD required text is either:
<html:br /><html:br />
<html:code>You are accessing a U.S. Government (USG) Information System (IS) that is
provided for USG-authorized use only. By using this IS (which includes any
device attached to this IS), you consent to the following conditions:
<html:br />-The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations.
<html:br />-At any time, the USG may inspect and seize data stored on this IS.
<html:br />-Communications using, or data stored on, this IS are not private, are subject
to routine monitoring, interception, and search, and may be disclosed or used
for any USG-authorized purpose.
<html:br />-This IS includes security measures (e.g., authentication and access controls)
to protect USG interests -- not for your personal benefit or privacy.
<html:br />-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative
searching or monitoring of the content of privileged communications, or work
product, related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details.</html:code>
<html:br /><html:br />
OR:
<html:br /><html:br />
<html:code>Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.
<html:br />This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended
for the communication, transmission, processing, and storage of official U.S. Government or other authorized
information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper
functioning of equipment and systems including security devices and systems, to prevent unauthorized use and
violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of
a DoD interest computer system should be aware that any information placed in the system is subject to
monitoring and is not subject to any expectation of privacy.
<html:br />If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal
statutes, this evidence and any other related information, including identification information about the user, may
be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals
violations of security regulations or unauthorized use, employees who violate security regulations or make
unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action.
<html:br />Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.</html:code>
<html:br /><html:br />
OR:
<html:br /><html:br />
<html:code>I've read & consent to terms in IS user agreem't.</html:code>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1384</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1385</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1387</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1388</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="banner_etc_issue" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
login_banner_text="<ns10:sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy" />"
# There was a regular-expression matching various banners, needs to be expanded
expanded=$(echo "$login_banner_text" | sed 's/\[\\s\\n\][+*]/ /g;s/\\//g;s/[^-]- /\n\n-/g')
formatted=$(echo "$expanded" | fold -sw 80)
cat <<EOF >/etc/issue
$formatted
EOF
printf "\n" >> /etc/issue
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-banner_etc_issue:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-banner_etc_issue_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_enable_warning_gui_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable GUI Warning Banner</ns10:title>
<ns10:description xml:lang="en-US">
To enable displaying a login warning banner in the GNOME
Display Manager's login screen, run the following command:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type bool \
--set /apps/gdm/simple-greeter/banner_message_enable true</html:pre>
To display a banner, this setting must be enabled and then
banner text must also be set.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">50</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_enable_warning_gui_banner" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"># Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Enable displaying of a login warning banner in the GNOME Display Manager's
# login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type bool \
--set /apps/gdm/simple-greeter/banner_message_enable true
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_enable_warning_gui_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_enable_warning_gui_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_gconf_gdm_set_login_banner_text" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set GUI Warning Banner Text</ns10:title>
<ns10:description xml:lang="en-US">
To set the text shown by the GNOME Display Manager
in the login screen, run the following command:
<html:pre>$ sudo gconftool-2 --direct \
--config-source xml:readwrite:/etc/gconf/gconf.xml.mandatory \
--type string \
--set /apps/gdm/simple-greeter/banner_message_text \
"Text of the warning banner here"</html:pre>
When entering a warning banner that spans several lines, remember
to begin and end the string with <html:code>"</html:code>. This command writes
directly either to the <html:code>/etc/gconf/gconf.xml.mandatory/%gconf-tree.xml</html:code>
if it exists or to the file <html:code>/etc/gconf/gconf.xml.mandatory/apps/gdm/simple-greeter/%gconf.xml</html:code>.
Either of these files can later be edited directly if necessary.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1384</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1385</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1387</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1388</ns10:reference>
<ns10:rationale xml:lang="en-US">
An appropriate warning message reinforces policy awareness during the login
process and facilitates possible legal action against attackers.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="gconf_gdm_set_login_banner_text" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
login_banner_text="<ns10:sub idref="xccdf_org.ssgproject.content_value_login_banner_text" use="legacy" />"
# Install GConf2 package if not installed
if ! rpm -q GConf2; then
yum -y install GConf2
fi
# Expand the login_banner_text value - there was a regular-expression
# matching various banners, needs to be expanded
banner_expanded=$(echo "$login_banner_text" | sed 's/\[\\s\\n\][*+]/ /g;s/\\//g;')
# Set the text shown by the GNOME Display Manager in the login screen
gconftool-2 --direct \
--config-source "xml:readwrite:/etc/gconf/gconf.xml.mandatory" \
--type string \
--set /apps/gdm/simple-greeter/banner_message_text "${banner_expanded}"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-login_banner_text:var:1" value-id="xccdf_org.ssgproject.content_value_login_banner_text" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-gconf_gdm_set_login_banner_text:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-gconf_gdm_set_login_banner_text_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_disable_zeroconf" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Zeroconf Networking</ns10:title>
<ns10:description xml:lang="en-US">Zeroconf networking allows the system to assign itself an IP
address and engage in IP communication without a statically-assigned address or
even a DHCP server. Automatic address assignment via Zeroconf (or DHCP) is not
recommended. To disable Zeroconf automatic route assignment in the 169.254.0.0
subnet, add or correct the following line in <html:code>/etc/sysconfig/network</html:code>:
<html:pre>NOZEROCONF=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Zeroconf addresses are in the network 169.254.0.0. The networking
scripts add entries to the system's routing table for these addresses. Zeroconf
address assignment commonly occurs when the system is configured to use DHCP
but fails to receive an address assignment from the DHCP server.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="network_disable_zeroconf" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">echo "NOZEROCONF=yes" >> /etc/sysconfig/network
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_disable_zeroconf:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_sniffer_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure System is Not Acting as a Network Sniffer</ns10:title>
<ns10:description xml:lang="en-US">The system should not be acting as a network sniffer, which can
capture all traffic on the network to which it is connected. Run the following
to determine if any interface is running in promiscuous mode:
<html:pre>$ ip link | grep PROMISC</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-3</ns10:reference>
<ns10:rationale xml:lang="en-US">If any results are returned, then a sniffing process (such as tcpdump
or Wireshark) is likely to be using the interface and this should be
investigated.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_sniffer_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects by Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.send_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.send_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.send_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Sending ICMP redirects permits the system to instruct other systems
to update their routing information. The ability to send ICMP redirects is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_send_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.conf.default.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.send_redirects=0
#
# If net.ipv4.conf.default.send_redirects present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.conf.default.send_redirects = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.send_redirects /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.conf.default.send_redirects.*/net.ipv4.conf.default.send_redirects = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.send_redirects to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.send_redirects = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_send_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_send_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.send_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.send_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.send_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Sending ICMP redirects permits the system to instruct other systems
to update their routing information. The ability to send ICMP redirects is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_send_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.conf.all.send_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.send_redirects=0
#
# If net.ipv4.conf.all.send_redirects present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.conf.all.send_redirects = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.send_redirects /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.conf.all.send_redirects.*/net.ipv4.conf.all.send_redirects = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.send_redirects to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_send_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for IP Forwarding</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.ip_forward</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.ip_forward=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.ip_forward = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">IP forwarding permits the kernel to forward packets from one network
interface to another. The ability to forward packets between two networks is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_ip_forward" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">#
# Set runtime for net.ipv4.ip_forward
#
/sbin/sysctl -q -n -w net.ipv4.ip_forward=0
#
# If net.ipv4.ip_forward present in /etc/sysctl.conf, change value to "0"
# else, add "net.ipv4.ip_forward = 0" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.ip_forward /etc/sysctl.conf ; then
sed -i 's/^net.ipv4.ip_forward.*/net.ipv4.ip_forward = 0/g' /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.ip_forward to 0 per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.ip_forward = 0" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_ip_forward:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_ip_forward_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_accept_source_route" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_accept_source_route_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_source_route=$sysctl_net_ipv4_conf_all_accept_source_route_value
#
# If net.ipv4.conf.all.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.accept_source_route = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.accept_source_route /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.accept_source_route.*/net.ipv4.conf.all.accept_source_route = $sysctl_net_ipv4_conf_all_accept_source_route_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.accept_source_route to $sysctl_net_ipv4_conf_all_accept_source_route_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_source_route = $sysctl_net_ipv4_conf_all_accept_source_route_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1503</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting ICMP redirects has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.accept_redirects=$sysctl_net_ipv4_conf_all_accept_redirects_value
#
# If net.ipv4.conf.all.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.accept_redirects.*/net.ipv4.conf.all.accept_redirects = $sysctl_net_ipv4_conf_all_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.accept_redirects to $sysctl_net_ipv4_conf_all_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_redirects = $sysctl_net_ipv4_conf_all_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Secure Redirects for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.secure_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.secure_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.secure_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1503</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting "secure" ICMP redirects (from those gateways listed as
default gateways) has few legitimate uses. It should be disabled unless it is
absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_secure_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_secure_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.secure_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.secure_redirects=$sysctl_net_ipv4_conf_all_secure_redirects_value
#
# If net.ipv4.conf.all.secure_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.secure_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.secure_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.secure_redirects.*/net.ipv4.conf.all.secure_redirects = $sysctl_net_ipv4_conf_all_secure_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.secure_redirects to $sysctl_net_ipv4_conf_all_secure_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.secure_redirects = $sysctl_net_ipv4_conf_all_secure_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_secure_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_secure_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_secure_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Log Martian Packets</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.log_martians</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.log_martians=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.log_martians = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The presence of "martian" packets (which have impossible addresses)
as well as spoofed packets, source-routed packets, and redirects could be a
sign of nefarious network activity. Logging these packets enables this activity
to be detected.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_log_martians" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_log_martians_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.log_martians
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.log_martians=$sysctl_net_ipv4_conf_all_log_martians_value
#
# If net.ipv4.conf.all.log_martians present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.log_martians = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.log_martians /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.log_martians.*/net.ipv4.conf.all.log_martians = $sysctl_net_ipv4_conf_all_log_martians_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.log_martians to $sysctl_net_ipv4_conf_all_log_martians_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.log_martians = $sysctl_net_ipv4_conf_all_log_martians_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_log_martians_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_log_martians_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_log_martians:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_log_martians_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting source-routed packets in the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_accept_source_route" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_accept_source_route_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.accept_source_route
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_source_route=$sysctl_net_ipv4_conf_default_accept_source_route_value
#
# If net.ipv4.conf.default.accept_source_route present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.accept_source_route = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.accept_source_route /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.accept_source_route.*/net.ipv4.conf.default.accept_source_route = $sysctl_net_ipv4_conf_default_accept_source_route_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.accept_source_route to $sysctl_net_ipv4_conf_default_accept_source_route_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.accept_source_route = $sysctl_net_ipv4_conf_default_accept_source_route_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting ICMP Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">This feature of the IPv4 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.accept_redirects=$sysctl_net_ipv4_conf_default_accept_redirects_value
#
# If net.ipv4.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.accept_redirects.*/net.ipv4.conf.default.accept_redirects = $sysctl_net_ipv4_conf_default_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.accept_redirects to $sysctl_net_ipv4_conf_default_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.accept_redirects = $sysctl_net_ipv4_conf_default_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Secure Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.secure_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.secure_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.secure_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Accepting "secure" ICMP redirects (from those gateways listed as
default gateways) has few legitimate uses. It should be disabled unless it is
absolutely required.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_secure_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_secure_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.secure_redirects
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.secure_redirects=$sysctl_net_ipv4_conf_default_secure_redirects_value
#
# If net.ipv4.conf.default.secure_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.secure_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.secure_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.secure_redirects.*/net.ipv4.conf.default.secure_redirects = $sysctl_net_ipv4_conf_default_secure_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.secure_redirects to $sysctl_net_ipv4_conf_default_secure_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.secure_redirects = $sysctl_net_ipv4_conf_default_secure_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_secure_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_secure_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_secure_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.icmp_echo_ignore_broadcasts</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.icmp_echo_ignore_broadcasts = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Ignoring ICMP echo requests (pings) sent to broadcast or multicast
addresses makes the system slightly more difficult to enumerate on the network.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" use="legacy" />"
#
# Set runtime for net.ipv4.icmp_echo_ignore_broadcasts
#
/sbin/sysctl -q -n -w net.ipv4.icmp_echo_ignore_broadcasts=$sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value
#
# If net.ipv4.icmp_echo_ignore_broadcasts present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.icmp_echo_ignore_broadcasts = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.icmp_echo_ignore_broadcasts /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.icmp_echo_ignore_broadcasts.*/net.ipv4.icmp_echo_ignore_broadcasts = $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.icmp_echo_ignore_broadcasts to $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.icmp_echo_ignore_broadcasts = $sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_icmp_echo_ignore_broadcasts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Ignore Bogus ICMP Error Responses</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.icmp_ignore_bogus_error_responses</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.icmp_ignore_bogus_error_responses = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Ignoring bogus ICMP error responses reduces
log size, although some activity would not be logged.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" use="legacy" />"
#
# Set runtime for net.ipv4.icmp_ignore_bogus_error_responses
#
/sbin/sysctl -q -n -w net.ipv4.icmp_ignore_bogus_error_responses=$sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value
#
# If net.ipv4.icmp_ignore_bogus_error_responses present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.icmp_ignore_bogus_error_responses = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.icmp_ignore_bogus_error_responses /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.icmp_ignore_bogus_error_responses.*/net.ipv4.icmp_ignore_bogus_error_responses = $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.icmp_ignore_bogus_error_responses to $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.icmp_ignore_bogus_error_responses = $sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_icmp_ignore_bogus_error_responses_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use TCP Syncookies</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.tcp_syncookies</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.tcp_syncookies=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.tcp_syncookies = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5(3)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1095</ns10:reference>
<ns10:rationale xml:lang="en-US"> A TCP SYN flood attack can cause a denial of service by filling a
system's TCP connection table with connections in the SYN_RCVD state.
Syncookies can be used to track a connection when a subsequent ACK is received,
verifying the initiator is attempting a valid connection and is not a flood
source. This feature is activated when a flood condition is detected, and
enables the system to continue servicing valid connection requests.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_tcp_syncookies" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_tcp_syncookies_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" use="legacy" />"
#
# Set runtime for net.ipv4.tcp_syncookies
#
/sbin/sysctl -q -n -w net.ipv4.tcp_syncookies=$sysctl_net_ipv4_tcp_syncookies_value
#
# If net.ipv4.tcp_syncookies present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.tcp_syncookies = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.tcp_syncookies /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.tcp_syncookies.*/net.ipv4.tcp_syncookies = $sysctl_net_ipv4_tcp_syncookies_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.tcp_syncookies to $sysctl_net_ipv4_tcp_syncookies_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.tcp_syncookies = $sysctl_net_ipv4_tcp_syncookies_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_tcp_syncookies_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_tcp_syncookies_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_tcp_syncookies:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_tcp_syncookies_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use Reverse Path Filtering for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.all.rp_filter</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.all.rp_filter=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.all.rp_filter = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling reverse path filtering drops packets with source addresses
that should not have been able to be received on the interface they were
received on. It should not be used on systems which are routers for
complicated networks, but is helpful for end hosts and routers serving small
networks.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_all_rp_filter" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_all_rp_filter_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.all.rp_filter
#
/sbin/sysctl -q -n -w net.ipv4.conf.all.rp_filter=$sysctl_net_ipv4_conf_all_rp_filter_value
#
# If net.ipv4.conf.all.rp_filter present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.all.rp_filter = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.all.rp_filter /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.all.rp_filter.*/net.ipv4.conf.all.rp_filter = $sysctl_net_ipv4_conf_all_rp_filter_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.all.rp_filter to $sysctl_net_ipv4_conf_all_rp_filter_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.rp_filter = $sysctl_net_ipv4_conf_all_rp_filter_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_all_rp_filter_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_all_rp_filter:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_all_rp_filter_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter to Use Reverse Path Filtering by Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv4.conf.default.rp_filter</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv4.conf.default.rp_filter=1</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv4.conf.default.rp_filter = 1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling reverse path filtering drops packets with source addresses
that should not have been able to be received on the interface they were
received on. It should not be used on systems which are routers for
complicated networks, but is helpful for end hosts and routers serving small
networks.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv4_conf_default_rp_filter" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv4_conf_default_rp_filter_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" use="legacy" />"
#
# Set runtime for net.ipv4.conf.default.rp_filter
#
/sbin/sysctl -q -n -w net.ipv4.conf.default.rp_filter=$sysctl_net_ipv4_conf_default_rp_filter_value
#
# If net.ipv4.conf.default.rp_filter present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv4.conf.default.rp_filter = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv4.conf.default.rp_filter /etc/sysctl.conf ; then
sed -i "s/^net.ipv4.conf.default.rp_filter.*/net.ipv4.conf.default.rp_filter = $sysctl_net_ipv4_conf_default_rp_filter_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv4.conf.default.rp_filter to $sysctl_net_ipv4_conf_default_rp_filter_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv4.conf.default.rp_filter = $sysctl_net_ipv4_conf_default_rp_filter_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv4_conf_default_rp_filter_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv4_conf_default_rp_filter:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv4_conf_default_rp_filter_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_wireless_disable_in_bios" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable WiFi or Bluetooth in BIOS</ns10:title>
<ns10:description xml:lang="en-US">Some systems that include built-in wireless support offer the
ability to disable the device through the BIOS. This is system-specific;
consult your hardware manual or explore the BIOS setup during
boot.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling wireless support in the BIOS prevents easy
activation of the wireless interface, generally requiring administrators
to reboot the system first.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_wireless_disable_interfaces" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deactivate Wireless Network Interfaces</ns10:title>
<ns10:description xml:lang="en-US">Deactivating wireless network interfaces should prevent
normal usage of the wireless capability.
<html:br /><html:br />
First, identify the interfaces available with the command:
<html:pre>$ ifconfig -a</html:pre>
Additionally, the following command may be used to
determine whether wireless support is included for a
particular interface, though this may not always be a clear
indicator:
<html:pre>$ iwconfig</html:pre>
After identifying any wireless interfaces (which may have
names like <html:code>wlan0</html:code>, <html:code>ath0</html:code>, <html:code>wifi0</html:code>, <html:code>em1</html:code> or
<html:code>eth0</html:code>), deactivate the interface with the command:
<html:pre>$ sudo ifdown <html:i>interface</html:i></html:pre>
These changes will only last until the next reboot. To
disable the interface for future boots, remove the appropriate
interface file from <html:code>/etc/sysconfig/network-scripts</html:code>:
<html:pre>$ sudo rm /etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:rationale xml:lang="en-US">Wireless networking allows attackers within physical proximity to
launch network-based attacks against systems, including those against local LAN
protocols which were not designed with security in mind.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-wireless_disable_interfaces:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_bluetooth_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Bluetooth Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>bluetooth</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig bluetooth off</html:pre>
<html:pre>$ sudo service bluetooth stop</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">Disabling the <html:code>bluetooth</html:code> service prevents the system from attempting
connections to Bluetooth devices, which entails some security risk.
Nevertheless, variation in this risk decision may be expected due to the
utility of Bluetooth connectivity and its limited range.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_bluetooth_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable bluetooth
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_bluetooth_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service bluetooth
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- bluetooth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_bluetooth_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_bluetooth_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_bluetooth_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Bluetooth Kernel Modules</ns10:title>
<ns10:description xml:lang="en-US">The kernel's module loading system can be configured to prevent
loading of the Bluetooth module. Add the following to
the appropriate <html:code>/etc/modprobe.d</html:code> configuration file
to prevent the loading of the Bluetooth module:
<html:pre>install bluetooth /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-18(3)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">If Bluetooth functionality must be disabled, preventing the kernel
from loading the kernel module provides an additional safeguard against its
activation.</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_bluetooth_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">if grep --silent "^install bluetooth" /etc/modprobe.d/bluetooth.conf ; then
sed -i 's/^install bluetooth.*/install bluetooth /bin/true/g' /etc/modprobe.d/bluetooth.conf
else
echo -e "\n# Disable per security requirements" >> /etc/modprobe.d/bluetooth.conf
echo "install bluetooth /bin/true" >> /etc/modprobe.d/bluetooth.conf
fi
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_bluetooth_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'bluetooth' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- bluetooth
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_bluetooth_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_bluetooth_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_ipv6_option_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable IPv6 Networking Support Automatic Loading</ns10:title>
<ns10:description xml:lang="en-US">To prevent the IPv6 kernel module (<html:code>ipv6</html:code>) from binding to the
IPv6 networking stack, add the following line to
<html:code>/etc/modprobe.d/disabled.conf</html:code> (or another file in
<html:code>/etc/modprobe.d</html:code>):
<html:pre>options ipv6 disable=1</html:pre>
This permits the IPv6 module to be loaded (and thus satisfy other modules that
depend on it), while disabling support for the IPv6 protocol.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:rationale xml:lang="en-US">
Any unnecessary network stacks - including IPv6 - should be disabled, to reduce
the vulnerability to exploitation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="kernel_module_ipv6_option_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Prevent the IPv6 kernel module (ipv6) from loading the IPv6 networking stack
echo "options ipv6 disable=1" > /etc/modprobe.d/ipv6.conf
# Since according to: https://access.redhat.com/solutions/72733
# "ipv6 disable=1" options doesn't always disable the IPv6 networking stack from
# loading, instruct also sysctl configuration to disable IPv6 according to:
# https://access.redhat.com/solutions/8709#rhel6disable
declare -a IPV6_SETTINGS=("net.ipv6.conf.all.disable_ipv6" "net.ipv6.conf.default.disable_ipv6")
for setting in ${IPV6_SETTINGS[@]}
do
# Set runtime =1 for setting
/sbin/sysctl -q -n -w "$setting=1"
# If setting is present in /etc/sysctl.conf, change value to "1"
# else, add "$setting = 1" to /etc/sysctl.conf
if grep -q ^"$setting" /etc/sysctl.conf ; then
sed -i "s/^$setting.*/$setting = 1/g" /etc/sysctl.conf
else
echo "" >> /etc/sysctl.conf
echo "# Set $setting = 1 per security requirements" >> /etc/sysctl.conf
echo "$setting = 1" >> /etc/sysctl.conf
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_ipv6_option_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_ipv6_option_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_disable_interfaces" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Interface Usage of IPv6</ns10:title>
<ns10:description xml:lang="en-US">To disable interface usage of IPv6, add or correct the following lines in <html:code>/etc/sysconfig/network</html:code>:
<html:pre>NETWORKING_IPV6=no
IPV6INIT=no</html:pre>
</ns10:description>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_disable_rpc" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Support for RPC IPv6</ns10:title>
<ns10:description xml:lang="en-US">RPC services for NFSv4 try to load transport modules for
<html:code>udp6</html:code> and <html:code>tcp6</html:code> by default, even if IPv6 has been disabled in
<html:code>/etc/modprobe.d</html:code>. To prevent RPC services such as <html:code>rpc.mountd</html:code>
from attempting to start IPv6 network listeners, remove or comment out the
following two lines in <html:code>/etc/netconfig</html:code>:
<html:pre>udp6 tpi_clts v inet6 udp - -
tcp6 tpi_cots_ord v inet6 tcp - -</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:fix complexity="low" disruption="low" id="network_ipv6_disable_rpc" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Drop 'tcp6' and 'udp6' entries from /etc/netconfig to prevent RPC
# services for NFSv4 from attempting to start IPv6 network listeners
declare -a IPV6_RPC_ENTRIES=("tcp6" "udp6")
for rpc_entry in ${IPV6_RPC_ENTRIES[@]}
do
sed -i "/^$rpc_entry[[:space:]]\+tpi\_.*inet6.*/d" /etc/netconfig
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_disable_rpc:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for All Interfaces</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router, which can
be used to bypass network security measures. This requirement applies only to the
forwarding of source-routerd traffic, such as when IPv6 forwarding is enabled and
the system is functioning as a router.
Accepting source-routed packets in the IPv6 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Router Advertisements</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_ra</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_ra=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_ra = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit router advertisement message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_ra_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_ra:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_ra_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Router Advertisements</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_ra</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_ra=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_ra = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit router advertisement message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv6_conf_default_accept_ra" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv6_conf_default_accept_ra_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" use="legacy" />"
#
# Set runtime for net.ipv6.conf.default.accept_ra
#
/sbin/sysctl -q -n -w net.ipv6.conf.default.accept_ra=$sysctl_net_ipv6_conf_default_accept_ra_value
#
# If net.ipv6.conf.default.accept_ra present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv6.conf.default.accept_ra = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv6.conf.default.accept_ra /etc/sysctl.conf ; then
sed -i "s/^net.ipv6.conf.default.accept_ra.*/net.ipv6.conf.default.accept_ra = $sysctl_net_ipv6_conf_default_accept_ra_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv6.conf.default.accept_ra to $sysctl_net_ipv6_conf_default_accept_ra_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv6.conf.default.accept_ra = $sysctl_net_ipv6_conf_default_accept_ra_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_ra_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_ra:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_ra_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.2</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit ICMP redirect message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Accepting IPv6 Redirects By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_redirects</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_redirects = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1551</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.4.1.2</ns10:reference>
<ns10:rationale xml:lang="en-US">
An illicit ICMP redirect message could result in a man-in-the-middle attack.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="sysctl_net_ipv6_conf_default_accept_redirects" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">
sysctl_net_ipv6_conf_default_accept_redirects_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" use="legacy" />"
#
# Set runtime for net.ipv6.conf.default.accept_redirects
#
/sbin/sysctl -q -n -w net.ipv6.conf.default.accept_redirects=$sysctl_net_ipv6_conf_default_accept_redirects_value
#
# If net.ipv6.conf.default.accept_redirects present in /etc/sysctl.conf, change value to appropriate value
# else, add "net.ipv6.conf.default.accept_redirects = value" to /etc/sysctl.conf
#
if grep --silent ^net.ipv6.conf.default.accept_redirects /etc/sysctl.conf ; then
sed -i "s/^net.ipv6.conf.default.accept_redirects.*/net.ipv6.conf.default.accept_redirects = $sysctl_net_ipv6_conf_default_accept_redirects_value/g" /etc/sysctl.conf
else
echo -e "\n# Set net.ipv6.conf.default.accept_redirects to $sysctl_net_ipv6_conf_default_accept_redirects_value per security requirements" >> /etc/sysctl.conf
echo "net.ipv6.conf.default.accept_redirects = $sysctl_net_ipv6_conf_default_accept_redirects_value" >> /etc/sysctl.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_redirects_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_redirects:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_redirects_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_source_route" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Kernel Parameter for Accepting Source-Routed Packets for Interfaces By Default</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.default.accept_source_route</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.default.accept_source_route = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Source-routed packets allow the source of the packet to suggest routers
forward the packet along a different path than configured on the router, which can
be used to bypass network security measures. This requirement applies only to the
forwarding of source-routerd traffic, such as when IPv6 forwarding is enabled and
the system is functioning as a router.
Accepting source-routed packets in the IPv6 protocol has few legitimate
uses. It should be disabled unless it is absolutely required.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_default_accept_source_route_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_default_accept_source_route:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_default_accept_source_route_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_forwarding" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Kernel Parameter for IPv6 Forwarding</ns10:title>
<ns10:description xml:lang="en-US">
To set the runtime status of the <html:code>net.ipv6.conf.all.forwarding</html:code> kernel parameter,
run the following command:
<html:pre xml:space="preserve">$ sudo sysctl -w net.ipv6.conf.all.forwarding=0</html:pre>
If this is not the system's default value, add the following line to <html:code>/etc/sysctl.conf</html:code>:
<html:pre xml:space="preserve">net.ipv6.conf.all.forwarding = 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:reference href="https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_6_Benchmark_v1.1.0.pdf">4.1.1</ns10:reference>
<ns10:rationale xml:lang="en-US">IP forwarding permits the kernel to forward packets from one network
interface to another. The ability to forward packets between two networks is
only appropriate for systems acting as routers.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sysctl_net_ipv6_conf_all_forwarding_value:var:1" value-id="xccdf_org.ssgproject.content_value_sysctl_net_ipv6_conf_all_forwarding_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysctl_net_ipv6_conf_all_forwarding:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysctl_net_ipv6_conf_all_forwarding_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_static_address" selected="false" severity="low">
<ns10:title xml:lang="en-US">Manually Assign Global IPv6 Address</ns10:title>
<ns10:description xml:lang="en-US">To manually assign an IP address for an interface, edit the
file <html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>. Add or correct the
following line (substituting the correct IPv6 address):
<html:pre>IPV6ADDR=2001:0DB8::ABCD/64</html:pre>
Manually assigning an IP address is preferable to accepting one from routers or
from the network otherwise. The example address here is an IPv6 address
reserved for documentation purposes, as defined by RFC3849.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_static_address:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_privacy_extensions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Privacy Extensions for Address</ns10:title>
<ns10:description xml:lang="en-US">To introduce randomness into the automatic generation of IPv6
addresses, add or correct the following line in
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>:
<html:pre>IPV6_PRIVACY=rfc3041</html:pre>
Automatically-generated IPv6 addresses are based on the underlying hardware
(e.g. Ethernet) address, and so it becomes possible to track a piece of
hardware over its lifetime using its traffic. If it is important for a system's
IP address to not trivially reveal its hardware address, this setting should be
applied.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_privacy_extensions:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_network_ipv6_default_gateway" selected="false" severity="low">
<ns10:title xml:lang="en-US">Manually Assign IPv6 Router Address</ns10:title>
<ns10:description xml:lang="en-US">Edit the file
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code>, and add or correct
the following line (substituting your gateway IP as appropriate):
<html:pre>IPV6_DEFAULTGW=2001:0DB8::0001</html:pre>
Router addresses should be manually set and not accepted via any
auto-configuration or router advertisement.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-6(b)</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-network_ipv6_default_gateway:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ip6tables_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify ip6tables Enabled if Using IPv6</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ip6tables</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 ip6tables on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1118</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1117</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1098</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1100</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1097</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>ip6tables</html:code> service provides the system's host-based firewalling
capability for IPv6 and ICMPv6.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ip6tables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable ip6tables
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ip6tables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service ip6tables
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- ip6tables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ip6tables_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ip6tables_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_ip6tables_default_rule" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default ip6tables Policy for Incoming Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code>/etc/sysconfig/ip6tables</html:code>:
<html:pre>:INPUT DROP [0:0]</html:pre>
If changes were required, reload the ip6tables rules:
<html:pre>$ sudo service ip6tables reload</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>ip6tables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_ip6tables_default_rule" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:INPUT ACCEPT.*/:INPUT DROP [0:0]/g' /etc/sysconfig/ip6tables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_ip6tables_default_rule:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_ip6tables_default_rule_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_iptables_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Verify iptables Enabled</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>iptables</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 iptables on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CA-3(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">32</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1118</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1092</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1117</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1098</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1100</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1097</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>iptables</html:code> service provides the system's host-based firewalling
capability for IPv4 and ICMP.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_iptables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable iptables
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_iptables_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service iptables
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_iptables_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_iptables_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default iptables Policy for Incoming Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in INPUT chain which processes incoming packets,
add or correct the following line in
<html:code>/etc/sysconfig/iptables</html:code>:
<html:pre>:INPUT DROP [0:0]</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1109</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1154</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>iptables</html:code> the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_iptables_default_rule" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:INPUT ACCEPT.*/:INPUT DROP [0:0]/g' /etc/sysconfig/iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_iptables_default_rule:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_iptables_default_rule_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_set_iptables_default_rule_forward" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Set Default iptables Policy for Forwarded Packets</ns10:title>
<ns10:description xml:lang="en-US">To set the default policy to DROP (instead of ACCEPT) for
the built-in FORWARD chain which processes packets that will be forwarded from
one interface to another,
add or correct the following line in
<html:code>/etc/sysconfig/iptables</html:code>:
<html:pre>:FORWARD DROP [0:0]</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1109</ns10:reference>
<ns10:rationale xml:lang="en-US">In <html:code>iptables</html:code>, the default policy is applied only after all
the applicable rules in the table are examined for a match. Setting the
default policy to <html:code>DROP</html:code> implements proper design for a firewall, i.e.
any packets which are not explicitly permitted should not be
accepted.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="set_iptables_default_rule_forward" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">sed -i 's/^:FORWARD ACCEPT.*/:FORWARD DROP [0:0]/g' /etc/sysconfig/iptables
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-set_iptables_default_rule_forward:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-set_iptables_default_rule_forward_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable DCCP Support</ns10:title>
<ns10:description xml:lang="en-US">
The Datagram Congestion Control Protocol (DCCP) is a
relatively new transport layer protocol, designed to support
streaming media and telephony.
To configure the system to prevent the <html:code>dccp</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install dccp /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling DCCP protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_dccp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install dccp /bin/true" > /etc/modprobe.d/dccp.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_dccp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'dccp' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- dccp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_dccp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_dccp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SCTP Support</ns10:title>
<ns10:description xml:lang="en-US">
The Stream Control Transmission Protocol (SCTP) is a
transport layer protocol, designed to support the idea of
message-oriented communication, with several streams of messages
within one connection.
To configure the system to prevent the <html:code>sctp</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install sctp /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling SCTP protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_sctp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install sctp /bin/true" > /etc/modprobe.d/sctp.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_sctp_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'sctp' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- sctp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_sctp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_sctp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_rds_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RDS Support</ns10:title>
<ns10:description xml:lang="en-US">
The Reliable Datagram Sockets (RDS) protocol is a transport
layer protocol designed to provide reliable high- bandwidth,
low-latency communications between nodes in a cluster.
To configure the system to prevent the <html:code>rds</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install rds /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling RDS protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_rds_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install rds /bin/true" > /etc/modprobe.d/rds.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_rds_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'rds' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- rds
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_rds_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_rds_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_kernel_module_tipc_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable TIPC Support</ns10:title>
<ns10:description xml:lang="en-US">
The Transparent Inter-Process Communication (TIPC) protocol
is designed to provide communications between nodes in a
cluster.
To configure the system to prevent the <html:code>tipc</html:code>
kernel module from being loaded, add the following line to a file in the directory <html:code>/etc/modprobe.d</html:code>:
<html:pre xml:space="preserve">install tipc /bin/true</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling TIPC protects
the system against exploitation of any flaws in its implementation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_tipc_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:sh">echo "install tipc /bin/true" > /etc/modprobe.d/tipc.conf
</ns10:fix>
<ns10:fix complexity="low" disruption="medium" id="kernel_module_tipc_disabled" reboot="true" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure kernel module 'tipc' is disabled
lineinfile:
create=yes
dest="/etc/modprobe.d/{{item}}.conf"
regexp="{{item}}"
line="install {{item}} /bin/true"
with_items:
- tipc
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-kernel_module_tipc_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-kernel_module_tipc_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_openswan_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install openswan or libreswan Package</ns10:title>
<ns10:description xml:lang="en-US">The openswan and libreswan packages provide an implementation of
IPsec and IKE, which permits the creation of secure tunnels over untrusted
networks.
The <html:code>openswan</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install openswan</html:pre>
The <html:code>libreswan</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install libreswan</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MA-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1131</ns10:reference>
<ns10:rationale xml:lang="en-US">Providing the ability for remote users or systems
to initiate a secure VPN connection protects information when it is
transmitted over a wide area network.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install openswan
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure openswan is installed
package:
name="{{item}}"
state=present
with_items:
- openswan
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_openswan
class install_openswan {
package { 'openswan':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_openswan_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=openswan
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_openswan_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_openswan_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsyslog_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure rsyslog is Installed</ns10:title>
<ns10:description xml:lang="en-US">
Rsyslog is installed by default.
The <html:code>rsyslog</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install rsyslog</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:rationale xml:lang="en-US">
The rsyslog package provides the rsyslog daemon, which provides
system logging services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsyslog is installed
package:
name="{{item}}"
state=present
with_items:
- rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsyslog_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=rsyslog
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsyslog_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsyslog_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rsyslog_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable rsyslog Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> service provides syslog-style logging by default on Red Hat Enterprise Linux 6.
The <html:code>rsyslog</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 rsyslog on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1557</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rsyslog</html:code> service must be running in order to provide
logging services, which are essential to system administration.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rsyslog_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable rsyslog
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rsyslog_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service rsyslog
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- rsyslog
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rsyslog_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rsyslog_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate User</ns10:title>
<ns10:description xml:lang="en-US">The owner of all log files written by
<html:code>rsyslog</html:code> should be root.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's owner:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code>root</html:code>, run the following command to
correct this:
<html:pre>$ sudo chown root <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_ownership:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_ownership_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure Log Files Are Owned By Appropriate Group</ns10:title>
<ns10:description xml:lang="en-US">The group-owner of all log files written by
<html:code>rsyslog</html:code> should be root.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's group owner:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the owner is not <html:code>root</html:code>, run the following command to
correct this:
<html:pre>$ sudo chgrp root <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">The log files generated by rsyslog contain valuable information regarding system
configuration, user authentication, and other such information. Log files should be
protected from unauthorized access.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_groupownership:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_groupownership_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Ensure System Log Files Have Correct Permissions</ns10:title>
<ns10:description xml:lang="en-US">The file permissions for all log files written by
<html:code>rsyslog</html:code> should be set to 600, or more restrictive.
These log files are determined by the second part of each Rule line in
<html:code>/etc/rsyslog.conf</html:code> and typically all appear in <html:code>/var/log</html:code>.
For each log file <html:i>LOGFILE</html:i> referenced in <html:code>/etc/rsyslog.conf</html:code>,
run the following command to inspect the file's permissions:
<html:pre>$ ls -l <html:i>LOGFILE</html:i></html:pre>
If the permissions are not 600 or more restrictive,
run the following command to correct this:
<html:pre>$ sudo chmod 0600 <html:i>LOGFILE</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-11</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:rationale xml:lang="en-US">Log files can contain valuable information regarding system
configuration. If the system log files are not protected unauthorized
users could change the logged data, eliminating their forensic value.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="rsyslog_files_permissions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# List of log file paths to be inspected for correct permissions
# * Primarily inspect log file paths listed in /etc/rsyslog.conf
RSYSLOG_ETC_CONFIG="/etc/rsyslog.conf"
# * And also the log file paths listed after rsyslog's $IncludeConfig directive
# (store the result into array for the case there's shell glob used as value of IncludeConfig)
RSYSLOG_INCLUDE_CONFIG=($(grep -e "\$IncludeConfig[[:space:]]\+[^[:space:];]\+" /etc/rsyslog.conf | cut -d ' ' -f 2))
# Declare an array to hold the final list of different log file paths
declare -a LOG_FILE_PATHS
# Browse each file selected above as containing paths of log files
# ('/etc/rsyslog.conf' and '/etc/rsyslog.d/*.conf' in the default configuration)
for LOG_FILE in "${RSYSLOG_ETC_CONFIG}" "${RSYSLOG_INCLUDE_CONFIG[@]}"
do
# From each of these files extract just particular log file path(s), thus:
# * Ignore lines starting with space (' '), comment ('#"), or variable syntax ('$') characters,
# * Ignore empty lines,
# * From the remaining valid rows select only fields constituting a log file path
# Text file column is understood to represent a log file path if and only if all of the following are met:
# * it contains at least one slash '/' character,
# * it doesn't contain space (' '), colon (':'), and semicolon (';') characters
# Search log file for path(s) only in case it exists!
if [[ -f "${LOG_FILE}" ]]
then
MATCHED_ITEMS=$(sed -e "/^[[:space:]|#|$]/d ; s/[^\/]*[[:space:]]*\([^:;[:space:]]*\)/\1/g ; /^$/d" "${LOG_FILE}")
# Since above sed command might return more than one item (delimited by newline), split the particular
# matches entries into new array specific for this log file
readarray -t ARRAY_FOR_LOG_FILE <<< "$MATCHED_ITEMS"
# Concatenate the two arrays - previous content of $LOG_FILE_PATHS array with
# items from newly created array for this log file
LOG_FILE_PATHS=("${LOG_FILE_PATHS[@]}" "${ARRAY_FOR_LOG_FILE[@]}")
# Delete the temporary array
unset ARRAY_FOR_LOG_FILE
fi
done
for PATH in "${LOG_FILE_PATHS[@]}"
do
# Sanity check - if particular $PATH is empty string, skip it from further processing
if [ -z "$PATH" ]
then
continue
fi
# Per https://access.redhat.com/solutions/66805 '/var/log/boot.log' log file needs special care => perform it
if [ "$PATH" == "/var/log/boot.log" ]
then
# Ensure permissions of /var/log/boot.log are configured to be updated in /etc/rc.local
if ! /bin/grep -q "boot.log" "/etc/rc.local"
then
echo "/bin/chmod 600 /var/log/boot.log" >> /etc/rc.local
fi
# Ensure /etc/rc.d/rc.local has user-executable permission
# (in order to be actually executed during boot)
if [ "$(/usr/bin/stat -c %a /etc/rc.d/rc.local)" -ne 744 ]
then
/bin/chmod u+x /etc/rc.d/rc.local
fi
fi
# Also for each log file check if its permissions differ from 600. If so, correct them
if [ "$(/usr/bin/stat -c %a "$PATH")" -ne 600 ]
then
/bin/chmod 600 "$PATH"
fi
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_files_permissions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_files_permissions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure Logs Sent To Remote Host</ns10:title>
<ns10:description xml:lang="en-US">
To configure rsyslog to send logs to a remote log server,
open <html:code>/etc/rsyslog.conf</html:code> and read and understand the last section of the file,
which describes the multiple directives necessary to activate remote
logging.
Along with these other directives, the system can be configured
to forward its logs to a particular log server by
adding or correcting one of the following lines,
substituting <html:code><html:i>loghost.example.com</html:i></html:code> appropriately.
The choice of protocol depends on the environment of the system;
although TCP and RELP provide more reliable message delivery,
they may not be supported in all environments.
<html:br />
To use UDP for log message delivery:
<html:pre>*.* @<html:i>loghost.example.com</html:i></html:pre>
<html:br />
To use TCP for log message delivery:
<html:pre>*.* @@<html:i>loghost.example.com</html:i></html:pre>
<html:br />
To use RELP for log message delivery:
<html:pre>*.* :omrelp:<html:i>loghost.example.com</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1348</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">136</ns10:reference>
<ns10:rationale xml:lang="en-US">A log server (loghost) receives syslog messages from one or more
systems. This data can be used as an additional log source in the event a
system is compromised and its local logs are suspect. Forwarding log messages
to a remote loghost also provides system administrators with a centralized
place to view the status of multiple hosts within the enterprise.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_remote_loghost:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-rsyslog_remote_loghost_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
To ensure that it is not listening on the network, ensure the following lines are
<html:i>not</html:i> found in <html:code>/etc/rsyslog.conf</html:code>:
<html:pre>$ModLoad imtcp
$InputTCPServerRun <html:i>port</html:i>
$ModLoad imudp
$UDPServerRun <html:i>port</html:i>
$ModLoad imrelp
$InputRELPServerRun <html:i>port</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:rationale xml:lang="en-US">
Any process which receives messages from the network incurs some risk
of receiving malicious messages. This risk can be eliminated for
rsyslog by configuring it not to listen on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-rsyslog_nolisten:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_listen_tcp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable rsyslog to Accept Messages via TCP, if Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code>/etc/rsyslog.conf</html:code> to enable reception of messages over TCP:
<html:pre>$ModLoad imtcp
$InputTCPServerRun 514</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">
If the system needs to act as a log server, this ensures that it can receive
messages over a reliable TCP connection.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable rsyslog to Accept Messages via UDP, if Acting As Log Server</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsyslog</html:code> daemon should not accept remote messages
unless the system acts as a log server.
If the system needs to act as a central log server, add the following lines to
<html:code>/etc/rsyslog.conf</html:code> to enable reception of messages over UDP:
<html:pre>$ModLoad imudp
$UDPServerRun 514</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:rationale xml:lang="en-US">
Many devices, such as switches, routers, and other Unix-like systems, may only support
the traditional syslog transmission over UDP. If the system must act as a log server,
this enables it to receive their messages as well.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ensure_logrotate_activated" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure Logrotate Runs Periodically</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>logrotate</html:code> utility allows for the automatic rotation of
log files. The frequency of rotation is specified in <html:code>/etc/logrotate.conf</html:code>,
which triggers a cron task. To configure logrotate to run daily, add or correct
the following line in <html:code>/etc/logrotate.conf</html:code>:
<html:pre># rotate log files <html:i>frequency</html:i>
daily</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ensure_logrotate_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ensure_logrotate_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_logwatch_configured_hostlimit" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logwatch HostLimit Line</ns10:title>
<ns10:description xml:lang="en-US"> On a central logserver, you want Logwatch to summarize all syslog entries, including those which did not originate
on the logserver itself. The <html:code>HostLimit</html:code> setting tells Logwatch to report on all hosts, not just the one on which it
is running.
<html:pre> HostLimit = no </html:pre> </ns10:description>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-logwatch_configured_hostlimit:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_logwatch_configured_splithosts" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logwatch SplitHosts Line</ns10:title>
<ns10:description xml:lang="en-US">
If <html:code>SplitHosts</html:code> is set, Logwatch will separate entries by hostname. This makes the report longer but significantly
more usable. If it is not set, then Logwatch will not report which host generated a given log entry, and that
information is almost always necessary
<html:pre> SplitHosts = yes </html:pre> </ns10:description>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-logwatch_configured_splithosts:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_logwatch_for_logserver" selected="false" severity="low">
<ns10:title xml:lang="en-US"> Disable Logwatch on Clients if a Logserver Exists</ns10:title>
<ns10:description xml:lang="en-US">
Does your site have a central logserver which has been configured to report on logs received from all systems?
If so:
<html:pre>
$ sudo rm /etc/cron.daily/0logwatch
</html:pre>
If no logserver exists, it will be necessary for each machine to run Logwatch individually. Using a central
logserver provides the security and reliability benefits discussed earlier, and also makes monitoring logs easier
and less time-intensive for administrators.</ns10:description>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_auditd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable auditd Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service is an essential userspace component of
the Linux Auditing System, as it is responsible for writing audit records to
disk.
The <html:code>auditd</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 auditd on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">347</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">172</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">880</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1353</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1462</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1115</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1454</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">067</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">158</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">831</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1190</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1312</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1263</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">120</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1589</ns10:reference>
<ns10:rationale xml:lang="en-US">Ensuring the <html:code>auditd</html:code> service is active ensures
audit records generated by the kernel can be written to disk, or that appropriate
actions will be taken if other obstacles exist.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_auditd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable auditd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_auditd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service auditd
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- auditd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_auditd_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_auditd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_bootloader_audit_argument" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Auditing for Processes Which Start Prior to the Audit Daemon</ns10:title>
<ns10:description xml:lang="en-US">To ensure all processes can be audited, even
those which start prior to the audit daemon, add the argument
<html:code>audit=1</html:code> to the kernel line in <html:code>/etc/grub.conf</html:code>, in the manner below:
<html:pre>kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet audit=1</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-14(1)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-10</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">
Each process on the system carries an "auditable" flag which
indicates whether its activities can be audited. Although <html:code>auditd</html:code>
takes care of enabling this for all processes which launch after it
does, adding the kernel argument ensures it is set for every
process during boot.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="bootloader_audit_argument" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">/sbin/grubby --update-kernel=ALL --args="audit=1"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-bootloader_audit_argument:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-bootloader_audit_argument_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_num_logs" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd Number of Logs Retained</ns10:title>
<ns10:description xml:lang="en-US">Determine how many log files
<html:code>auditd</html:code> should retain when it rotates logs.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following
line, substituting <html:i>NUMLOGS</html:i> with the correct value of <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy" />:
<html:pre>num_logs = <html:i>NUMLOGS</html:i></html:pre>
Set the value to 5 for general-purpose systems.
Note that values less than 2 result in no log rotation.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum log
file size and the number of logs retained.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_num_logs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_num_logs="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_num_logs" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^num_logs $AUDITCONFIG && \
sed -i 's/^num_logs.*/num_logs = '"$var_auditd_num_logs"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "num_logs = $var_auditd_num_logs" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_num_logs:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_num_logs" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_num_logs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_num_logs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd Max Log File Size</ns10:title>
<ns10:description xml:lang="en-US">Determine the amount of audit data (in megabytes)
which should be retained in each log file. Edit the file
<html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following line, substituting
the correct value of <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" use="legacy" /> for <html:i>STOREMB</html:i>:
<html:pre>max_log_file = <html:i>STOREMB</html:i></html:pre>
Set the value to <html:code>6</html:code> (MB) or higher for general-purpose systems.
Larger values, of course,
support retention of even more audit data.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The total storage for audit log files must be large enough to retain
log information over the period required. This is a function of the maximum
log file size and the number of logs retained.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_max_log_file" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_max_log_file="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^max_log_file $AUDITCONFIG && \
sed -i 's/^max_log_file.*/max_log_file = '"$var_auditd_max_log_file"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "max_log_file = $var_auditd_max_log_file" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_max_log_file:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_max_log_file:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_max_log_file_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd max_log_file_action Upon Reaching Maximum Log Size</ns10:title>
<ns10:description xml:lang="en-US"> The default action to take when the logs reach their maximum size
is to rotate the log files, discarding the oldest one. To configure the action taken
by <html:code>auditd</html:code>, add or correct the line in <html:code>/etc/audit/auditd.conf</html:code>:
<html:pre>max_log_file_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i>ACTION</html:i> are described in the <html:code>auditd.conf</html:code> man
page. These include:
<html:ul><html:li><html:code>ignore</html:code></html:li><html:li><html:code>syslog</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>rotate</html:code></html:li><html:li><html:code>keep_logs</html:code></html:li></html:ul>
Set the <html:code><html:i>ACTION</html:i></html:code> to <html:code>rotate</html:code> to ensure log rotation
occurs. This is the default. The setting is case-insensitive.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-11</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Automatically rotating logs (by setting this to <html:code>rotate</html:code>)
minimizes the chances of the system unexpectedly running out of disk space by
being overwhelmed with log data. However, for systems that must never discard
log data, or which use external processes to transfer it and reclaim space,
<html:code>keep_logs</html:code> can be employed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_max_log_file_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_max_log_file_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^max_log_file_action $AUDITCONFIG && \
sed -i 's/^max_log_file_action.*/max_log_file_action = '"$var_auditd_max_log_file_action"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "max_log_file_action = $var_auditd_max_log_file_action" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_max_log_file_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_max_log_file_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_max_log_file_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_max_log_file_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd space_left Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to take an action
when disk space <html:i>starts</html:i> to run low.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Modify the following line,
substituting <html:i>ACTION</html:i> appropriately:
<html:pre>space_left_action = <html:i>ACTION</html:i></html:pre>
Possible values for <html:i>ACTION</html:i> are described in the <html:code>auditd.conf</html:code> man page.
These include:
<html:ul><html:li><html:code>ignore</html:code></html:li><html:li><html:code>syslog</html:code></html:li><html:li><html:code>email</html:code></html:li><html:li><html:code>exec</html:code></html:li><html:li><html:code>suspend</html:code></html:li><html:li><html:code>single</html:code></html:li><html:li><html:code>halt</html:code></html:li></html:ul>
Set this to <html:code>email</html:code> (instead of the default,
which is <html:code>suspend</html:code>) as it is more likely to get prompt attention. Acceptable values
also include <html:code>suspend</html:code>, <html:code>single</html:code>, and <html:code>halt</html:code>.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">143</ns10:reference>
<ns10:rationale xml:lang="en-US">Notifying administrators of an impending disk space problem may
allow them to take corrective action prior to any disruption.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_space_left_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_space_left_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" use="legacy" />"
#
# If space_left_action present in /etc/audit/auditd.conf, change value
# to var_auditd_space_left_action, else
# add "space_left_action = $var_auditd_space_left_action" to /etc/audit/auditd.conf
#
if grep --silent ^space_left_action /etc/audit/auditd.conf ; then
sed -i 's/^space_left_action.*/space_left_action = '"$var_auditd_space_left_action"'/g' /etc/audit/auditd.conf
else
echo -e "\n# Set space_left_action to $var_auditd_space_left_action per security requirements" >> /etc/audit/auditd.conf
echo "space_left_action = $var_auditd_space_left_action" >> /etc/audit/auditd.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_space_left_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_space_left_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_space_left_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd admin_space_left Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to take an action
when disk space is running low but prior to running out of space completely.
Edit the file <html:code>/etc/audit/auditd.conf</html:code>. Add or modify the following line,
substituting <html:i>ACTION</html:i> appropriately:
<html:pre>admin_space_left_action = <html:i>ACTION</html:i></html:pre>
Set this value to <html:code>single</html:code> to cause the system to switch to single-user
mode for corrective action. Acceptable values also include <html:code>suspend</html:code> and
<html:code>halt</html:code>. For certain systems, the need for availability
outweighs the need to log all actions, and a different setting should be
determined. Details regarding all possible values for <html:i>ACTION</html:i> are described in the
<html:code>auditd.conf</html:code> man page.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1343</ns10:reference>
<ns10:rationale xml:lang="en-US">Administrators should be made aware of an inability to record
audit records. If a separate partition or logical volume of adequate size
is used, running low on space for audit records should never occur.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_admin_space_left_action" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_admin_space_left_action="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" use="legacy" />"
grep -q ^admin_space_left_action /etc/audit/auditd.conf && \
sed -i "s/admin_space_left_action.*/admin_space_left_action = $var_auditd_admin_space_left_action/g" /etc/audit/auditd.conf
if ! [ $? -eq 0 ]; then
echo "admin_space_left_action = $var_auditd_admin_space_left_action" >> /etc/audit/auditd.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_admin_space_left_action:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_admin_space_left_action" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_admin_space_left_action:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_admin_space_left_action_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_action_mail_acct" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure auditd mail_acct Action on Low Disk Space</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to send email to
a designated account in certain situations. Add or correct the following line
in <html:code>/etc/audit/auditd.conf</html:code> to ensure that administrators are notified
via email for those situations:
<html:pre>action_mail_acct = <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-5(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">139</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">144</ns10:reference>
<ns10:rationale xml:lang="en-US">Email sent to the root account is typically aliased to the
administrators of the system, who can take appropriate action.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_action_mail_acct" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_action_mail_acct="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
grep -q ^action_mail_acct $AUDITCONFIG && \
sed -i 's/^action_mail_acct.*/action_mail_acct = '"$var_auditd_action_mail_acct"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "action_mail_acct = $var_auditd_action_mail_acct" >> $AUDITCONFIG
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_action_mail_acct:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_action_mail_acct" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_action_mail_acct:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_action_mail_acct_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_data_retention_flush" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure auditd flush priority</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>auditd</html:code> service can be configured to
synchronously write audit event data to disk. Add or correct the following
line in <html:code>/etc/audit/auditd.conf</html:code> to ensure that audit event data is
fully synchronized with the log files on the disk:
<html:pre>flush = <ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_flush" use="legacy" /></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1576</ns10:reference>
<ns10:rationale xml:lang="en-US">Audit data should be synchronously written to disk to ensure
log integrity. These parameters assure that all audit event data is fully
synchronized with the log files on the disk.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_data_retention_flush" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
var_auditd_flush="<ns10:sub idref="xccdf_org.ssgproject.content_value_var_auditd_flush" use="legacy" />"
AUDITCONFIG=/etc/audit/auditd.conf
# if flush is present, flush param edited to var_auditd_flush
# else flush param is defined by var_auditd_flush
#
# the freq param is only used value 'incremental' and will be
# commented out if flush != incremental
#
# if flush == incremental && freq param is not defined, it
# will be defined as the package-default value of 20
grep -q ^flush $AUDITCONFIG && \
sed -i 's/^flush.*/flush = '"$var_auditd_flush"'/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "flush = $var_auditd_flush" >> $AUDITCONFIG
fi
if ! [ "$var_auditd_flush" == "incremental" ]; then
sed -i 's/^freq/##freq/g' $AUDITCONFIG
elif [ "$var_auditd_flush" == "incremental" ]; then
grep -q freq $AUDITCONFIG && \
sed -i 's/^#\+freq/freq/g' $AUDITCONFIG
if ! [ $? -eq 0 ]; then
echo "freq = 20" >> $AUDITCONFIG
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-var_auditd_flush:var:1" value-id="xccdf_org.ssgproject.content_value_var_auditd_flush" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_data_retention_flush:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_data_retention_flush_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_auditd_audispd_syslog_plugin_activated" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure auditd to use audispd's syslog plugin</ns10:title>
<ns10:description xml:lang="en-US">To configure the <html:code>auditd</html:code> service to use the
<html:code>syslog</html:code> plug-in of the <html:code>audispd</html:code> audit event multiplexor, set
the <html:code>active</html:code> line in <html:code>/etc/audisp/plugins.d/syslog.conf</html:code> to
<html:code>yes</html:code>. Restart the <html:code>auditd</html:code> service:
<html:pre>$ sudo service auditd restart</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-3(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">136</ns10:reference>
<ns10:rationale xml:lang="en-US">The auditd service does not include the ability to send audit
records to a centralized server for management directly. It does, however,
include a plug-in for audit event multiplexor (audispd) to pass audit records
to the local syslog server</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="auditd_audispd_syslog_plugin_activated" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
grep -q ^active /etc/audisp/plugins.d/syslog.conf && \
sed -i "s/active.*/active = yes/g" /etc/audisp/plugins.d/syslog.conf
if ! [ $? -eq 0 ]; then
echo "active = yes" >> /etc/audisp/plugins.d/syslog.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-auditd_audispd_syslog_plugin_activated:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-auditd_audispd_syslog_plugin_activated_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record attempts to alter time through adjtimex</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S adjtimex -k audit_time_rules</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b64 -S adjtimex -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_adjtimex" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_adjtimex:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_adjtimex_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record attempts to alter time through settimeofday</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S settimeofday -k audit_time_rules</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># audit_time_rules
-a always,exit -F arch=b64 -S settimeofday -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_settimeofday" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_settimeofday:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_settimeofday_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_stime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Time Through stime</ns10:title>
<ns10:description xml:lang="en-US">Add the following line to <html:code>/etc/audit/audit.rules</html:code> for both
32-bit and 64-bit systems:
<html:pre># audit_time_rules
-a always,exit -F arch=b32 -S stime -k audit_time_rules</html:pre>
Since the 64-bit version of the "stime" system call is not defined in the audit
lookup table, the corresponding "-F arch=b64" form of this rule is not expected
to be defined on 64-bit systems (the aforementioned "-F arch=b32" stime rule
form itself is sufficient for both 32-bit and 64-bit systems). The -k option
allows for the specification of a key in string form that can be used for
better reporting capability through ausearch and aureport. Multiple system
calls can be defined on the same line to save space if desired, but is not
required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_stime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_rhel6_perform_audit_adjtimex_settimeofday_stime_remediation" use="legacy" />
rhel6_perform_audit_adjtimex_settimeofday_stime_remediation
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_stime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_stime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Time Through clock_settime</ns10:title>
<ns10:description xml:lang="en-US">On a 32-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># time-change
-a always,exit -F arch=b32 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
On a 64-bit system, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre># time-change
-a always,exit -F arch=b64 -S clock_settime -F a0=0x0 -F key=time-change</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport.
Multiple system calls can be defined on the same line to save space if
desired, but is not required. See an example of multiple combined syscalls:
<html:pre>-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k audit_time_rules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_clock_settime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ "$(getconf LONG_BIT)" = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S clock_settime -F a0=.* \(-F key=\|-k \).*"
GROUP="clock_settime"
FULL_RULE="-a always,exit -F arch=$ARCH -S clock_settime -F a0=0x0 -k time-change"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_clock_settime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_clock_settime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_time_watch_localtime" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter the localtime File</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/localtime -p wa -k audit_time_rules</html:pre>
The -k option allows for the specification of a key in string form that can
be used for better reporting capability through ausearch and aureport and
should always be used.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1487</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">169</ns10:reference>
<ns10:rationale xml:lang="en-US">Arbitrary changes to the system time can be used to obfuscate
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_time_watch_localtime" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/localtime" "wa" "audit_time_rules"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_time_watch_localtime:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_time_watch_localtime_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_usergroup_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify User/Group Information</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>, in order
to capture events that modify account changes:
<html:pre># audit_rules_usergroup_modification
-w /etc/group -p wa -k audit_rules_usergroup_modification
-w /etc/passwd -p wa -k audit_rules_usergroup_modification
-w /etc/gshadow -p wa -k audit_rules_usergroup_modification
-w /etc/shadow -p wa -k audit_rules_usergroup_modification
-w /etc/security/opasswd -p wa -k audit_rules_usergroup_modification</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(4)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">18</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1403</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1404</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1405</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1684</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1683</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1685</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1686</ns10:reference>
<ns10:rationale xml:lang="en-US">In addition to auditing new user and group accounts, these watches
will alert the system administrator(s) to any modifications. Any
unexpected users, groups, or modifications should be investigated for
legitimacy.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_usergroup_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/group" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "auditctl" "/etc/passwd" "wa" "audit_rules_usergroup_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/gshadow" "wa" "audit_rules_usergroup_modification"
fix_audit_watch_rule "auditctl" "/etc/shadow" "wa" "audit_rules_usergroup_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/security/opasswd" "wa" "audit_rules_usergroup_modification"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_usergroup_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_usergroup_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_networkconfig_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Network Environment</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>, setting
ARCH to either b32 or b64 as appropriate for your system:
<html:pre># audit_rules_networkconfig_modification
-a always,exit -F arch=ARCH -S sethostname -S setdomainname -k audit_rules_networkconfig_modification
-w /etc/issue -p wa -k audit_rules_networkconfig_modification
-w /etc/issue.net -p wa -k audit_rules_networkconfig_modification
-w /etc/hosts -p wa -k audit_rules_networkconfig_modification
-w /etc/sysconfig/network -p wa -k audit_rules_networkconfig_modification</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The network environment should not be modified by anything other
than administrator action. Any change to network parameters should be
audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_networkconfig_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -k *"
# Use escaped BRE regex to specify rule group
GROUP="set\(host\|domain\)name"
FULL_RULE="-a always,exit -F arch=$ARCH -S sethostname -S setdomainname -k audit_rules_networkconfig_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
# Then perform the remediations for the watch rules
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/issue" "wa" "audit_rules_networkconfig_modification"
fix_audit_watch_rule "auditctl" "/etc/issue.net" "wa" "audit_rules_networkconfig_modification"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/hosts" "wa" "audit_rules_networkconfig_modification"
fix_audit_watch_rule "auditctl" "/etc/sysconfig/network" "wa" "audit_rules_networkconfig_modification"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_networkconfig_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_networkconfig_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">System Audit Logs Must Have Mode 0640 or Less Permissive</ns10:title>
<ns10:description xml:lang="en-US">
If <html:code>log_group</html:code> in <html:code>/etc/audit/auditd.conf</html:code> is set to a group other than the <html:code>root</html:code>
group account, change the mode of the audit log files with the following command:
<html:pre>$ sudo chmod 0640 <html:i>audit_file</html:i></html:pre>
<html:br />
Otherwise, change the mode of the audit log files with the following command:
<html:pre>$ sudo chmod 0600 <html:i>audit_file</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">166</ns10:reference>
<ns10:rationale xml:lang="en-US">
If users can write to audit logs, audit trails can be modified or destroyed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_permissions_var_log_audit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
if `grep -q ^log_group /etc/audit/auditd.conf` ; then
GROUP=$(awk -F "=" '/log_group/ {print $2}' /etc/audit/auditd.conf | tr -d ' ')
if ! [ "${GROUP}" == 'root' ] ; then
chmod 0640 /var/log/audit/audit.log
chmod 0440 /var/log/audit/audit.log.*
else
chmod 0600 /var/log/audit/audit.log
chmod 0400 /var/log/audit/audit.log.*
fi
chmod 0640 /etc/audit/audit*
chmod 0640 /etc/audit/rules.d/*
else
chmod 0600 /var/log/audit/audit.log
chmod 0400 /var/log/audit/audit.log.*
chmod 0640 /etc/audit/audit*
chmod 0640 /etc/audit/rules.d/*
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_permissions_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_ownership_var_log_audit" selected="false" severity="low">
<ns10:title xml:lang="en-US">System Audit Logs Must Be Owned By Root</ns10:title>
<ns10:description xml:lang="en-US">
To properly set the owner of <html:code>/var/log</html:code>, run the command:
<html:pre xml:space="preserve">$ sudo chown root /var/log </html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-9</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">166</ns10:reference>
<ns10:rationale xml:lang="en-US">Failure to give ownership of the audit log files to root allows the designated
owner, and unauthorized users, potential access to sensitive information.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="file_ownership_var_log_audit" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
if `grep -q ^log_group /etc/audit/auditd.conf` ; then
GROUP=$(awk -F "=" '/log_group/ {print $2}' /etc/audit/auditd.conf | tr -d ' ')
if ! [ "${GROUP}" == 'root' ] ; then
chown root.${GROUP} /var/log/audit
chown root.${GROUP} /var/log/audit/audit.log*
else
chown root.root /var/log/audit
chown root.root /var/log/audit/audit.log*
fi
else
chown root.root /var/log/audit
chown root.root /var/log/audit/audit.log*
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_ownership_var_log_audit:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-file_ownership_var_log_audit_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_mac_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Mandatory Access Controls</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/selinux/ -p wa -k MAC-policy</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">The system's mandatory access policy (SELinux) should not be
arbitrarily changed by anything other than administrator action. All changes to
MAC policy should be audited.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_mac_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/selinux/" "wa" "MAC-policy"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_mac_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_mac_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chmod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chmod</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S chmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_chmod" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_chmod:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_chmod_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_chown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - chown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S chown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S chown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_chown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_chown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_chown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmod</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchmod -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchmod" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchmod:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchmod_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchmodat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchmodat</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchmodat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chmod"
FULL_RULE="-a always,exit -F arch=$ARCH -S chmod -S fchmod -S fchmodat -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchmodat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchmodat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fchownat" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fchownat</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fchownat -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fchownat" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fchownat:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fchownat_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fremovexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fremovexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fremovexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fremovexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fremovexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_fsetxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - fsetxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_fsetxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_fsetxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_fsetxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lchown" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lchown</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lchown" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="chown"
FULL_RULE="-a always,exit -F arch=$ARCH -S chown -S fchown -S fchownat -S lchown -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lchown:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lchown_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lremovexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lremovexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lremovexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lremovexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lremovexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_lsetxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - lsetxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_lsetxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_lsetxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_lsetxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_removexattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - removexattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S removexattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_removexattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_removexattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_removexattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_dac_modification_setxattr" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Events that Modify the System's Discretionary Access Controls - setxattr</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
permission changes for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
If the system is 64 bit then also add the following:
<html:pre>-a always,exit -F arch=b64 -S setxattr -F auid>=500 -F auid!=4294967295 -k perm_mod</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">Note that these rules can be configured in a
number of ways while still achieving the desired effect. Here the system calls
have been placed independent of other system calls. Grouping these system
calls with others as identifying earlier in this guide is more efficient.
</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The changing of file permissions could indicate that a user is attempting to
gain access to information that would otherwise be disallowed. Auditing DAC modifications
can facilitate the identification of patterns of abuse among both authorized and
unauthorized users.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_dac_modification_setxattr" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="xattr"
FULL_RULE="-a always,exit -F arch=${ARCH} -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perm_mod"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_dac_modification_setxattr:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_dac_modification_setxattr_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_login_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Login and Logout Events</ns10:title>
<ns10:description xml:lang="en-US">
The audit system already collects login info for all users and root. To watch for attempted manual edits of
files involved in storing login events, add the following to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /var/log/tallylog -p wa -k logins
-w /var/run/faillock/ -p wa -k logins
-w /var/log/lastlog -p wa -k logins</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_login_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/tallylog" "wa" "logins"
fix_audit_watch_rule "auditctl" "/var/run/faillock/" "wa" "logins"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/lastlog" "wa" "logins"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_login_events:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_session_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Record Attempts to Alter Process and Session Initiation Information</ns10:title>
<ns10:description xml:lang="en-US"> The audit system already collects process information for all
users and root. To watch for attempted manual edits of files involved in
storing such process information, add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /var/run/utmp -p wa -k session
-w /var/log/btmp -p wa -k session
-w /var/log/wtmp -p wa -k session</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_session_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/run/utmp" "wa" "session"
fix_audit_watch_rule "auditctl" "/var/log/btmp" "wa" "session"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/var/log/wtmp" "wa" "session"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_session_events:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect
unauthorized file accesses for all users and root. Add the following
to <html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access
-a always,exit -F arch=b32 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access</html:pre>
If the system is 64 bit then also add the following:
<html:pre>
-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access
-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
these events could serve as evidence of potential system compromise.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_unsuccessful_file_modification" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
# First fix the -EACCES requirement
PATTERN="-a always,exit -F arch=$ARCH -S .* -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k *"
# Use escaped BRE regex to specify rule group
GROUP="\(creat\|open\|truncate\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=500 -F auid!=4294967295 -k access"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
# Then fix the -EPERM requirement
PATTERN="-a always,exit -F arch=$ARCH -S .* -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k *"
# No need to change content of $GROUP variable - it's the same as for -EACCES case above
FULL_RULE="-a always,exit -F arch=$ARCH -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=500 -F auid!=4294967295 -k access"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_unsuccessful_file_modification:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_unsuccessful_file_modification_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on the Use of Privileged Commands</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect the
execution of privileged commands for all users and root.
To find the relevant setuid / setgid programs, run the following command
for each local partition <html:i>PART</html:i>:
<html:pre>$ sudo find <html:i>PART</html:i> -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null</html:pre>
Then, for each setuid / setgid program on the system, add a line of the
following form to <html:code>/etc/audit/audit.rules</html:code>, where
<html:i>SETUID_PROG_PATH</html:i> is the full path to each setuid / setgid program
in the list:
<html:pre>-a always,exit -F path=<html:i>SETUID_PROG_PATH</html:i> -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10))</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(9)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">40</ns10:reference>
<ns10:rationale xml:lang="en-US">Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_privileged_commands" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_perform_audit_rules_privileged_commands_remediation" use="legacy" />
perform_audit_rules_privileged_commands_remediation "auditctl" "500"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_privileged_commands:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_privileged_commands_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_media_export" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on Exporting to Media (successful)</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect media
exportation events for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre>-a always,exit -F arch=ARCH -S mount -F auid>=500 -F auid!=4294967295 -k export</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The unauthorized exportation of data to external media could result in an information leak
where classified information, Privacy Act information, and intellectual property could be lost. An audit
trail should be created each time a filesystem is mounted to help identify and guard against information
loss.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_media_export" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k *"
GROUP="mount"
FULL_RULE="-a always,exit -F arch=$ARCH -S mount -F auid>=500 -F auid!=4294967295 -k export"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_media_export:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_media_export_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_file_deletion_events" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects File Deletion Events by User</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect file
deletion events for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>, setting ARCH to either b32 or b64 as
appropriate for your system:
<html:pre>-a always,exit -F arch=ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">Auditing file deletions will create an audit trail for files that are removed
from the system. The audit trail could aid in system troubleshooting, as well as, detecting
malicious processes that attempt to delete log files to conceal their presence.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_file_deletion_events" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation for the syscall rule
# Retrieve hardware architecture of the underlying system
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b32" "b64")
for ARCH in ${RULE_ARCHS[@]}
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -F auid>=500 -F auid!=4294967295 -k delete"
# Use escaped BRE regex to specify rule group
GROUP="\(rmdir\|unlink\|rename\)"
FULL_RULE="-a always,exit -F arch=$ARCH -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=500 -F auid!=4294967295 -k delete"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_file_deletion_events:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_file_deletion_events_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_sysadmin_actions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects System Administrator Actions</ns10:title>
<ns10:description xml:lang="en-US">At a minimum the audit system should collect
administrator actions for all users and root. Add the following to
<html:code>/etc/audit/audit.rules</html:code>:
<html:pre>-w /etc/sudoers -p wa -k actions</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(7)(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The actions taken by system administrators should be audited to keep a record
of what was executed on the system, as well as, for accountability purposes.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_sysadmin_actions" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# Perform the remediation
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/etc/sudoers" "wa" "actions"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_sysadmin_actions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_sysadmin_actions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading" selected="false" severity="low">
<ns10:title xml:lang="en-US">Ensure auditd Collects Information on Kernel Module Loading and Unloading</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code> in order
to capture kernel module loading and unloading events, setting ARCH to either b32 or b64 as appropriate for your system:
<html:pre>-w /sbin/insmod -p x -k modules
-w /sbin/rmmod -p x -k modules
-w /sbin/modprobe -p x -k modules
-a always,exit -F arch=<html:i>ARCH</html:i> -S init_module -S delete_module -k modules</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">126</ns10:reference>
<ns10:rationale xml:lang="en-US">The addition/removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_kernel_module_loading" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
# First perform the remediation of the syscall rule
# Retrieve hardware architecture of the underlying system
# Note: 32-bit kernel modules can't be loaded / unloaded on 64-bit kernel =>
# it's not required on a 64-bit system to check also for the presence
# of 32-bit's equivalent of the corresponding rule. Therefore for
# each system it's enought to check presence of system's native rule form.
[ $(getconf LONG_BIT) = "32" ] && RULE_ARCHS=("b32") || RULE_ARCHS=("b64")
for ARCH in "${RULE_ARCHS[@]}"
do
PATTERN="-a always,exit -F arch=$ARCH -S .* -k *"
# Use escaped BRE regex to specify rule group
GROUP="\(init\|delete\)_module"
FULL_RULE="-a always,exit -F arch=$ARCH -S init_module -S delete_module -k modules"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_syscall_rule" use="legacy" />
fix_audit_syscall_rule "auditctl" "$PATTERN" "$GROUP" "$ARCH" "$FULL_RULE"
done
# Then perform the remediations for the watch rules
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/sbin/insmod" "x" "modules"
fix_audit_watch_rule "auditctl" "/sbin/rmmod" "x" "modules"
<ns10:sub idref="xccdf_org.ssgproject.content_value_function_fix_audit_watch_rule" use="legacy" />
fix_audit_watch_rule "auditctl" "/sbin/modprobe" "x" "modules"
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_kernel_module_loading:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-audit_rules_kernel_module_loading_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_audit_rules_immutable" selected="false" severity="low">
<ns10:title xml:lang="en-US">Make the auditd Configuration Immutable</ns10:title>
<ns10:description xml:lang="en-US">Add the following to <html:code>/etc/audit/audit.rules</html:code> in order
to make the configuration immutable:
<html:pre>-e 2</html:pre>
With this setting, a reboot will be required to change any
audit rules.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-1(b)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(a)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-2(d)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IR-5</ns10:reference>
<ns10:rationale xml:lang="en-US">Making the audit configuration immutable prevents accidental as
well as malicious modification of the audit rules, although it may be
problematic if legitimate changes are needed during system
operation</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="audit_rules_immutable" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
readonly AUDIT_RULES='/etc/audit/audit.rules'
# If '-e .*' setting present in audit.rules already, delete it since the
# auditctl(8) manual page instructs it should be the last rule in configuration
sed -i '/-e[[:space:]]\+.*/d' $AUDIT_RULES
# Append '-e 2' requirement at the end of audit.rules
echo '' >> $AUDIT_RULES
echo '# Set the audit.rules configuration immutable per security requirements' >> $AUDIT_RULES
echo '# Reboot is required to change audit rules once this setting is applied' >> $AUDIT_RULES
echo '-e 2' >> $AUDIT_RULES
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-audit_rules_immutable:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_xinetd_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable xinetd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>xinetd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig xinetd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
The xinetd service provides a dedicated listener service for some programs,
which is no longer necessary for commonly-used network services. Disabling
it ensures that these uncommon services are not running, and also prevents
attacks against xinetd itself.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_xinetd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_xinetd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service xinetd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- xinetd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_xinetd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_xinetd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_xinetd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall xinetd Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>xinetd</html:code> package can be uninstalled with the following command:
<html:pre>$ sudo yum erase xinetd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>xinetd</html:code> package decreases the risk of the
xinetd service's accidental (or intentional) activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure xinetd is removed
package:
name="{{item}}"
state=absent
with_items:
- xinetd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_xinetd
class remove_xinetd {
package { 'xinetd':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_xinetd_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=xinetd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_xinetd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_xinetd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_telnetd_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable telnet Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>telnet</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig telnet off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">197</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">877</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">888</ns10:reference>
<ns10:rationale xml:lang="en-US">
The telnet protocol uses unencrypted network communication, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network. The telnet protocol is also
subject to man-in-the-middle attacks.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_telnetd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_telnetd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_telnet-server_removed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Uninstall telnet-server Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>telnet-server</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase telnet-server</html:pre></ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>telnet-server</html:code> package decreases the risk of the
telnet service's accidental (or intentional) activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove telnet-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure telnet-server is removed
package:
name="{{item}}"
state=absent
with_items:
- telnet-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_telnet-server
class remove_telnet-server {
package { 'telnet-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=telnet-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_telnet-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_telnet-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_telnet_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove telnet Clients</ns10:title>
<ns10:description xml:lang="en-US">The telnet client allows users to start connections to other
systems via the telnet protocol.</ns10:description>
<ns10:rationale xml:lang="en-US">The <html:code>telnet</html:code> protocol is insecure and unencrypted. The use
of an unencrypted transmission medium could allow an unauthorized user
to steal credentials. The <html:code>ssh</html:code> package provides an
encrypted session and stronger security and is included in Red Hat
Enterprise Linux.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove telnet
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure telnet is removed
package:
name="{{item}}"
state=absent
with_items:
- telnet
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_telnet
class remove_telnet {
package { 'telnet':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_telnet_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=telnet
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_telnet_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_telnet_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsh-server_removed" selected="false" severity="high">
<ns10:title xml:lang="en-US">Uninstall rsh-server Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh-server</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase rsh-server</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rsh-server</html:code> package provides several obsolete and insecure
network services. Removing it
decreases the risk of those services' accidental (or intentional)
activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove rsh-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsh-server is removed
package:
name="{{item}}"
state=absent
with_items:
- rsh-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_rsh-server
class remove_rsh-server {
package { 'rsh-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=rsh-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsh-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsh-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rexec_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rexec Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rexec</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rexec</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rexec off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rexec service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rexec_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rexec_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rsh_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rsh Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rsh</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rsh off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rsh service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rsh_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rsh_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_rsh_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstal rsh Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rsh</html:code> package contains the client commands
for the rsh services</ns10:description>
<ns10:rationale xml:lang="en-US">These legacy clients contain numerous security exposures and have
been replaced with the more secure SSH package. Even if the server is removed,
it is best to ensure the clients are also removed to prevent users from
inadvertently attempting to use these commands and therefore exposing
their credentials. Note that removing the <html:code>rsh</html:code> package removes
the clients for <html:code>rsh</html:code>,<html:code>rcp</html:code>, and <html:code>rlogin</html:code>.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove rsh
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure rsh is removed
package:
name="{{item}}"
state=absent
with_items:
- rsh
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_rsh
class remove_rsh {
package { 'rsh':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_rsh_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=rsh
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_rsh_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_rsh_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rlogin_disabled" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable rlogin Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rlogin</html:code> service, which is available with
the <html:code>rsh-server</html:code> package and runs as a service through xinetd,
should be disabled.
The <html:code>rlogin</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rlogin off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">The rlogin service uses unencrypted network communications, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rlogin_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rlogin_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_rsh_trust_files" selected="false" severity="high">
<ns10:title xml:lang="en-US">Remove Rsh Trust Files</ns10:title>
<ns10:description xml:lang="en-US">The files <html:code>/etc/hosts.equiv</html:code> and <html:code>~/.rhosts</html:code> (in
each user's home directory) list remote hosts and users that are trusted by the
local system when using the rshd daemon.
To remove these files, run the following command to delete them from any
location:
<html:pre>$ sudo rm /etc/hosts.equiv</html:pre>
<html:pre>$ rm ~/.rhosts</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">Trust files are convenient, but when
used in conjunction with the R-services, they can allow
unauthenticated access to a system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="no_rsh_trust_files" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">find -type f -name .rhosts -exec rm -f '{}' \;
rm /etc/hosts.equiv
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_rsh_trust_files:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_rsh_trust_files_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_ypserv_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall ypserv Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ypserv</html:code> package can be uninstalled with
the following command:
<html:pre>$ sudo yum erase ypserv</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">Removing the <html:code>ypserv</html:code> package decreases the risk of the
accidental (or intentional) activation of NIS or NIS+ services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove ypserv
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure ypserv is removed
package:
name="{{item}}"
state=absent
with_items:
- ypserv
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_ypserv
class remove_ypserv {
package { 'ypserv':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypserv_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=ypserv
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_ypserv_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_ypserv_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ypbind_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable ypbind Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ypbind</html:code> service, which allows the system to act as a client in
a NIS or NIS+ domain, should be disabled.
The <html:code>ypbind</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig ypbind off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling the <html:code>ypbind</html:code> service ensures the system is not acting
as a client in a NIS or NIS+ domain.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ypbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ypbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service ypbind
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- ypbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ypbind_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ypbind_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_ypbind_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove NIS Client</ns10:title>
<ns10:description xml:lang="en-US">The Network Information Service (NIS), formerly known as Yellow Pages,
is a client-server directory service protocol used to distribute system configuration
files. The NIS client (<html:code>ypbind</html:code>) was used to bind a machine to an NIS server
and receive the distributed configuration files.</ns10:description>
<ns10:rationale xml:lang="en-US">The NIS service is inherently an insecure system that has been vulnerable
to DOS attacks, buffer overflows and has poor authentication for querying NIS maps.
NIS generally has been replaced by such protocols as Lightweight Directory Access
Protocol (LDAP). It is recommended that the service be removed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure ypbind is removed
package:
name="{{item}}"
state=absent
with_items:
- ypbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_ypbind
class remove_ypbind {
package { 'ypbind':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_ypbind_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=ypbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_ypbind_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_ypbind_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_tftp_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable tftp Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>tftp</html:code> service should be disabled.
The <html:code>tftp</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig tftp off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Disabling the <html:code>tftp</html:code> service ensures the system is not acting
as a TFTP server, which does not provide encryption or authentication.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_tftp_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable tftp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_tftp_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service tftp
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- tftp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_tftp_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_tftp_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_tftp-server_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall tftp-server Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>tftp-server</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase tftp-server</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">305</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the <html:code>tftp-server</html:code> package decreases the risk of the
accidental (or intentional) activation of tftp services.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_tftp-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_tftp-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_tftp_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove tftp</ns10:title>
<ns10:description xml:lang="en-US">Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol,
typically used to automatically transfer configuration or boot files between machines.
TFTP does not support authentication and can be easily hacked. The package
<html:code>tftp</html:code> is a client program that allows for connections to a <html:code>tftp</html:code> server.
</ns10:description>
<ns10:rationale xml:lang="en-US">It is recommended that TFTP be remvoed, unless there is a specific need
for TFTP (such as a boot server). In that case, use extreme caution when configuring
the services.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_tftp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_tftp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure tftp Daemon Uses Secure Mode</ns10:title>
<ns10:description xml:lang="en-US">If running the <html:code>tftp</html:code> service is necessary, it should be configured
to change its root directory at startup. To do so, ensure
<html:code>/etc/xinetd.d/tftp</html:code> includes <html:code>-s</html:code> as a command line argument, as shown in
the following example (which is also the default):
<html:pre>server_args = -s /var/lib/tftpboot</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Using the <html:code>-s</html:code> option causes the TFTP service to only serve files from the
given directory. Serving files from an intentionally-specified directory
reduces the risk of sharing files which should remain private.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-tftpd_uses_secure_mode:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-tftpd_uses_secure_mode_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_talk-server_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall talk-server Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>talk-server</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase talk-server</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the <html:code>talk-server</html:code> package decreases the
risk of the accidental (or intentional) activation of talk services.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove talk-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure talk-server is removed
package:
name="{{item}}"
state=absent
with_items:
- talk-server
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_talk-server
class remove_talk-server {
package { 'talk-server':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk-server_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=talk-server
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_talk-server_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_talk-server_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_talk_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall talk Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>talk</html:code> package contains the client program for the
Internet talk protocol, which allows the user to chat with other users on
different systems. Talk is a communication program which copies lines from one
terminal to the terminal of another user.
</ns10:description>
<ns10:rationale xml:lang="en-US">
The talk software presents a security risk as it uses unencrypted protocols
for communications. Removing the <html:code>talk</html:code> package decreases the
risk of the accidental (or intentional) activation of talk client program.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove talk
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure talk is removed
package:
name="{{item}}"
state=absent
with_items:
- talk
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_talk
class remove_talk {
package { 'talk':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_talk_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=talk
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_talk_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_talk_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_abrtd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Automatic Bug Reporting Tool (abrtd)</ns10:title>
<ns10:description xml:lang="en-US">The Automatic Bug Reporting Tool (<html:code>abrtd</html:code>) daemon collects
and reports crash data when an application crash is detected. Using a variety
of plugins, abrtd can email crash reports to system administrators, log crash
reports to files, or forward crash reports to a centralized issue tracking
system such as RHTSupport.
The <html:code>abrtd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig abrtd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US"> Mishandling crash data could expose sensitive information about
vulnerabilities in software executing on the local machine, as well as sensitive
information from within a process's address space or registers.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_abrtd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable abrtd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_abrtd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service abrtd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- abrtd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_abrtd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_abrtd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_acpid_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Advanced Configuration and Power Interface (acpid)</ns10:title>
<ns10:description xml:lang="en-US">The Advanced Configuration and Power Interface Daemon (<html:code>acpid</html:code>)
dispatches ACPI events (such as power/reset button depressed) to userspace
programs.
The <html:code>acpid</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig acpid off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">ACPI support is highly desirable for systems in some network roles,
such as laptops or desktops. For other systems, such as servers, it may permit
accidental or trivially achievable denial of service situations and disabling
it is appropriate.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_acpid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable acpid
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_acpid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service acpid
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- acpid
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_acpid_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_acpid_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_certmonger_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Certmonger Service (certmonger)</ns10:title>
<ns10:description xml:lang="en-US">Certmonger is a D-Bus based service that attempts to simplify interaction
with certifying authorities on networks which use public-key infrastructure. It is often
combined with Red Hat's IPA (Identity Policy Audit) security information management
solution to aid in the management of certificates.
The <html:code>certmonger</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig certmonger off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The services provided by certmonger may be essential for systems
fulfilling some roles a PKI infrastructure, but its functionality is not necessary
for many other use cases.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_certmonger_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable certmonger
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_certmonger_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service certmonger
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- certmonger
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_certmonger_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_certmonger_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cgconfig_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Control Group Config (cgconfig)</ns10:title>
<ns10:description xml:lang="en-US">Control groups allow an administrator to allocate system resources (such as CPU,
memory, network bandwidth, etc) among a defined group (or groups) of processes executing on
a system. The <html:code>cgconfig</html:code> daemon starts at boot and establishes the predefined control groups.
The <html:code>cgconfig</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cgconfig off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless control groups are used to manage system resources, running the cgconfig
service is not necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cgconfig_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cgconfig
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cgconfig_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cgconfig
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cgconfig
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cgconfig_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cgconfig_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cgred_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Control Group Rules Engine (cgred)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cgred</html:code> service moves tasks into control groups according to
parameters set in the <html:code>/etc/cgrules.conf</html:code> configuration file.
The <html:code>cgred</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cgred off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless control groups are used to manage system resources, running the cgred service
service is not necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cgred_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cgred
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cgred_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cgred
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cgred
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cgred_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cgred_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cpuspeed_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable CPU Speed (cpuspeed)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cpuspeed</html:code> service can adjust the clock speed of supported CPUs based upon
the current processing load thereby conserving power and reducing heat.
The <html:code>cpuspeed</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cpuspeed off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>cpuspeed</html:code> service is only necessary if adjusting the CPU clock speed
provides benefit. Traditionally this has included laptops (to enhance battery life),
but may also apply to server or desktop environments where conserving power is
highly desirable or necessary.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cpuspeed_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cpuspeed
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cpuspeed_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cpuspeed
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cpuspeed
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cpuspeed_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cpuspeed_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_haldaemon_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Hardware Abstraction Layer Service (haldaemon)</ns10:title>
<ns10:description xml:lang="en-US">The Hardware Abstraction Layer Daemon (<html:code>haldaemon</html:code>) collects
and maintains information about the system's hardware configuration.
This service is required on a workstation
running a desktop environment, and may be necessary on any system which
deals with removable media or devices.
The <html:code>haldaemon</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig haldaemon off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The haldaemon provides essential functionality on systems
that use removable media or devices, but can be disabled for systems
that do not require these.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_haldaemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable haldaemon
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_haldaemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service haldaemon
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- haldaemon
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_haldaemon_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_haldaemon_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_irqbalance_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable IRQ Balance (irqbalance)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>irqbalance</html:code> service optimizes the balance between
power savings and performance through distribution of hardware interrupts across
multiple processors.
The <html:code>irqbalance</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 irqbalance on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">In an environment with multiple processors (now common), the irqbalance service
provides potential speedups for handling interrupt requests.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_irqbalance_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable irqbalance
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_irqbalance_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service irqbalance
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- irqbalance
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_irqbalance_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_irqbalance_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_kdump_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable KDump Kernel Crash Analyzer (kdump)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>kdump</html:code> service provides a kernel crash dump analyzer. It uses the <html:code>kexec</html:code>
system call to boot a secondary kernel ("capture" kernel) following a system
crash, which can load information from the crashed kernel for analysis.
The <html:code>kdump</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig kdump off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Unless the system is used for kernel development or testing, there
is little need to run the kdump service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_kdump_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable kdump
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_kdump_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service kdump
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- kdump
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_kdump_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_kdump_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_mdmonitor_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Software RAID Monitor (mdmonitor)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>mdmonitor</html:code> service is used for monitoring a software RAID array; hardware
RAID setups do not use this service.
The <html:code>mdmonitor</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig mdmonitor off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If software RAID monitoring is not required,
there is no need to run this service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_mdmonitor_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable mdmonitor
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_mdmonitor_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service mdmonitor
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- mdmonitor
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_mdmonitor_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_mdmonitor_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_messagebus_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable D-Bus IPC Service (messagebus)</ns10:title>
<ns10:description xml:lang="en-US">D-Bus provides an IPC mechanism used by
a growing list of programs, such as those used for Gnome, Bluetooth, and Avahi.
Due to these dependencies, disabling D-Bus may not be practical for
many systems.
The <html:code>messagebus</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig messagebus off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If no services which require D-Bus are needed, then it
can be disabled. As a broker for IPC between processes of different privilege levels,
it could be a target for attack. However, disabling D-Bus is likely to be
impractical for any system which needs to provide
a graphical login session.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_messagebus_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable messagebus
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_messagebus_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service messagebus
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- messagebus
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_messagebus_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_messagebus_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_netconsole_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network Console (netconsole)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>netconsole</html:code> service is responsible for loading the
netconsole kernel module, which logs kernel printk messages over UDP to a
syslog server. This allows debugging of problems where disk logging fails and
serial consoles are impractical.
The <html:code>netconsole</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig netconsole off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>netconsole</html:code> service is not necessary unless there is a need to debug
kernel panics, which is not common.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_netconsole_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable netconsole
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_netconsole_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service netconsole
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- netconsole
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_netconsole_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_netconsole_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ntpdate_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable ntpdate Service (ntpdate)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>ntpdate</html:code> service sets the local hardware clock by polling NTP servers
when the system boots. It synchronizes to the NTP servers listed in
<html:code>/etc/ntp/step-tickers</html:code> or <html:code>/etc/ntp.conf</html:code>
and then sets the local hardware clock to the newly synchronized
system time.
The <html:code>ntpdate</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig ntpdate off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>ntpdate</html:code> service may only be suitable for systems which
are rebooted frequently enough that clock drift does not cause problems between
reboots. In any event, the functionality of the ntpdate service is now
available in the ntpd program and should be considered deprecated.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ntpdate_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ntpdate_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_oddjobd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Odd Job Daemon (oddjobd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>oddjobd</html:code> service exists to provide an interface and
access control mechanism through which
specified privileged tasks can run tasks for unprivileged client
applications. Communication with <html:code>oddjobd</html:code> through the system message bus.
The <html:code>oddjobd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig oddjobd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>oddjobd</html:code> service may provide necessary functionality in
some environments, and can be disabled if it is not needed. Execution of
tasks by privileged programs, on behalf of unprivileged ones, has traditionally
been a source of privilege escalation security issues.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_oddjobd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable oddjobd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_oddjobd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service oddjobd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- oddjobd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_oddjobd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_oddjobd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_portreserve_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Portreserve (portreserve)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>portreserve</html:code> service is a TCP port reservation utility that can
be used to prevent portmap from binding to well known TCP ports that are
required for other services.
The <html:code>portreserve</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig portreserve off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>portreserve</html:code> service provides helpful functionality by
preventing conflicting usage of ports in the reserved port range, but it can be
disabled if not needed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_portreserve_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable portreserve
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_portreserve_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service portreserve
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- portreserve
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_portreserve_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_portreserve_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_psacct_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Process Accounting (psacct)</ns10:title>
<ns10:description xml:lang="en-US">The process accounting service, <html:code>psacct</html:code>, works with programs
including <html:code>acct</html:code> and <html:code>ac</html:code> to allow system administrators to view
user activity, such as commands issued by users of the system.
The <html:code>psacct</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 psacct on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>psacct</html:code> service can provide administrators a convenient
view into some user activities. However, it should be noted that the auditing
system and its audit records provide more authoritative and comprehensive
records.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_psacct_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable psacct
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_psacct_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service psacct
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- psacct
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_psacct_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_psacct_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_qpidd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Apache Qpid (qpidd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>qpidd</html:code> service provides high speed, secure,
guaranteed delivery services. It is an implementation of the Advanced Message
Queuing Protocol. By default the qpidd service will bind to port 5672 and
listen for connection attempts.
The <html:code>qpidd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig qpidd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">The qpidd service is automatically installed when the "base"
package selection is selected during installation. The qpidd service listens
for network connections, which increases the attack surface of the system. If
the system is not intended to receive AMQP traffic, then the <html:code>qpidd</html:code>
service is not needed and should be disabled or removed.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_qpidd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable qpidd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_qpidd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service qpidd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- qpidd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_qpidd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_qpidd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_quota_nld_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Quota Netlink (quota_nld)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>quota_nld</html:code> service provides notifications to
users of disk space quota violations. It listens to the kernel via a netlink
socket for disk quota violations and notifies the appropriate user of the
violation using D-Bus or by sending a message to the terminal that the user has
last accessed.
The <html:code>quota_nld</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig quota_nld off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">If disk quotas are enforced on the local system, then the
<html:code>quota_nld</html:code> service likely provides useful functionality and should
remain enabled. However, if disk quotas are not used or user notification of
disk quota violation is not desired then there is no need to run this
service.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_quota_nld_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable quota_nld
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_quota_nld_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service quota_nld
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- quota_nld
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_quota_nld_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_quota_nld_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rdisc_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network Router Discovery Daemon (rdisc)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>rdisc</html:code> service implements the client side of the ICMP
Internet Router Discovery Protocol (IRDP), which allows discovery of routers on
the local subnet. If a router is discovered then the local routing table is
updated with a corresponding default route. By default this daemon is disabled.
The <html:code>rdisc</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rdisc off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-4</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">General-purpose systems typically have their network and routing
information configured statically by a system administrator. Workstations or
some special-purpose systems often use DHCP (instead of IRDP) to retrieve
dynamic network configuration information.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rdisc_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rdisc
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rdisc_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rdisc
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rdisc
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rdisc_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rdisc_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rhnsd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Red Hat Network Service (rhnsd)</ns10:title>
<ns10:description xml:lang="en-US">The Red Hat Network service automatically queries Red Hat Network
servers to determine whether there are any actions that should be executed,
such as package updates. This only occurs if the system was registered to an
RHN server or satellite and managed as such.
The <html:code>rhnsd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rhnsd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">Although systems management and patching is extremely important to
system security, management by a system outside the enterprise enclave is not
desirable for some environments. However, if the system is being managed by RHN or
RHN Satellite Server the <html:code>rhnsd</html:code> daemon can remain on. </ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rhnsd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rhnsd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rhnsd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rhnsd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rhnsd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rhnsd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rhnsd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rhsmcertd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Red Hat Subscription Manager Daemon (rhsmcertd)</ns10:title>
<ns10:description xml:lang="en-US">The Red Hat Subscription Manager (rhsmcertd) periodically checks for
changes in the entitlement certificates for a registered system and updates it
accordingly.
The <html:code>rhsmcertd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rhsmcertd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>rhsmcertd</html:code> service can provide administrators with some
additional control over which of their systems are entitled to particular
subscriptions. However, for systems that are managed locally or which are not
expected to require remote changes to their subscription status, it is
unnecessary and can be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rhsmcertd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rhsmcertd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rhsmcertd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rhsmcertd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rhsmcertd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rhsmcertd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rhsmcertd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_saslauthd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Cyrus SASL Authentication Daemon (saslauthd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>saslauthd</html:code> service handles plaintext authentication requests on
behalf of the SASL library. The service isolates all code requiring superuser
privileges for SASL authentication into a single process, and can also be used
to provide proxy authentication services to clients that do not understand SASL
based authentication.
The <html:code>saslauthd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig saslauthd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>saslauthd</html:code> service provides essential functionality for
performing authentication in some directory environments, such as those which
use Kerberos and LDAP. For others, however, in which only local files may be
consulted, it is not necessary and should be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_saslauthd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable saslauthd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_saslauthd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service saslauthd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- saslauthd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_saslauthd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_saslauthd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_smartd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable SMART Disk Monitoring Service (smartd)</ns10:title>
<ns10:description xml:lang="en-US">SMART (Self-Monitoring, Analysis, and Reporting Technology) is a
feature of hard drives that allows them to detect symptoms of disk failure and
relay an appropriate warning.
The <html:code>smartd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig smartd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">SMART can help protect against denial of
service due to failing hardware. Nevertheless, if it is not needed or the
system's drives are not SMART-capable (such as solid state drives), it can be
disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_smartd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable smartd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_smartd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service smartd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- smartd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_smartd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_smartd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sysstat_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable System Statistics Reset Service (sysstat)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>sysstat</html:code> service resets various I/O and CPU
performance statistics to zero in order to begin counting from a fresh state
at boot time.
The <html:code>sysstat</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig sysstat off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">By default the <html:code>sysstat</html:code> service merely runs a program at
boot to reset the statistics, which can be retrieved using programs such as
<html:code>sar</html:code> and <html:code>sadc</html:code>. These may provide useful insight into system
operation, but unless used this service can be disabled.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_sysstat_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable sysstat
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_sysstat_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service sysstat
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- sysstat
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_sysstat_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_sysstat_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_crond_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable cron Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>crond</html:code> service is used to execute commands at
preconfigured times. It is required by almost all systems to perform necessary
maintenance tasks, such as notifying root of system activity.
The <html:code>crond</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 crond on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_crond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable crond
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_crond_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service crond
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- crond
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_crond_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_crond_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_anacron" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable anacron Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>cronie-anacron</html:code> package, which provides <html:code>anacron</html:code>
functionality, is installed by default.
The <html:code>cronie-anacron</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase cronie-anacron</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>anacron</html:code> service provides <html:code>cron</html:code> functionality for systems
such as laptops and workstations that may be shut down during the normal times
that <html:code>cron</html:code> jobs are scheduled to run. On systems which do not require this
additional functionality, <html:code>anacron</html:code> could needlessly increase the possible
attack surface for an intruder.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_anacron_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_atd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable At Service (atd)</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>at</html:code> and <html:code>batch</html:code> commands can be used to
schedule tasks that are meant to be executed only once. This allows delayed
execution in a manner similar to cron, except that it is not
recurring. The daemon <html:code>atd</html:code> keeps track of tasks scheduled via
<html:code>at</html:code> and <html:code>batch</html:code>, and executes them at the specified time.
The <html:code>atd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig atd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">381</ns10:reference>
<ns10:rationale xml:lang="en-US">
The <html:code>atd</html:code> service could be used by an unsophisticated insider to carry
out activities outside of a normal login session, which could complicate
accountability. Furthermore, the need to schedule tasks with <html:code>at</html:code> or
<html:code>batch</html:code> is not common.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_atd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable atd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_atd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service atd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- atd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_atd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_atd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sshd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable SSH Server If Possible (Unusual)</ns10:title>
<ns10:description xml:lang="en-US">The SSH server service, sshd, is commonly needed.
However, if it can be disabled, do so.
The <html:code>sshd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig sshd off</html:pre>
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_sshd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable sshd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_sshd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service sshd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- sshd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_sshd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_iptables_sshd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove SSH Server iptables Firewall exception (Unusual)</ns10:title>
<ns10:description xml:lang="en-US">By default, inbound connections to SSH's port are allowed. If
the SSH server is not being used, this exception should be removed from the
firewall configuration.
<html:br /><html:br />
Edit the files <html:code>/etc/sysconfig/iptables</html:code> and <html:code>/etc/sysconfig/ip6tables</html:code>
(if IPv6 is in use). In each file, locate and delete the line:
<html:pre>-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT</html:pre>
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.
</ns10:description>
<ns10:rationale xml:lang="en-US">
If inbound SSH connections are not expected, disallowing access to the SSH port will
avoid possible exploitation of the port by an attacker.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-iptables_sshd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_allow_only_protocol2" selected="false" severity="high">
<ns10:title xml:lang="en-US">Allow Only SSH Protocol 2</ns10:title>
<ns10:description xml:lang="en-US">Only SSH protocol version 2 connections should be
permitted. The default setting in
<html:code>/etc/ssh/sshd_config</html:code> is correct, and can be
verified by ensuring that the following
line appears:
<html:pre>Protocol 2</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3(10)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">774</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH protocol version 1 suffers from design flaws that
result in security vulnerabilities and
should not be used.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_allow_only_protocol2" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^Protocol' '2' 'CCE-27072-8' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_allow_only_protocol2:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_allow_only_protocol2_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_limit_user_access" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Users' SSH Access</ns10:title>
<ns10:description xml:lang="en-US">By default, the SSH configuration allows any user with an account
to access the system. In order to specify the users that are allowed to login
via SSH and deny all other users, add or correct the following line in the
<html:code>/etc/ssh/sshd_config</html:code> file:
<html:pre>DenyUsers USER1 USER2</html:pre>
Where <html:code>USER1</html:code> and <html:code>USER2</html:code> are valid user names.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx" />
<ns10:rationale xml:lang="en-US">
Specifying which accounts are allowed SSH access into the system reduces the
possibility of unauthorized access to the system.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set SSH Idle Timeout Interval</ns10:title>
<ns10:description xml:lang="en-US">SSH allows administrators to set an idle timeout
interval.
After this interval has passed, the idle user will be
automatically logged out.
<html:br /><html:br />
To set an idle timeout interval, edit the following line in <html:code>/etc/ssh/sshd_config</html:code> as
follows:
<html:pre>ClientAliveInterval <html:b><ns10:sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy" /></html:b></html:pre>
The timeout <html:b>interval</html:b> is given in seconds. To have a timeout
of 15 minutes, set <html:b>interval</html:b> to 900.
<html:br /><html:br />
If a shorter timeout has already been set for the login
shell, that value will preempt any SSH
setting made here. Keep in mind that some processes may stop SSH
from correctly detecting that the user is idle.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">879</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1133</ns10:reference>
<ns10:rationale xml:lang="en-US">
Causing idle users to be automatically logged out
guards against compromises one system leading trivially
to compromises on another.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_set_idle_timeout" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
sshd_idle_timeout_value="<ns10:sub idref="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" use="legacy" />"
grep -q ^ClientAliveInterval /etc/ssh/sshd_config && \
sed -i "s/ClientAliveInterval.*/ClientAliveInterval $sshd_idle_timeout_value/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "ClientAliveInterval $sshd_idle_timeout_value" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-export export-name="oval:ssg-sshd_idle_timeout_value:var:1" value-id="xccdf_org.ssgproject.content_value_sshd_idle_timeout_value" />
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_set_idle_timeout:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_set_idle_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_set_keepalive" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set SSH Client Alive Count</ns10:title>
<ns10:description xml:lang="en-US">To ensure the SSH idle timeout occurs precisely when the <html:code>ClientAliveCountMax</html:code> is set,
edit <html:code>/etc/ssh/sshd_config</html:code> as
follows:
<html:pre>ClientAliveCountMax 0</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-2(5)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SA-8</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">879</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1133</ns10:reference>
<ns10:rationale xml:lang="en-US">
This ensures a user login will be terminated as soon as the <html:code>ClientAliveCountMax</html:code>
is reached.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_set_keepalive" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^ClientAliveCountMax /etc/ssh/sshd_config && \
sed -i "s/ClientAliveCountMax.*/ClientAliveCountMax 0/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "ClientAliveCountMax 0" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_set_keepalive:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_set_keepalive_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_rhosts" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SSH Support for .rhosts Files</ns10:title>
<ns10:description xml:lang="en-US">SSH can emulate the behavior of the obsolete rsh
command in allowing users to enable insecure access to their
accounts via <html:code>.rhosts</html:code> files.
<html:br /><html:br />
To ensure this behavior is disabled, add or correct the
following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>IgnoreRhosts yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_rhosts" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^IgnoreRhosts' 'yes' 'CCE-27124-7' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_rhosts:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_rhosts_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_disable_host_auth" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Host-Based Authentication</ns10:title>
<ns10:description xml:lang="en-US">SSH's cryptographic host-based authentication is
more secure than <html:code>.rhosts</html:code> authentication. However, it is
not recommended that hosts unilaterally trust one another, even
within an organization.
<html:br /><html:br />
To disable host-based authentication, add or correct the
following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>HostbasedAuthentication no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH trust relationships mean a compromise on one host
can allow an attacker to move trivially to other hosts.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="disable_host_auth" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^HostbasedAuthentication /etc/ssh/sshd_config && \
sed -i "s/HostbasedAuthentication.*/HostbasedAuthentication no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "HostbasedAuthentication no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-disable_host_auth:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-disable_host_auth_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_root_login" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable SSH Root Login</ns10:title>
<ns10:description xml:lang="en-US">The root user should never be allowed to login to a
system directly over a network.
To disable root login via SSH, add or correct the following line
in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitRootLogin no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-6(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-2(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:rationale xml:lang="en-US">
Permitting direct root login reduces auditable information about who ran
privileged commands on the system
and also allows direct attack attempts on root's password.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_root_login" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">
SSHD_CONFIG='/etc/ssh/sshd_config'
# Obtain line number of first uncommented case-insensitive occurrence of Match
# block directive (possibly prefixed with whitespace) present in $SSHD_CONFIG
FIRST_MATCH_BLOCK=$(sed -n '/^[[:space:]]*Match[^\n]*/I{=;q}' $SSHD_CONFIG)
# Obtain line number of first uncommented case-insensitive occurence of
# PermitRootLogin directive (possibly prefixed with whitespace) present in
# $SSHD_CONFIG
FIRST_PERMIT_ROOT_LOGIN=$(sed -n '/^[[:space:]]*PermitRootLogin[^\n]*/I{=;q}' $SSHD_CONFIG)
# Case: Match block directive not present in $SSHD_CONFIG
if [ -z "$FIRST_MATCH_BLOCK" ]
then
# Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
then
# Append 'PermitRootLogin no' at the end of $SSHD_CONFIG
echo -e "\nPermitRootLogin no" >> $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG already
else
# Replace first uncommented case-insensitive occurrence
# of PermitRootLogin directive
sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG
fi
# Case: Match block directive present in $SSHD_CONFIG
else
# Case: PermitRootLogin directive not present in $SSHD_CONFIG yet
if [ -z "$FIRST_PERMIT_ROOT_LOGIN" ]
then
# Prepend 'PermitRootLogin no' before first uncommented
# case-insensitive occurrence of Match block directive
sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
# before first Match block directive
elif [ "$FIRST_PERMIT_ROOT_LOGIN" -lt "$FIRST_MATCH_BLOCK" ]
then
# Replace first uncommented case-insensitive occurrence
# of PermitRootLogin directive
sed -i "$FIRST_PERMIT_ROOT_LOGIN s/^[[:space:]]*PermitRootLogin.*$/PermitRootLogin no/I" $SSHD_CONFIG
# Case: PermitRootLogin directive present in $SSHD_CONFIG and placed
# after first Match block directive
else
# Prepend 'PermitRootLogin no' before first uncommented
# case-insensitive occurrence of Match block directive
sed -i "$FIRST_MATCH_BLOCK s/^\([[:space:]]*Match[^\n]*\)/PermitRootLogin no\n\1/I" $SSHD_CONFIG
fi
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_root_login:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_root_login_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_disable_empty_passwords" selected="false" severity="high">
<ns10:title xml:lang="en-US">Disable SSH Access via Empty Passwords</ns10:title>
<ns10:description xml:lang="en-US">To explicitly disallow remote login from accounts with
empty passwords, add or correct the following line in
<html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitEmptyPasswords no</html:pre>
Any accounts with empty passwords should be disabled immediately, and PAM configuration
should prevent users from being able to assign themselves empty passwords.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">765</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">766</ns10:reference>
<ns10:rationale xml:lang="en-US">
Configuring this setting for the SSH daemon provides additional assurance that
remote login via SSH will require a password,
even in the event of misconfiguration elsewhere.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_disable_empty_passwords" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^PermitEmptyPasswords /etc/ssh/sshd_config && \
sed -i "s/PermitEmptyPasswords.*/PermitEmptyPasswords no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "PermitEmptyPasswords no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_disable_empty_passwords:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_disable_empty_passwords_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_enable_warning_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable SSH Warning Banner</ns10:title>
<ns10:description xml:lang="en-US">
To enable the warning banner and ensure it is consistent
across the system, add or correct the following line in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>Banner /etc/issue</html:pre>
Another section contains information on how to create an
appropriate system-wide warning banner.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-8(a)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:rationale xml:lang="en-US">
The warning message reinforces policy awareness during the login process and
facilitates possible legal action against attackers. Alternatively, systems
whose ownership should not be obvious should ensure usage of a banner that does
not provide easy attribution.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_enable_warning_banner" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^Banner /etc/ssh/sshd_config && \
sed -i "s/Banner.*/Banner \/etc\/issue/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "Banner /etc/issue" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_enable_warning_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_enable_warning_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_do_not_permit_user_env" selected="false" severity="low">
<ns10:title xml:lang="en-US">Do Not Allow SSH Environment Options</ns10:title>
<ns10:description xml:lang="en-US">To ensure users are not able to present
environment options to the SSH daemon, add or correct the following line
in <html:code>/etc/ssh/sshd_config</html:code>:
<html:pre>PermitUserEnvironment no</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1414</ns10:reference>
<ns10:rationale xml:lang="en-US">
SSH environment options potentially allow users to bypass
access restriction in some configurations.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_do_not_permit_user_env" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^PermitUserEnvironment /etc/ssh/sshd_config && \
sed -i "s/PermitUserEnvironment.*/PermitUserEnvironment no/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "PermitUserEnvironment no" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_do_not_permit_user_env:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_do_not_permit_user_env_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Use Only Approved Ciphers</ns10:title>
<ns10:description xml:lang="en-US">Limit the ciphers to those algorithms which are FIPS-approved.
Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.
The following line in <html:code>/etc/ssh/sshd_config</html:code>
demonstrates use of FIPS-approved ciphers:
<html:pre>Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc</html:pre>
The man page <html:code>sshd_config(5)</html:code> contains a list of supported ciphers.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SI-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-5(1)(c)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1144</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1145</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1146</ns10:reference>
<ns10:rationale xml:lang="en-US">
Approved algorithms should impart some level of confidence in their
implementation. These are also required for compliance.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_use_approved_ciphers" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">grep -q ^Ciphers /etc/ssh/sshd_config && \
sed -i "s/Ciphers.*/Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc/g" /etc/ssh/sshd_config
if ! [ $? -eq 0 ]; then
echo "Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc" >> /etc/ssh/sshd_config
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_use_approved_ciphers:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_use_approved_ciphers_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sshd_use_approved_macs" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Only Approved MACs</ns10:title>
<ns10:description xml:lang="en-US">Limit the MACs to those hash algorithms which are FIPS-approved.
The following line in <html:code>/etc/ssh/sshd_config</html:code>
demonstrates use of FIPS-approved MACs:
<html:pre>MACs hmac-sha2-512,hmac-sha2-256,hmac-sha1</html:pre>
The man page <html:code>sshd_config(5)</html:code> contains a list of supported MACs.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-17(2)</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">IA-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">SC-13</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">68</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">803</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2449</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">2450</ns10:reference>
<ns10:rationale xml:lang="en-US">
Approved algorithms should impart some level of confidence in their
implementation. These are also required for compliance.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="sshd_use_approved_macs" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_replace_or_append" use="legacy" />
replace_or_append '/etc/ssh/sshd_config' '^MACs' 'hmac-sha2-512,hmac-sha2-256,hmac-sha1' '' '%s %s'
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sshd_use_approved_macs:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sshd_use_approved_macs_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_sssd_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the SSSD Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>sssd</html:code> package should be installed.
The <html:code>sssd</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install sssd</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_sssd_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_sssd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable the SSSD Service</ns10:title>
<ns10:description xml:lang="en-US">The SSSD service should be enabled.
The <html:code>sssd</html:code> service can be enabled with the following command:
<html:pre>$ sudo systemctl enable sssd.service</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_sssd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_memcache_timeout" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD's Memory Cache to Expire</ns10:title>
<ns10:description xml:lang="en-US">
SSSD's memory cache should be configured to set to expire records after 1 day.
To configure SSSD to expire memory cache, set <html:code>memcache_timeout</html:code> to
<html:code>86400</html:code> under the <html:code>[nss]</html:code> section in <html:code>/etc/sssd/sssd.conf</html:code>.
For example:
<html:pre>[nss]
memcache_timeout = 86400
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_memcache_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_offline_cred_expiration" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD to Expire Offline Credentials</ns10:title>
<ns10:description xml:lang="en-US">
SSSD should be configured to expire offline credentials after 1 day.
To configure SSSD to expire offline credentials, set
<html:code>offline_credentials_expiration</html:code> to <html:code>1</html:code> under the <html:code>[pam]</html:code>
section in <html:code>/etc/sssd/sssd.conf</html:code>. For example:
<html:pre>[pam]
offline_credentials_expiration = 1
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_offline_cred_expiration_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sssd_ssh_known_hosts_timeout" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SSSD to Expire SSH Known Hosts</ns10:title>
<ns10:description xml:lang="en-US">
SSSD should be configured to expire keys from known SSH hosts after 1 day.
To configure SSSD to known SSH hosts, set <html:code>ssh_known_hosts_timeout</html:code>
to <html:code>86400</html:code> under the <html:code>[ssh]</html:code> section in
<html:code>/etc/sssd/sssd.conf</html:code>. For example:
<html:pre>[ssh]
ssh_known_hosts_timeout = 86400
</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If cached authentication information is out-of-date, the validity of the
authentication information may be questionable.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sssd_ssh_known_hosts_timeout_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_xwindows_runlevel_setting" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable X Windows Startup By Setting Runlevel</ns10:title>
<ns10:description xml:lang="en-US">Setting the system's runlevel to 3 will prevent automatic startup
of the X server. To do so, ensure the following line in <html:code>/etc/inittab</html:code>
features a <html:code>3</html:code> as shown:
<html:pre>id:3:initdefault:</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-xwindows_runlevel_setting:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-xwindows_runlevel_setting_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Remove the X Windows Package Group</ns10:title>
<ns10:description xml:lang="en-US">Removing all packages which constitute the X Window System
ensures users or malicious software cannot start X.
To do so, run the following command:
<html:pre>$ sudo yum groupremove "X Window System"</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">Unnecessary packages should not be installed to decrease the attack surface of the system.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_xorg-x11-server-common_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_xorg-x11-server-common_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_avahi-daemon_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Avahi Server Software</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>avahi-daemon</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig avahi-daemon off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Because the Avahi daemon service keeps an open network
port, it is subject to network attacks. Its functionality
is convenient but is only appropriate if the local network
can be trusted.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_avahi-daemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable avahi-daemon
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_avahi-daemon_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service avahi-daemon
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- avahi-daemon
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_avahi-daemon_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_avahi-daemon_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_ip_only" selected="false" severity="low">
<ns10:title xml:lang="en-US">Serve Avahi Only via Required Protocol</ns10:title>
<ns10:description xml:lang="en-US">
If you are using only IPv4, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code> and ensure
the following line exists in the <html:code>[server]</html:code> section:
<html:pre>use-ipv6=no</html:pre>
Similarly, if you are using only IPv6, disable IPv4 sockets with the line:
<html:pre>use-ipv4=no</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_ip_only:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_check_ttl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Check Avahi Responses' TTL Field</ns10:title>
<ns10:description xml:lang="en-US">
To make Avahi ignore packets unless the TTL field is 255, edit
<html:code>/etc/avahi/avahi-daemon.conf</html:code> and ensure the following line
appears in the <html:code>[server]</html:code> section:
<html:pre>check-response-ttl=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps to ensure that only mDNS responses from the local network are
processed, because the TTL field in a packet is decremented from its initial
value of 255 whenever it is routed from one network to another. Although a
properly-configured router or firewall should not allow mDNS packets into
the local network at all, this option provides another check to ensure they
are not permitted.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_check_ttl:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_prevent_port_sharing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Prevent Other Programs from Using Avahi's Port</ns10:title>
<ns10:description xml:lang="en-US">
To prevent other mDNS stacks from running, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code>
and ensure the following line appears in the <html:code>[server]</html:code> section:
<html:pre>disallow-other-stacks=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps ensure that only Avahi is responsible for mDNS traffic coming from
that port on the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_prevent_port_sharing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_disable_publishing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Avahi Publishing</ns10:title>
<ns10:description xml:lang="en-US">
To prevent Avahi from publishing its records, edit <html:code>/etc/avahi/avahi-daemon.conf</html:code>
and ensure the following line appears in the <html:code>[publish]</html:code> section:
<html:pre>disable-publishing=yes</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
This helps ensure that no record will be published by Avahi.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_disable_publishing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_avahi_restrict_published_information" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Information Published by Avahi</ns10:title>
<ns10:description xml:lang="en-US">
If it is necessary to publish some information to the network, it should not be joined
by any extraneous information, or by information supplied by a non-trusted source
on the system.
Prevent user applications from using Avahi to publish services by adding or
correcting the following line in the <html:code>[publish]</html:code> section:
<html:pre>disable-user-service-publishing=yes</html:pre>
Implement as many of the following lines as possible, to restrict the information
published by Avahi.
<html:pre>publish-addresses=no
publish-hinfo=no
publish-workstation=no
publish-domain=no</html:pre>
Inspect the files in the directory <html:code>/etc/avahi/services/</html:code>. Unless there
is an operational need to publish information about each of these services,
delete the corresponding file.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
These options prevent publishing attempts from succeeding,
and can be applied even if publishing is disabled entirely via
disable-publishing. Alternatively, these can be used to restrict
the types of published information in the event that some information
must be published.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-avahi_restrict_published_information:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_cups_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable the CUPS Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cups</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig cups off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Turn off unneeded services to reduce attack surface.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_cups_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable cups
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_cups_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service cups
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- cups
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_cups_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_cups_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_cups_disable_browsing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Printer Browsing Entirely if Possible</ns10:title>
<ns10:description xml:lang="en-US">By default, CUPS listens on the network for printer list
broadcasts on UDP port 631. This functionality is called printer browsing.
To disable printer browsing entirely, edit the CUPS configuration
file, located at <html:code>/etc/cups/cupsd.conf</html:code>, to include the following:
<html:pre>Browsing Off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The CUPS print service can be configured to broadcast a list of
available printers to the network. Other machines on the network, also running
the CUPS print service, can be configured to listen to these broadcasts and add
and configure these printers for immediate use. By disabling this browsing
capability, the machine will no longer generate or receive such broadcasts.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-cups_disable_browsing:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_cups_disable_printserver" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Print Server Capabilities</ns10:title>
<ns10:description xml:lang="en-US">To prevent remote users from potentially connecting to and using
locally configured printers, disable the CUPS print server sharing
capabilities. To do so, limit how the server will listen for print jobs by
removing the more generic port directive from /etc/cups/cupsd.conf:
<html:pre>Port 631</html:pre>
and replacing it with the <html:code>Listen</html:code> directive:
<html:pre>Listen localhost:631</html:pre>
This will prevent remote users from printing to locally configured printers
while still allowing local users on the machine to print normally.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">By default, locally configured printers will not be shared over the
network, but if this functionality has somehow been enabled, these
recommendations will disable it again. Be sure to disable outgoing printer list
broadcasts, or remote users will still be able to see the locally configured
printers, even if they cannot actually print to them. To limit print serving to
a particular set of users, use the Policy directive.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-cups_disable_printserver:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_dhcpd_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable DHCP Service</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>dhcpd</html:code> service should be disabled on
any system that does not need to act as a DHCP server.
The <html:code>dhcpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig dhcpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Unmanaged or unintentionally activated DHCP servers may provide faulty information
to clients, interfering with the operation of a legitimate site
DHCP server if there is one.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_dhcpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable dhcpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_dhcpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service dhcpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- dhcpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_dhcpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_dhcpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dhcp_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall DHCP Server Package</ns10:title>
<ns10:description xml:lang="en-US">If the system does not need to act as a DHCP server,
the dhcp package can be uninstalled.
The <html:code>dhcp</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase dhcp</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the DHCP server ensures that it cannot be easily or
accidentally reactivated and disrupt network operation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dhcp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dhcp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_disable_ddns" selected="false" severity="low">
<ns10:title xml:lang="en-US">Do Not Use Dynamic DNS</ns10:title>
<ns10:description xml:lang="en-US">To prevent the DHCP server from receiving DNS information from
clients, edit <html:code>/etc/dhcp/dhcpd.conf</html:code>, and add or correct the following global
option: <html:pre>ddns-update-style none;</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The ddns-update-style option controls only whether
the DHCP server will attempt to act as a Dynamic DNS client. As long as the DNS
server itself is correctly configured to reject DDNS attempts, an incorrect
ddns-update-style setting on the client is harmless (but should be fixed as a
best practice).</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The Dynamic DNS protocol is used to remotely update the data served
by a DNS server. DHCP servers can use Dynamic DNS to publish information about
their clients. This setup carries security risks, and its use is not
recommended. If Dynamic DNS must be used despite the risks it poses, it is
critical that Dynamic DNS transactions be protected using TSIG or some other
cryptographic authentication mechanism. See dhcpd.conf(5) for more information
about protecting the DHCP server from passing along malicious DNS data from its
clients. </ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_disable_ddns:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_deny_decline" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deny Decline Messages</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/dhcp/dhcpd.conf</html:code> and add or correct the following
global option to prevent the DHCP server from responding the DHCPDECLINE
messages, if possible: <html:pre>deny declines;</html:pre> </ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The DHCPDECLINE message can be sent by a DHCP client to indicate
that it does not consider the lease offered by the server to be valid. By
issuing many DHCPDECLINE messages, a malicious client can exhaust the DHCP
server's pool of IP addresses, causing the DHCP server to forget old address
allocations.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_deny_decline:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_deny_bootp" selected="false" severity="low">
<ns10:title xml:lang="en-US">Deny BOOTP Queries</ns10:title>
<ns10:description xml:lang="en-US">Unless your network needs to support older BOOTP clients, disable
support for the bootp protocol by adding or correcting the global option:
<html:pre>deny bootp;</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The bootp option tells dhcpd to respond to BOOTP queries. If support
for this simpler protocol is not needed, it should be disabled to remove attack
vectors against the DHCP server.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_deny_bootp:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_minimize_served_info" selected="false" severity="low">
<ns10:title xml:lang="en-US">Minimize Served Information</ns10:title>
<ns10:description xml:lang="en-US">Edit /etc/dhcp/dhcpd.conf. Examine each address range section within
the file, and ensure that the following options are not defined unless there is
an operational need to provide this information via DHCP:
<html:pre>option domain-name
option domain-name-servers
option nis-domain
option nis-servers
option ntp-servers
option routers
option time-offset</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">By default, the Red Hat Enterprise Linux client installation uses DHCP
to request much of the above information from the DHCP server. In particular,
domain-name, domain-name-servers, and routers are configured via DHCP. These
settings are typically necessary for proper network functionality, but are also
usually static across machines at a given site.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">Because the configuration information provided by the DHCP server
could be maliciously provided to clients by a rogue DHCP server, the amount of
information provided via DHCP should be minimized. Remove these definitions
from the DHCP server configuration to ensure that legitimate clients do not
unnecessarily rely on DHCP for this information.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_minimize_served_info:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_server_configure_logging" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Logging</ns10:title>
<ns10:description xml:lang="en-US">Ensure that the following line exists in
<html:code>/etc/rsyslog.conf</html:code>:
<html:pre>daemon.* /var/log/daemon.log</html:pre>
Configure logwatch or other log monitoring tools to summarize error conditions
reported by the dhcpd process.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-12</ns10:reference>
<ns10:rationale xml:lang="en-US">By default, dhcpd logs notices to the daemon facility. Sending all
daemon messages to a dedicated log file is part of the syslog configuration
outlined in the Logging and Auditing section</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_server_configure_logging:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_sysconfig_networking_bootproto_ifcfg" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable DHCP Client</ns10:title>
<ns10:description xml:lang="en-US">
For each interface on the system (e.g. eth0), edit
<html:code>/etc/sysconfig/network-scripts/ifcfg-<html:i>interface</html:i></html:code> and make the
following changes:
<html:ul><html:li> Correct the BOOTPROTO line to read:
<html:pre>BOOTPROTO=none</html:pre>
</html:li><html:li> Add or correct the following lines, substituting the appropriate
values based on your site's addressing scheme:
<html:pre>NETMASK=255.255.255.0
IPADDR=192.168.1.2
GATEWAY=192.168.1.1</html:pre>
</html:li></html:ul>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
DHCP relies on trusting the local network. If the local network is not trusted,
then it should not be used. However, the automatic configuration provided by
DHCP is commonly used and the alternative, manual configuration, presents an
unacceptable burden in many circumstances.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-sysconfig_networking_bootproto_ifcfg:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-sysconfig_networking_bootproto_ifcfg_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dhcp_client_restrict_options" selected="false" severity="low">
<ns10:title xml:lang="en-US">Minimize the DHCP-Configured Options</ns10:title>
<ns10:description xml:lang="en-US">Create the file <html:code>/etc/dhcp/dhclient.conf</html:code>, and add an
appropriate setting for each of the ten configuration settings which can be
obtained via DHCP. For each setting, do one of the following:
<html:br />
If the setting should <html:i>not</html:i> be configured remotely by the DHCP server,
select an appropriate static value, and add the line:
<html:pre>supersede <html:code>setting value</html:code>;</html:pre>
If the setting should be configured remotely by the DHCP server, add the lines:
<html:pre>request <html:code>setting</html:code>;
require <html:code>setting</html:code>;</html:pre>
For example, suppose the DHCP server should provide only the IP address itself
and the subnet mask. Then the entire file should look like:
<html:pre>supersede domain-name "example.com";
supersede domain-name-servers 192.168.1.2;
supersede nis-domain "";
supersede nis-servers "";
supersede ntp-servers "ntp.example.com ";
supersede routers 192.168.1.1;
supersede time-offset -18000;
request subnet-mask;
require subnet-mask;</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">In this example, the options nis-servers and
nis-domain are set to empty strings, on the assumption that the deprecated NIS
protocol is not in use. It is necessary to supersede settings for unused
services so that they cannot be set by a hostile DHCP server. If an option is
set to an empty string, dhclient will typically not attempt to configure the
service.</ns10:warning>
<ns10:rationale xml:lang="en-US">By default, the DHCP client program, dhclient, requests and applies
ten configuration options (in addition to the IP address) from the DHCP server.
subnet-mask, broadcast-address, time-offset, routers, domain-name,
domain-name-servers, host-name, nis-domain, nis-servers, and ntp-servers. Many
of the options requested and applied by dhclient may be the same for every
system on a network. It is recommended that almost all configuration options be
assigned statically, and only options which must vary on a host-by-host basis
be assigned via DHCP. This limits the damage which can be done by a rogue DHCP
server. If appropriate for your site, it is also possible to supersede the
host-name directive in <html:code>/etc/dhcp/dhclient.conf</html:code>, establishing a static
hostname for the machine. However, dhclient does not use the host name option
provided by the DHCP server (instead using the value provided by a reverse DNS
lookup).</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dhcp_client_restrict_options:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_ntpd_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Enable the NTP Daemon</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ntpd</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 ntpd on</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">160</ns10:reference>
<ns10:rationale xml:lang="en-US">Enabling the <html:code>ntpd</html:code> service ensures that the <html:code>ntpd</html:code>
service will be running and that the system will synchronize its time to
any servers specified. This is important whether the system is configured to be
a client (and synchronize only its own clock) or it is also acting as an NTP
server to other systems. Synchronizing time is essential for authentication
services such as Kerberos, but it is also important for maintaining accurate
logs and auditing possible security breaches.
<html:br /><html:br />
The NTP daemon offers all of the functionality of <html:code>ntpdate</html:code>, which is now
deprecated. Additional information on this is available at
<html:a href="http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate">http://support.ntp.org/bin/view/Dev/DeprecatingNtpdate</html:a></ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_ntpd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable ntpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_ntpd_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service ntpd
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- ntpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_ntpd_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_ntpd_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_remote_server" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Specify a Remote NTP Server</ns10:title>
<ns10:description xml:lang="en-US">To specify a remote NTP server for time synchronization, edit
the file <html:code>/etc/ntp.conf</html:code>. Add or correct the following lines,
substituting the IP or hostname of a remote NTP server for <html:em>ntpserver</html:em>:
<html:pre>server <html:i>ntpserver</html:i></html:pre>
This instructs the NTP software to contact that remote server to obtain time
data.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">160</ns10:reference>
<ns10:rationale xml:lang="en-US">Synchronizing with an NTP server makes it possible
to collate system logs from multiple sources or correlate computer events with
real time events.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ntpd_specify_remote_server:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ntpd_specify_remote_server_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ntpd_specify_multiple_servers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Specify Additional Remote NTP Servers</ns10:title>
<ns10:description xml:lang="en-US">Additional NTP servers can be specified for time synchronization
in the file <html:code>/etc/ntp.conf</html:code>. To do so, add additional lines of the
following form, substituting the IP address or hostname of a remote NTP server for
<html:em>ntpserver</html:em>:
<html:pre>server <html:i>ntpserver</html:i></html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-8(1)</ns10:reference>
<ns10:rationale xml:lang="en-US">Specifying additional NTP servers increases the availability of
accurate time data, in the event that one of the specified servers becomes
unavailable. This is typical for a system acting as an NTP server for
other systems.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ntpd_specify_multiple_servers:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_postfix_enabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Postfix Service</ns10:title>
<ns10:description xml:lang="en-US">The Postfix mail transfer agent is used for local mail delivery
within the system. The default configuration only listens for connections to
the default SMTP port (port 25) on the loopback interface (127.0.0.1). It is
recommended to leave this service enabled for local mail delivery.
The <html:code>postfix</html:code> service can be enabled with the following command:
<html:pre>$ sudo chkconfig --level 2345 postfix on</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Local mail delivery is essential to some system maintenance and
notification tasks.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_postfix_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command enable postfix
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_postfix_enabled" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Enable service postfix
service:
name="{{item}}"
enabled="yes"
state="started"
with_items:
- postfix
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_postfix_enabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_postfix_enabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_sendmail_removed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Uninstall Sendmail Package</ns10:title>
<ns10:description xml:lang="en-US">Sendmail is not the default mail transfer agent and is
not installed by default.
The <html:code>sendmail</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase sendmail</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The sendmail software was not developed with security in mind and
its design prevents it from being effectively contained by SELinux. Postfix
should be used instead.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_sendmail_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_sendmail_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_postfix_network_listening_disabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Disable Postfix Network Listening</ns10:title>
<ns10:description xml:lang="en-US">
Edit the file <html:code>/etc/postfix/main.cf</html:code> to ensure that only the following
<html:code>inet_interfaces</html:code> line appears:
<html:pre>inet_interfaces = localhost</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">382</ns10:reference>
<ns10:rationale xml:lang="en-US">
This ensures <html:code>postfix</html:code> accepts mail messages
(such as cron job reports) from the local system only,
and not from the network, which protects it from network attack.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-postfix_network_listening_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-postfix_network_listening_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_postfix_server_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SMTP Greeting Banner</ns10:title>
<ns10:description xml:lang="en-US">Edit <html:code>/etc/postfix/main.cf</html:code>, and add or correct the
following line, substituting some other wording for the banner information if
you prefer:
<html:pre>smtpd_banner = $myhostname ESMTP</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-22</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AU-13</ns10:reference>
<ns10:rationale xml:lang="en-US">The default greeting banner discloses that the listening mail
process is Postfix. When remote mail senders connect to the MTA on port 25,
they are greeted by an initial banner as part of the SMTP dialogue. This banner
is necessary, but it frequently gives away too much information, including the
MTA software which is in use, and sometimes also its version number. Remote
mail senders do not need this information in order to send mail, so the banner
should be changed to reveal only the hostname (which is already known and may
be useful) and the word ESMTP, to indicate that the modern SMTP protocol
variant is supported.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-postfix_server_banner:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ldap_client_start_tls" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure LDAP Client to Use TLS For All Transactions</ns10:title>
<ns10:description xml:lang="en-US">Configure LDAP to enforce TLS use. First, edit the file
<html:code>/etc/pam_ldap.conf</html:code>, and add or correct the following lines:
<html:pre>ssl start_tls</html:pre>
Then review the LDAP server and ensure TLS has been configured.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">778</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:rationale xml:lang="en-US">The ssl directive specifies whether to use ssl or not. If
not specified it will default to no. It should be set to start_tls rather
than doing LDAP over SSL.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ldap_client_start_tls:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ldap_client_start_tls_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ldap_client_tls_cacertpath" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure Certificate Directives for LDAP Use of TLS</ns10:title>
<ns10:description xml:lang="en-US">Ensure a copy of a trusted CA certificate has been placed in
the file <html:code>/etc/pki/tls/CA/cacert.pem</html:code>. Configure LDAP to enforce TLS
use and to trust certificates signed by that CA. First, edit the file
<html:code>/etc/pam_ldap.conf</html:code>, and add or correct either of the following lines:
<html:pre>tls_cacertdir /etc/pki/tls/CA</html:pre>
or
<html:pre>tls_cacertfile /etc/pki/tls/CA/cacert.pem</html:pre>
Then review the LDAP server and ensure TLS has been configured.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">776</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">778</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1453</ns10:reference>
<ns10:rationale xml:lang="en-US">The tls_cacertdir or tls_cacertfile directives are required when
tls_checkpeer is configured (which is the default for openldap versions 2.1 and
up). These directives define the path to the trust certificates signed by the
site CA.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ldap_client_tls_cacertpath:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ldap_client_tls_cacertpath_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_openldap-servers_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall openldap-servers Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>openldap-servers</html:code> package should be removed if not in use.
Is this machine the OpenLDAP server? If not, remove the package.
<html:pre>$ sudo yum erase openldap-servers</html:pre>
The openldap-servers RPM is not installed by default on Red Hat Enterprise Linux 6
machines. It is needed only by the OpenLDAP server, not by the
clients which use LDAP for authentication. If the system is not
intended for use as an LDAP Server it should be removed.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">The <html:code>openldap-servers</html:code> package is not installed by default on RHEL6 machines.
It is needed only by the OpenLDAP server system, not clients which use LDAP for authentication. If
the system is not intended for use as an LDAP server, <html:code>openldap-servers</html:code> should be removed.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_openldap-servers_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_openldap-servers_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_nfslock_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File System Lock Service (nfslock)</ns10:title>
<ns10:description xml:lang="en-US">The Network File System Lock (nfslock) service starts the required
remote procedure call (RPC) processes which allow clients to lock files on the
server. If the local machine is not configured to mount NFS filesystems then
this service should be disabled.
The <html:code>nfslock</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig nfslock off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_nfslock_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable nfslock
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_nfslock_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service nfslock
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- nfslock
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_nfslock_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcgssd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Secure RPC Client Service (rpcgssd)</ns10:title>
<ns10:description xml:lang="en-US">
The rpcgssd service manages RPCSEC GSS contexts required to secure protocols
that use RPC (most often Kerberos and NFS). The rpcgssd service is the
client-side of RPCSEC GSS. If the system does not require secure RPC then this
service should be disabled.
The <html:code>rpcgssd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcgssd off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcgssd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcgssd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcgssd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcgssd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcidmapd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RPC ID Mapping Service (rpcidmapd)</ns10:title>
<ns10:description xml:lang="en-US">The rpcidmapd service is used to map user names and groups to UID
and GID numbers on NFSv4 mounts. If NFS is not in use on the local system then
this service should be disabled.
The <html:code>rpcidmapd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcidmapd off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcidmapd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcidmapd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcidmapd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcidmapd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcidmapd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcidmapd_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcbind_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable RPC Bind service (rpcbind)</ns10:title>
<ns10:description xml:lang="en-US">The rpcbind utility is a server that converts RPC program numbers
into universal addresses. If RPC calls are not made to servers on the local
system then this service should be disabled.
The <html:code>rpcbind</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcbind off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_rpcbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcbind
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcbind_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcbind
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcbind
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcbind_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_netfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File Systems (netfs)</ns10:title>
<ns10:description xml:lang="en-US">The netfs script manages the boot-time mounting of several types
of networked filesystems, of which NFS and Samba are the most common. If these
filesystem types are not in use, the script can be disabled, protecting the
system somewhat against accidental or malicious changes to <html:code>/etc/fstab</html:code>
and against flaws in the netfs script itself.
The <html:code>netfs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig netfs off</html:pre>
</ns10:description>
<ns10:fix complexity="low" disruption="low" id="service_netfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable netfs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_netfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service netfs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- netfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_netfs_disabled:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_tcp_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure lockd to use static TCP port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>lockd</html:code> daemon to use a static TCP port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>LOCKD_TCPPORT=lockd-port</html:pre>
Where <html:code>lockd-port</html:code> is a port which is not used by any other service on
your network.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Restrict service to always use a given port, so that firewalling can be done
effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_lockd_udp_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure lockd to use static UDP port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>lockd</html:code> daemon to use a static UDP port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>LOCKD_UDPPORT=lockd-port</html:pre>
Where <html:code>lockd-port</html:code> is a port which is not used by any other service on
your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_statd_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure statd to use static port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>statd</html:code> daemon to use a static port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>STATD_PORT=statd-port</html:pre>
Where <html:code>statd-port</html:code> is a port which is not used by any other service on your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_fixed_mountd_port" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure mountd to use static port</ns10:title>
<ns10:description xml:lang="en-US">Configure the <html:code>mountd</html:code> daemon to use a static port as
opposed to letting the RPC Bind service dynamically assign a port. Edit the
file <html:code>/etc/sysconfig/nfs</html:code>. Add or correct the following line:
<html:pre>MOUNTD_PORT=statd-port</html:pre>
Where <html:code>mountd-port</html:code> is a port which is not used by any other service on your network.
</ns10:description>
<ns10:rationale xml:lang="en-US"> Restricting services to always use a given port enables firewalling
to be done more effectively.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_nfs_no_anonymous" selected="false" severity="low">
<ns10:title xml:lang="en-US">Specify UID and GID for Anonymous NFS Connections</ns10:title>
<ns10:description xml:lang="en-US">To specify the UID and GID for remote root users, edit the <html:code>/etc/exports</html:code> file and add the following for each export:
<html:pre>
anonuid=<html:code>value greater than UID_MAX from /etc/login.defs</html:code>
anongid=<html:code>value greater than GID_MAX from /etc/login.defs</html:code>
</html:pre>
Note that a value of "-1" is technically acceptable as this will randomize the <html:code>anonuid</html:code> and
<html:code>anongid</html:code> values on a Red Hat Enterprise Linux 6 based NFS server. While acceptable from a security perspective,
a value of <html:code>-1</html:code> may cause interoperability issues, particularly with Red Hat Enterprise Linux 7 client systems.
</ns10:description>
<ns10:rationale xml:lang="en-US">Specifying the anonymous UID and GID ensures that the remote root user is mapped
to a local account which has no permissions on the system.</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-nfs_no_anonymous_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_nfs_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Network File System (nfs)</ns10:title>
<ns10:description xml:lang="en-US">The Network File System (NFS) service allows remote hosts to mount
and interact with shared filesystems on the local machine. If the local machine
is not designated as a NFS server then this service should be disabled.
The <html:code>nfs</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig nfs off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_nfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable nfs
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_nfs_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service nfs
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- nfs
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_nfs_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_nfs_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_rpcsvcgssd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Secure RPC Server Service (rpcsvcgssd)</ns10:title>
<ns10:description xml:lang="en-US">The rpcsvcgssd service manages RPCSEC GSS contexts required to
secure protocols that use RPC (most often Kerberos and NFS). The rpcsvcgssd
service is the server-side of RPCSEC GSS. If the system does not require secure
RPC then this service should be disabled.
The <html:code>rpcsvcgssd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig rpcsvcgssd off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Unnecessary services should be disabled to decrease the attack surface of the system.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_rpcsvcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable rpcsvcgssd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_rpcsvcgssd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service rpcsvcgssd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- rpcsvcgssd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_rpcsvcgssd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_rpcsvcgssd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nodev_remote_filesystems" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Mount Remote Filesystems with nodev</ns10:title>
<ns10:description xml:lang="en-US">
Add the <html:code>nodev</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any NFS mounts.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">MP-2</ns10:reference>
<ns10:rationale xml:lang="en-US">Legitimate device files should only exist in the /dev directory. NFS mounts
should not present device files to users.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nodev_remote_filesystems:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_nodev_remote_filesystems_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_nosuid_remote_filesystems" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Mount Remote Filesystems with nosuid</ns10:title>
<ns10:description xml:lang="en-US">
Add the <html:code>nosuid</html:code> option to the fourth column of
<html:code>/etc/fstab</html:code> for the line which controls mounting of
any NFS mounts.
</ns10:description>
<ns10:rationale xml:lang="en-US">NFS mounts should not present suid binaries to users. Only vendor-supplied suid executables
should be installed to their default location on the local filesystem.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_nosuid_remote_filesystems:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_nosuid_remote_filesystems_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_use_root_squashing_all_exports" selected="false" severity="low">
<ns10:title xml:lang="en-US">Use Root-Squashing on All Exports</ns10:title>
<ns10:description xml:lang="en-US">If a filesystem is exported using root squashing, requests from root on the client
are considered to be unprivileged (mapped to a user such as nobody). This provides some mild
protection against remote abuse of an NFS server. Root squashing is enabled by default, and
should not be disabled.
<html:br /><html:br />
Ensure that no line in <html:code>/etc/exports</html:code> contains the option <html:code>no_root_squash</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">If the NFS server allows root access to local file systems from remote hosts, this
access could be used to compromise the system.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_restrict_nfs_clients_to_privileged_ports" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict NFS Clients to Privileged Ports</ns10:title>
<ns10:description xml:lang="en-US">By default, the server NFS implementation requires that all client requests be made
from ports less than 1024. If your organization has control over machines connected to its
network, and if NFS requests are prohibited at the border firewall, this offers some protection
against malicious requests from unprivileged users. Therefore, the default should not be changed.
<html:br /><html:br />
To ensure that the default has not been changed, ensure no line in
<html:code>/etc/exports</html:code> contains the option <html:code>insecure</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">Allowing client requests to be made from ports higher than 1024 could allow a unprivileged
user to initiate an NFS connection. If the unprivileged user account has been compromised, an
attacker could gain access to data on the NFS server.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_no_insecure_locks_exports" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Insecure File Locking is Not Allowed</ns10:title>
<ns10:description xml:lang="en-US">By default the NFS server requires secure file-lock requests,
which require credentials from the client in order to lock a file. Most NFS
clients send credentials with file lock requests, however, there are a few
clients that do not send credentials when requesting a file-lock, allowing the
client to only be able to lock world-readable files. To get around this, the
<html:code>insecure_locks</html:code> option can be used so these clients can access the
desired export. This poses a security risk by potentially allowing the client
access to data for which it does not have authorization.
Remove any instances of the
<html:code>insecure_locks</html:code> option from the file <html:code>/etc/exports</html:code>.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">764</ns10:reference>
<ns10:rationale xml:lang="en-US">Allowing insecure file locking could allow for sensitive data to be
viewed or edited by an unauthorized user.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-no_insecure_locks_exports:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-no_insecure_locks_exports_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_named_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable DNS Server</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>named</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig named off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
All network services involve some risk of compromise due to
implementation flaws and should be disabled if possible.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_named_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable named
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_named_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service named
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- named
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_named_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_named_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_bind_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall bind Package</ns10:title>
<ns10:description xml:lang="en-US">To remove the <html:code>bind</html:code> package, which contains the
<html:code>named</html:code> service, run the following command:
<html:pre>$ sudo yum erase bind</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">366</ns10:reference>
<ns10:rationale xml:lang="en-US">
If there is no need to make DNS server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_bind_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_bind_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_disable_zone_transfers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Zone Transfers from the Nameserver</ns10:title>
<ns10:description xml:lang="en-US">Is it necessary for a secondary nameserver to receive zone data
via zone transfer from the primary server? If not, follow the instructions in
this section. If so, see the next section for instructions on protecting zone
transfers.
Add or correct the following directive within <html:code>/etc/named.conf</html:code>:
<html:pre>options {
allow-transfer { none; };
...
}</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">If both the primary and secondary nameserver are under your control,
or if you have only one nameserver, it may be possible to use an external
configuration management mechanism to distribute zone updates. In that case, it
is not necessary to allow zone transfers within BIND itself, so they should be
disabled to avoid the potential for abuse.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_authenticate_zone_transfers" selected="false" severity="low">
<ns10:title xml:lang="en-US">Authenticate Zone Transfers</ns10:title>
<ns10:description xml:lang="en-US">If it is necessary for a secondary nameserver to receive zone data
via zone transfer from the primary server, follow the instructions here. Use
dnssec-keygen to create a symmetric key file in the current directory:
<html:pre>$ cd /tmp
$ sudo dnssec-keygen -a HMAC-MD5 -b 128 -n HOST dns.example.com
Kdns.example.com .+aaa +iiiii</html:pre>
This output is the name of a file containing the new key. Read the file to find
the base64-encoded key string:
<html:pre>$ sudo cat Kdns.example.com .+NNN +MMMMM .key
dns.example.com IN KEY 512 3 157 base64-key-string</html:pre>
Add the directives to <html:code>/etc/named.conf</html:code> on the primary server:
<html:pre>key zone-transfer-key {
algorithm hmac-md5;
secret "base64-key-string ";
};
zone "example.com " IN {
type master;
allow-transfer { key zone-transfer-key; };
...
};</html:pre>
Add the directives below to <html:code>/etc/named.conf</html:code> on the secondary nameserver:
<html:pre>key zone-transfer-key {
algorithm hmac-md5;
secret "base64-key-string ";
};
server IP-OF-MASTER {
keys { zone-transfer-key; };
};
zone "example.com " IN {
type slave;
masters { IP-OF-MASTER ; };
...
};</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">The purpose of the dnssec-keygen command is to
create the shared secret string base64-key-string. Once this secret has been
obtained and inserted into named.conf on the primary and secondary servers, the
key files Kdns.example.com .+NNN +MMMMM .key and Kdns.example.com .+NNN +MMMMM
.private are no longer needed, and may safely be deleted.</ns10:warning>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">The BIND transaction signature (TSIG) functionality allows primary
and secondary nameservers to use a shared secret to verify authorization to
perform zone transfers. This method is more secure than using IP-based limiting
to restrict nameserver access, since IP addresses can be easily spoofed.
However, if you cannot configure TSIG between your servers because, for
instance, the secondary nameserver is not under your control and its
administrators are unwilling to configure TSIG, you can configure an
allow-transfer directive with numerical IP addresses or ACLs as a last resort.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dns_server_disable_dynamic_updates" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Dynamic Updates</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason to enable the risky dynamic
update functionality? If not, edit <html:code>/etc/named.conf</html:code>. For each zone
specification, correct the following directive if necessary:
<html:pre>zone "example.com " IN {
allow-update { none; };
...
};</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Dynamic updates allow remote servers to add, delete, or modify any
entries in your zone file. Therefore, they should be considered highly risky,
and disabled unless there is a very good reason for their use. If dynamic
updates must be allowed, IP-based ACLs are insufficient protection, since they
are easily spoofed. Instead, use TSIG keys (see the previous section for an
example), and consider using the update-policy directive to restrict changes to
only the precise type of change needed.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_vsftpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable vsftpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>vsftpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig vsftpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running FTP server software provides a network-based avenue
of attack, and should be disabled if not needed.
Furthermore, the FTP protocol is unencrypted and creates
a risk of compromising sensitive information.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_vsftpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_vsftpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service vsftpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- vsftpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_vsftpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_vsftpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_vsftpd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall vsftpd Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>vsftpd</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase vsftpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Removing the vsftpd package decreases the risk of its
accidental activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_vsftpd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_vsftpd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_vsftpd_installed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install vsftpd Package</ns10:title>
<ns10:description xml:lang="en-US">If this machine must operate as an FTP server, install the <html:code>vsftpd</html:code> package via the standard channels.
<html:pre>$ sudo yum install vsftpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">After Red Hat Enterprise Linux 2.1, Red Hat switched from distributing wu-ftpd with Red Hat Enterprise Linux to distributing vsftpd. For security
and for consistency with future Red Hat releases, the use of vsftpd is recommended.</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure vsftpd is installed
package:
name="{{item}}"
state=present
with_items:
- vsftpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_vsftpd
class install_vsftpd {
package { 'vsftpd':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_vsftpd_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=vsftpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_vsftpd_installed:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_log_transactions" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable Logging of All FTP Transactions</ns10:title>
<ns10:description xml:lang="en-US">Add or correct the following configuration options within the <html:code>vsftpd</html:code>
configuration file, located at <html:code>/etc/vsftpd/vsftpd.conf</html:code>:
<html:pre>xferlog_enable=YES
xferlog_std_format=NO
log_ftp_protocol=YES</html:pre>
</ns10:description>
<ns10:warning category="general" xml:lang="en-US">If verbose logging to <html:code>vsftpd.log</html:code> is done, sparse logging of downloads to <html:code>/var/log/xferlog</html:code> will not also occur. However, the information about what files were downloaded is included in the information logged to <html:code>vsftpd.log</html:code></ns10:warning>
<ns10:rationale xml:lang="en-US">To trace malicious activity facilitated by the FTP service, it must be configured to ensure that all commands sent to
the FTP server are logged using the verbose vsftpd log
format. The default vsftpd log file is <html:code>/var/log/vsftpd.log</html:code>.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_log_transactions:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ftp_log_transactions_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_present_banner" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Create Warning Banners for All FTP Users</ns10:title>
<ns10:description xml:lang="en-US">Edit the vsftpd configuration file, which resides at <html:code>/etc/vsftpd/vsftpd.conf</html:code>
by default. Add or correct the following configuration options:
<html:pre>banner_file=/etc/issue</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">48</ns10:reference>
<ns10:rationale xml:lang="en-US">This setting will cause the system greeting banner to be used for FTP connections as well.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_present_banner:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-ftp_present_banner_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_restrict_to_anon" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Access to Anonymous Users if Possible</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason for users to transfer files to/from their own accounts using FTP, rather than
using a secure protocol like SCP/SFTP? If not, edit the vsftpd configuration file. Add or correct the following configuration option:
<html:pre>local_enable=NO</html:pre>
If non-anonymous FTP logins are necessary, follow the guidance in the remainder of this section to secure
these logins as much as possible.</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">AC-3</ns10:reference>
<ns10:rationale xml:lang="en-US">The use of non-anonymous FTP logins is strongly discouraged. Since SSH clients and servers are widely available, and since SSH provides support for a transfer mode which resembles FTP in user interface, there is no good reason to allow password-based FTP access. </ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_restrict_to_anon:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_limit_users" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Users Allowed FTP Access if Necessary</ns10:title>
<ns10:description xml:lang="en-US">If there is a mission-critical reason for users to access their accounts via the insecure FTP protocol, limit the set of users who are allowed this access. Edit the vsftpd configuration file. Add or correct the following configuration options:
<html:pre>userlist_enable=YES
userlist_file=/etc/vsftp.ftpusers
userlist_deny=NO</html:pre>
Edit the file <html:code>/etc/vsftp.ftpusers</html:code>. For each user USERNAME who should be allowed to access the system via FTP, add a line containing that user's name:
<html:pre>USERNAME</html:pre>
If anonymous access is also required, add the anonymous usernames to <html:code>/etc/vsftp.ftpusers</html:code> as well.
<html:pre>anonymous
ftp</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">Historically, the file <html:code>/etc/ftpusers</html:code> contained a list of users who were not allowed to access the system via FTP. It was used to prevent system users such as the root user from logging in via the insecure FTP protocol. However, when the configuration option <html:code>userlist deny=NO</html:code> is set, vsftpd interprets ftpusers as the set of users who are allowed to login via FTP. Since it should be possible for most users to access their accounts via secure protocols, it is recommended that this setting be used, so that non-anonymous FTP access can be limited to legacy users who have been explicitly identified.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_limit_users:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_disable_uploads" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable FTP Uploads if Possible</ns10:title>
<ns10:description xml:lang="en-US">Is there a mission-critical reason for users to upload files via FTP? If not,
edit the vsftpd configuration file to add or correct the following configuration options:
<html:pre>write_enable=NO</html:pre>
If FTP uploads are necessary, follow the guidance in the remainder of this section to secure these transactions
as much as possible.</ns10:description>
<ns10:rationale xml:lang="en-US">Anonymous FTP can be a convenient way to make files available for universal download. However, it is less
common to have a need to allow unauthenticated users to place files on the FTP server. If this must be done, it
is necessary to ensure that files cannot be uploaded and downloaded from the same directory.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_disable_uploads:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_home_partition" selected="false" severity="low">
<ns10:title xml:lang="en-US">Place the FTP Home Directory on its Own Partition</ns10:title>
<ns10:description xml:lang="en-US">By default, the anonymous FTP root is the home directory of the FTP user account. The df command can
be used to verify that this directory is on its own partition.</ns10:description>
<ns10:rationale xml:lang="en-US">If there is a mission-critical reason for anonymous users to upload files, precautions must be taken to prevent
these users from filling a disk used by other services.</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_ftp_configure_firewall" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Firewalls to Protect the FTP Server</ns10:title>
<ns10:description xml:lang="en-US">By default, <html:code>iptables</html:code>
blocks access to the ports used by the web server.
To configure <html:code>iptables</html:code> to allow port
21 traffic one must edit
<html:code>/etc/sysconfig/iptables</html:code> and
<html:code>/etc/sysconfig/ip6tables</html:code> (if IPv6 is in use).
Add the following line, ensuring that it appears before the final LOG
and DROP lines for the INPUT chain:
<html:pre xml:space="preserve">-A INPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT</html:pre>
Edit the file <html:code>/etc/sysconfig/iptables-config</html:code>. Ensure that the space-separated list of modules contains
the FTP connection tracking module:
<html:pre>IPTABLES_MODULES="ip_conntrack_ftp"</html:pre></ns10:description>
<ns10:rationale xml:lang="en-US">These settings configure iptables to allow connections to an FTP server. The first line allows initial connections
to the FTP server port.
FTP is an older protocol which is not very compatible with firewalls. During the initial FTP dialogue, the client
and server negotiate an arbitrary port to be used for data transfer. The <html:code>ip_conntrack_ftp</html:code> module is used by
iptables to listen to that dialogue and allow connections to the data ports which FTP negotiates. This allows an
FTP server to operate on a machine which is running a firewall.</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-ftp_configure_firewall:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_httpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable httpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig httpd off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running web server software provides a network-based avenue
of attack, and should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_httpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_httpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service httpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- httpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_httpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_httpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_httpd_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall httpd Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase httpd</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
If there is no need to make the web server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure httpd is removed
package:
name="{{item}}"
state=absent
with_items:
- httpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_httpd
class remove_httpd {
package { 'httpd':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_httpd_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=httpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_httpd_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_httpd_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_servertokens_prod" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set httpd ServerTokens Directive to Prod</ns10:title>
<ns10:description xml:lang="en-US"><html:code>ServerTokens Prod</html:code> restricts information in page headers, returning only the word "Apache."
<html:br /><html:br />
Add or correct the following directive in <html:code>/etc/httpd/conf/httpd.conf</html:code>:
<html:pre>ServerTokens Prod</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Information disclosed to clients about the configuration of the web server and system could be used
to plan an attack on the given system. This information disclosure should be restricted to a minimum.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_serversignature_off" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set httpd ServerSignature Directive to Off</ns10:title>
<ns10:description xml:lang="en-US"><html:code>ServerSignature Off</html:code> restricts <html:code>httpd</html:code> from displaying server version number
on error pages.
<html:br /><html:br />
Add or correct the following directive in <html:code>/etc/httpd/conf/httpd.conf</html:code>:
<html:pre>ServerSignature Off</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Information disclosed to clients about the configuration of the web server and system could be used
to plan an attack on the given system. This information disclosure should be restricted to a minimum.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_digest_authentication" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable HTTP Digest Authentication</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>auth_digest</html:code> module provides encrypted authentication sessions.
If this functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule auth_digest_module modules/mod_auth_digest.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_mod_rewrite" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable HTTP mod_rewrite</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>mod_rewrite</html:code> module is very powerful and can protect against
certain classes of web attacks. However, it is also very complex and has a
significant history of vulnerabilities itself. If its functionality is
unnecessary, comment out the related module:
<html:pre>#LoadModule rewrite_module modules/mod_rewrite.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_ldap_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable LDAP Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>ldap</html:code> module provides HTTP authentication via an LDAP directory.
If its functionality is unnecessary, comment out the related modules:
<html:pre>#LoadModule ldap_module modules/mod_ldap.so
#LoadModule authnz_ldap_module modules/mod_authnz_ldap.so</html:pre>
If LDAP is to be used, SSL encryption should be used as well.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_side_includes" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Server Side Includes</ns10:title>
<ns10:description xml:lang="en-US">
Server Side Includes provide a method of dynamically generating web pages through the
insertion of server-side code. However, the technology is also deprecated and
introduces significant security concerns.
If this functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule include_module modules/mod_include.so</html:pre>
If there is a critical need for Server Side Includes, they should be enabled with the
option <html:code>IncludesNoExec</html:code> to prevent arbitrary code execution. Additionally, user
supplied data should be encoded to prevent cross-site scripting vulnerabilities.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_mime_magic" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable MIME Magic</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>mime_magic</html:code> module provides a second layer of MIME support that in most configurations
is likely extraneous. If its functionality is unnecessary, comment out the related module:
<html:pre>#LoadModule mime_magic_module modules/mod_mime_magic.so</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_webdav" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable WebDAV (Distributed Authoring and Versioning)</ns10:title>
<ns10:description xml:lang="en-US">
WebDAV is an extension of the HTTP protocol that provides distributed and
collaborative access to web content. If its functionality is unnecessary,
comment out the related modules:
<html:pre>#LoadModule dav_module modules/mod_dav.so
#LoadModule dav_fs_module modules/mod_dav_fs.so</html:pre>
If there is a critical need for WebDAV, extra care should be taken in its configuration.
Since DAV access allows remote clients to manipulate server files, any location on the
server that is DAV enabled should be protected by access controls.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server, reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_activity_status" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Server Activity Status</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>status</html:code> module provides real-time access to statistics on the internal operation of
the web server. This may constitute an unnecessary information leak and should be disabled
unless necessary. To do so, comment out the related module:
<html:pre>#LoadModule status_module modules/mod_status.so</html:pre>
If there is a critical need for this module, ensure that access to the status
page is properly restricted to a limited set of hosts in the status handler
configuration.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_server_configuration_display" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Web Server Configuration Display</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>info</html:code> module creates a web page illustrating the configuration of the web server. This
can create an unnecessary security leak and should be disabled.
If its functionality is unnecessary, comment out the module:
<html:pre>#LoadModule info_module modules/mod_info.so</html:pre>
If there is a critical need for this module, use the <html:code>Location</html:code> directive to provide
an access control list to restrict access to the information.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_url_correction" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable URL Correction on Misspelled Entries</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>speling</html:code> module attempts to find a document match by allowing one misspelling in an
otherwise failed request. If this functionality is unnecessary, comment out the module:
<html:pre>#LoadModule speling_module modules/mod_speling.so</html:pre>
This functionality weakens server security by making site enumeration easier.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_proxy_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Proxy Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>proxy</html:code> module provides proxying support, allowing <html:code>httpd</html:code> to forward requests and
serve as a gateway for other servers. If its functionality is unnecessary, comment out the module:
<html:pre>#LoadModule proxy_module modules/mod_proxy.so</html:pre>
If proxy support is needed, load <html:code>mod_proxy</html:code> and the appropriate proxy protocol handler
module (one of <html:code>mod_proxy_http</html:code>, <html:code>mod_proxy_ftp</html:code>, or <html:code>mod_proxy_connect</html:code>). Additionally,
make certain that a server is secure before enabling proxying, as open proxy servers
are a security risk. <html:code>mod_proxy_balancer</html:code> enables load balancing, but requires that
<html:code>mod status</html:code> be enabled.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_cache_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Cache Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cache</html:code> module allows <html:code>httpd</html:code> to cache data, optimizing access to
frequently accessed content. However, it introduces potential security flaws
such as the possibility of circumventing <html:code>Allow</html:code> and
<html:code>Deny</html:code> directives.
<html:br /><html:br /> If this functionality is
unnecessary, comment out the module:
<html:pre>#LoadModule cache_module modules/mod_cache.so</html:pre>
If caching is required, it should not be enabled for any limited-access content.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_cgi_support" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable CGI Support</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>cgi</html:code> module allows HTML to interact with the CGI web programming language.
<html:br /><html:br />
If this functionality is unnecessary, comment out the module:
<html:pre>#LoadModule cgi_module modules/mod_cgi.so</html:pre>
If the web server requires the use of CGI, enable <html:code>mod_cgi</html:code>.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of loadable modules available to the web server reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_root_directory" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Root Directory</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>httpd</html:code> root directory should always have the most restrictive configuration enabled.
<html:pre><Directory / >
Options None
AllowOverride None
Order allow,deny
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
The Web Server's root directory content should be protected from unauthorized access
by web clients.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_web_directory" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Web Directory</ns10:title>
<ns10:description xml:lang="en-US">
The default configuration for the web (<html:code>/var/www/html</html:code>) Directory allows directory
indexing (<html:code>Indexes</html:code>) and the following of symbolic links (<html:code>FollowSymLinks</html:code>).
Neither of these is recommended.
<html:br /><html:br />
The <html:code>/var/www/html</html:code> directory hierarchy should not be viewable via the web, and
symlinks should only be followed if the owner of the symlink also owns the linked file.
<html:br /><html:br />
Ensure that this policy is adhered to by altering the related section of the configuration:
<html:pre><Directory "/var/www/html">
# ...
Options SymLinksIfOwnerMatch
# ...
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Access to the web server's directory hierarchy could allow access to unauthorized files
by web clients. Following symbolic links could also allow such access.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_restrict_critical_directories" selected="false" severity="low">
<ns10:title xml:lang="en-US">Restrict Other Critical Directories</ns10:title>
<ns10:description xml:lang="en-US">
All accessible web directories should be configured with similarly restrictive settings.
The <html:code>Options</html:code> directive should be limited to necessary functionality and the <html:code>AllowOverride</html:code>
directive should be used only if needed. The <html:code>Order</html:code> and <html:code>Deny</html:code> access control tags
should be used to deny access by default, allowing access only where necessary.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Directories accessible from a web client should be configured with the least amount of
access possible in order to avoid unauthorized access to restricted content or server information.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_limit_available_methods" selected="false" severity="low">
<ns10:title xml:lang="en-US">Limit Available Methods</ns10:title>
<ns10:description xml:lang="en-US">
Web server methods are defined in section 9 of RFC 2616 (<html:a href="http://www.ietf.org/rfc/rfc2616.txt">http://www.ietf.org/rfc/rfc2616.txt</html:a>).
If a web server does not require the implementation of all available methods,
they should be disabled.
<html:br /><html:br />
Note: <html:code>GET</html:code> and <html:code>POST</html:code> are the most common methods. A majority of the others
are limited to the WebDAV protocol.
<html:pre><Directory /var/www/html>
# ...
# Only allow specific methods (this command is case-sensitive!)
<LimitExcept GET POST>
Order allow,deny
</LimitExcept>
# ...
</Directory></html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Minimizing the number of available methods to the web client reduces risk
by limiting the capabilities allowed by the web server.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_install_mod_ssl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install mod_ssl</ns10:title>
<ns10:description xml:lang="en-US">
Install the <html:code>mod_ssl</html:code> module:
<html:pre>$ sudo yum install mod_ssl</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US"><html:code>mod_ssl</html:code> provides encryption capabilities for the <html:code>httpd</html:code> Web server. Unencrypted
content is transmitted in plain text which could be passively monitored and accessed by
unauthorized parties.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_httpd_install_mod_security" selected="false" severity="low">
<ns10:title xml:lang="en-US">Install mod_security</ns10:title>
<ns10:description xml:lang="en-US">
Install the <html:code>security</html:code> module:
<html:pre>$ sudo yum install mod_security</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US"><html:code>mod_security</html:code> provides an additional level of protection for the web server by
enabling the administrator to implement content access policies and filters at the
application layer.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_var_log_httpd" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on the /var/log/httpd/ Directory</ns10:title>
<ns10:description xml:lang="en-US">
Ensure that the permissions on the web server log directory is set to 700:
<html:pre>$ sudo chmod 700 /var/log/httpd/</html:pre>
This is its default setting.
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Access to the web server's log files may allow an unauthorized user or attacker
to access information about the web server or alter the server's log files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_var_log_httpd:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dir_perms_etc_httpd_conf" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on the /etc/httpd/conf/ Directory</ns10:title>
<ns10:description xml:lang="en-US">
Set permissions on the web server configuration directory to 750:
<html:pre>$ sudo chmod 750 /etc/httpd/conf/</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Access to the web server's configuration files may allow an unauthorized user or attacker
to access information about the web server or alter the server's configuration files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dir_perms_etc_httpd_conf:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_file_permissions_httpd_server_conf_files" selected="false" severity="low">
<ns10:title xml:lang="en-US">Set Permissions on All Configuration Files Inside /etc/httpd/conf/</ns10:title>
<ns10:description xml:lang="en-US">
Set permissions on the web server configuration files to 640:
<html:pre>$ sudo chmod 640 /etc/httpd/conf/*</html:pre>
</ns10:description>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">CM-7</ns10:reference>
<ns10:rationale xml:lang="en-US">
Access to the web server's configuration files may allow an unauthorized user or attacker
to access information about the web server or to alter the server's configuration files.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-file_permissions_httpd_server_conf_files:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_dovecot_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Dovecot Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>dovecot</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig dovecot off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running an IMAP or POP3 server provides a network-based
avenue of attack, and should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_dovecot_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_dovecot_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service dovecot
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- dovecot
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_dovecot_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_dovecot_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_dovecot_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall dovecot Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>dovecot</html:code> package can be uninstalled
with the following command:
<html:pre>$ sudo yum erase dovecot</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to make the Dovecot software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure dovecot is removed
package:
name="{{item}}"
state=absent
with_items:
- dovecot
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_dovecot
class remove_dovecot {
package { 'dovecot':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_dovecot_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=dovecot
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_dovecot_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_dovecot_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_enable_ssl" selected="false" severity="low">
<ns10:title xml:lang="en-US">Enable the SSL flag in /etc/dovecot.conf</ns10:title>
<ns10:description xml:lang="en-US">To allow clients to make encrypted connections the <html:code>ssl</html:code>
flag in Dovecot's configuration file needs to be set to <html:code>yes</html:code>.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following line:
<html:pre>ssl = yes</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL encrypt network traffic between the Dovecot server and its clients
protecting user credentials, mail as it is downloaded, and clients may use
SSL certificates to authenticate the server, preventing another system from
impersonating the server.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dovecot_enable_ssl:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_cert" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Dovecot to Use the SSL Certificate file</ns10:title>
<ns10:description xml:lang="en-US">This option tells Dovecot where to find the the mail
server's SSL Certificate.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following
line (<html:i>note: the path below is the default path set by the Dovecot installation. If
you are using a different path, ensure you reference the appropriate file</html:i>):
<html:pre>ssl_cert = </etc/pki/dovecot/certs/dovecot.pem</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL certificates are used by the client to authenticate the identity
of the server, as well as to encrypt credentials and message traffic.
Not using SSL to encrypt mail server traffic could allow unauthorized
access to credentials and mail messages since they are sent in plain
text over the network.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_configure_ssl_key" selected="false" severity="low">
<ns10:title xml:lang="en-US">Configure Dovecot to Use the SSL Key file</ns10:title>
<ns10:description xml:lang="en-US">This option tells Dovecot where to find the the mail
server's SSL Key.
<html:br /><html:br />
Edit <html:code>/etc/dovecot/conf.d/10-ssl.conf</html:code> and add or correct the following
line (<html:i>note: the path below is the default path set by the Dovecot installation. If
you are using a different path, ensure you reference the appropriate file</html:i>):
<html:pre>ssl_key = </etc/pki/dovecot/private/dovecot.pem</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
SSL certificates are used by the client to authenticate the identity
of the server, as well as to encrypt credentials and message traffic.
Not using SSL to encrypt mail server traffic could allow unauthorized
access to credentials and mail messages since they are sent in plain
text over the network.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_dovecot_disable_plaintext_auth" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Plaintext Authentication</ns10:title>
<ns10:description xml:lang="en-US">To prevent Dovecot from attempting plaintext
authentication of clients, edit <html:code>/etc/dovecot/conf.d/10-auth.conf</html:code> and add
or correct the following line:
<html:pre>disable_plaintext_auth = yes</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Using plain text authentication to the mail server could allow an
attacker access to credentials by monitoring network traffic.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-dovecot_disable_plaintext_auth:def:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_smb_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Samba</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>smb</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig smb off</html:pre>
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1436</ns10:reference>
<ns10:rationale xml:lang="en-US">
Running a Samba server provides a network-based avenue of attack, and
should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_smb_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable smb
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_smb_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service smb
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- smb
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_smb_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_smb_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_samba_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall samba Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>samba</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase samba</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to mount directories and file systems to
Windows systems, then this service can be deleted to reduce
the potential attack surface.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove samba
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure samba is removed
package:
name="{{item}}"
state=absent
with_items:
- samba
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_samba
class remove_samba {
package { 'samba':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=samba
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_samba_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_samba_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_samba-common_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Install the Samba Common Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>samba-common</html:code> package should be installed.
The <html:code>samba-common</html:code> package can be installed with the following command:
<html:pre>$ sudo yum install samba-common</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If the samba-common package is not installed, samba cannot be configured.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command install samba-common
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:ansible">- name: Ensure samba-common is installed
package:
name="{{item}}"
state=present
with_items:
- samba-common
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:xccdf:fix:script:puppet">include install_samba-common
class install_samba-common {
package { 'samba-common':
ensure => 'installed',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_samba-common_installed" reboot="false" strategy="enable" system="urn:redhat:anaconda:pre">
package --add=samba-common
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_samba-common_installed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_samba-common_installed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_smb_server_disable_root" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Root Access to SMB Shares</ns10:title>
<ns10:description xml:lang="en-US">Administrators should not use administrator accounts to access
Samba file and printer shares. Disable the root user and the wheel
administrator group:
<html:pre>[<html:i>share</html:i>]
invalid users = root @wheel</html:pre>
If administrator accounts cannot be disabled, ensure that local machine
passwords and Samba service passwords do not match.</ns10:description>
<ns10:rationale xml:lang="en-US">
Typically, administrator access is required when Samba must create user and
machine accounts and shares. Domain member servers and standalone servers may
not need administrator access at all. If that is the case, add the invalid
users parameter to <html:code>[global]</html:code> instead.
</ns10:rationale>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_require_smb_client_signing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Require Client SMB Packet Signing, if using smbclient</ns10:title>
<ns10:description xml:lang="en-US">
To require samba clients running <html:code>smbclient</html:code> to use
packet signing, add the following to the <html:code>[global]</html:code> section
of the Samba configuration file, <html:code>/etc/samba/smb.conf</html:code>:
<html:pre>client signing = mandatory</html:pre>
Requiring samba clients such as <html:code>smbclient</html:code> to use packet
signing ensures they can
only communicate with servers that support packet signing.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Packet signing can prevent
man-in-the-middle attacks which modify SMB packets in
transit.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="require_smb_client_signing" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh">######################################################################
#By Luke "Brisk-OH" Brisk
#luke.brisk@boeing.com or luke.brisk@gmail.com
######################################################################
CLIENTSIGNING=$( grep -ic 'client signing' /etc/samba/smb.conf )
if [ "$CLIENTSIGNING" -eq 0 ]; then
# Add to global section
sed -i 's/\[global\]/\[global\]\n\n\tclient signing = mandatory/g' /etc/samba/smb.conf
else
sed -i 's/[[:blank:]]*client[[:blank:]]signing[[:blank:]]*=[[:blank:]]*no/ client signing = mandatory/g' /etc/samba/smb.conf
fi
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-require_smb_client_signing:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-require_smb_client_signing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_mount_option_smb_client_signing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Require Client SMB Packet Signing, if using mount.cifs</ns10:title>
<ns10:description xml:lang="en-US">Require packet signing of clients who mount Samba
shares using the <html:code>mount.cifs</html:code> program (e.g., those who specify shares
in <html:code>/etc/fstab</html:code>). To do so, ensure signing options (either
<html:code>sec=krb5i</html:code> or <html:code>sec=ntlmv2i</html:code>) are used.
<html:br /><html:br />
See the <html:code>mount.cifs(8)</html:code> man page for more information. A Samba
client should only communicate with servers who can support SMB
packet signing.
</ns10:description>
<ns10:rationale xml:lang="en-US">
Packet signing can prevent man-in-the-middle
attacks which modify SMB packets in transit.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-mount_option_smb_client_signing:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-mount_option_smb_client_signing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_squid_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable Squid</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>squid</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig squid off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running proxy server software provides a network-based avenue
of attack, and should be removed if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_squid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable squid
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_squid_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service squid
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- squid
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_squid_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_squid_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_squid_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall squid Package</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>squid</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase squid</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to make the proxy server software available,
removing it provides a safeguard against its activation.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_squid_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_squid_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_snmpd_disabled" selected="false" severity="low">
<ns10:title xml:lang="en-US">Disable snmpd Service</ns10:title>
<ns10:description xml:lang="en-US">
The <html:code>snmpd</html:code> service can be disabled with the following command:
<html:pre>$ sudo chkconfig snmpd off</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Running SNMP software provides a network-based avenue of attack, and
should be disabled if not needed.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="service_snmpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_service_command" use="legacy" />
service_command disable snmpd
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="service_snmpd_disabled" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Disable service snmpd
service:
name="{{item}}"
enabled="no"
state="stopped"
with_items:
- snmpd
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-service_snmpd_disabled:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-service_snmpd_disabled_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_net-snmp_removed" selected="false" severity="low">
<ns10:title xml:lang="en-US">Uninstall net-snmp Package</ns10:title>
<ns10:description xml:lang="en-US">The <html:code>net-snmp</html:code> package provides the snmpd service.
The <html:code>net-snmp</html:code> package can be removed with the following command:
<html:pre>$ sudo yum erase net-snmp</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
If there is no need to run SNMP server software,
removing the package provides a safeguard against its
activation.
</ns10:rationale>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:sh"><ns10:sub idref="xccdf_org.ssgproject.content_value_function_package_command" use="legacy" />
package_command remove net-snmp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:ansible">- name: Ensure net-snmp is removed
package:
name="{{item}}"
state=absent
with_items:
- net-snmp
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:xccdf:fix:script:puppet">include remove_net-snmp
class remove_net-snmp {
package { 'net-snmp':
ensure => 'purged',
}
}
</ns10:fix>
<ns10:fix complexity="low" disruption="low" id="package_net-snmp_removed" reboot="false" strategy="disable" system="urn:redhat:anaconda:pre">
package -remove=net-snmp
</ns10:fix>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-package_net-snmp_removed:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-package_net-snmp_removed_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_snmpd_use_newer_protocol" selected="false" severity="medium">
<ns10:title xml:lang="en-US">Configure SNMP Service to Use Only SNMPv3 or Newer </ns10:title>
<ns10:description xml:lang="en-US">
Edit <html:code>/etc/snmp/snmpd.conf</html:code>, removing any references to <html:code>rocommunity</html:code>, <html:code>rwcommunity</html:code>, or <html:code>com2sec</html:code>.
Upon doing that, restart the SNMP service:
<html:pre>$ sudo service snmpd restart</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Earlier versions of SNMP are considered insecure, as they potentially allow
unauthorized access to detailed system management information.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-snmpd_use_newer_protocol:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-snmpd_use_newer_protocol_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_snmpd_not_default_password" selected="false" severity="high">
<ns10:title xml:lang="en-US">Ensure Default Password Is Not Used</ns10:title>
<ns10:description xml:lang="en-US">
Edit <html:code>/etc/snmp/snmpd.conf</html:code>, remove default community string <html:code>public</html:code>.
Upon doing that, restart the SNMP service:
<html:pre>$ sudo service snmpd restart</html:pre>
</ns10:description>
<ns10:rationale xml:lang="en-US">
Presence of the default SNMP password enables querying of different system
aspects and could result in unauthorized knowledge of the system.
</ns10:rationale>
<ns10:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
<ns10:check-content-ref href="ssg-rhel6-oval.xml" name="oval:ssg-snmpd_not_default_password:def:1" />
</ns10:check>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-snmpd_not_default_password_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_generic" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">42</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">56</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">206</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1084</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">66</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">85</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">86</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">185</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">223</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">171</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">172</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1694</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">770</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">162</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">163</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">164</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">345</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">346</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1096</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1111</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1291</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">386</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">156</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">186</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1083</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1082</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1090</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">804</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1127</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1128</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1129</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1248</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1265</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1314</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1362</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1368</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1310</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1311</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1328</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1399</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1400</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1427</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1499</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1632</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1693</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1665</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1674</ns10:reference>
<ns10:rationale xml:lang="en-US">
Red Hat Enterprise Linux meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_generic_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_auditing" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">130</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">131</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">132</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">133</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">134</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">135</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">159</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">174</ns10:reference>
<ns10:rationale xml:lang="en-US">
The Red Hat Enterprise Linux audit system meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_auditing_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_met_inherently_nonselected" selected="false" severity="low">
<ns10:title xml:lang="en-US">Product Meets this Requirement</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent not a finding. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">34</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">35</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">99</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">154</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">226</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">802</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">872</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1086</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1087</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1089</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1091</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1424</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1426</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1428</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1209</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1214</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1237</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1269</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1338</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1425</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1670</ns10:reference>
<ns10:rationale xml:lang="en-US">
Red Hat Enterprise Linux meets this requirement through design and implementation.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-met_inherently_nonselected_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_nonfinding_nonselected_scope" selected="false" severity="low">
<ns10:title xml:lang="en-US">Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is NA. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">21</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">25</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">28</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">29</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">30</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">165</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">221</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">354</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">553</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">779</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">780</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">781</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1009</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1094</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1123</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1124</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1125</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1132</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1135</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1140</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1141</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1142</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1143</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1145</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1147</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1148</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1166</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1339</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1340</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1341</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1350</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1356</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1373</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1374</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1383</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1391</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1392</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1395</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1662</ns10:reference>
<ns10:rationale xml:lang="en-US">
The guidance does not meet this requirement.
The requirement is impractical or out of scope.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_nonfinding_nonselected_scope_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_finding_nonselected" selected="false" severity="low">
<ns10:title xml:lang="en-US">Implementation of the Requirement is Not Supported</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is a permanent finding and cannot be fixed. An appropriate
mitigation for the system must be implemented but this finding cannot be
considered fixed.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">20</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">31</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">52</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">144</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1158</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1294</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1295</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1500</ns10:reference>
<ns10:rationale xml:lang="en-US">
RHEL6 does not support this requirement.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_finding_nonselected_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_unmet_nonfinding_scope" selected="false" severity="low">
<ns10:title xml:lang="en-US">Guidance Does Not Meet this Requirement Due to Impracticality or Scope</ns10:title>
<ns10:description xml:lang="en-US">
This requirement is NA. No fix is required.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">15</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">27</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">218</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">219</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">371</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">372</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">535</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">537</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">539</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1682</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">370</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">37</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">24</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1112</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1126</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1143</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1149</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1157</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1159</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1210</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1211</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1274</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1372</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1376</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1377</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1352</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1401</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1555</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1556</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1150</ns10:reference>
<ns10:rationale xml:lang="en-US">
The guidance does not meet this requirement.
The requirement is impractical or out of scope.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-unmet_nonfinding_scope_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
<ns10:Rule id="xccdf_org.ssgproject.content_rule_update_process" selected="false" severity="low">
<ns10:title xml:lang="en-US">A process for prompt installation of OS updates must exist.</ns10:title>
<ns10:description xml:lang="en-US">
Procedures to promptly apply software updates must be established and
executed. The Red Hat operating system provides support for automating such a
process, by running the yum program through a cron job or by managing the
system and its packages through the Red Hat Network or a Satellite Server.
</ns10:description>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">1232</ns10:reference>
<ns10:rationale xml:lang="en-US">
This is a manual inquiry about update procedure.
</ns10:rationale>
<ns10:check system="http://scap.nist.gov/schema/ocil/2">
<ns10:check-content-ref href="ssg-rhel6-ocil.xml" name="ocil:ssg-update_process_ocil:questionnaire:1" />
</ns10:check>
</ns10:Rule>
</ns10:Group></ns10:Benchmark>
</ns0:component>
<ns0:component id="scap_org.open-scap_comp_output--ssg-rhel6-cpe-oval.xml" timestamp="2017-08-11T21:23:29"><ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<ns3:generator>
<ns5:product_name>python</ns5:product_name>
<ns5:product_version>2.7.13+</ns5:product_version>
<ns5:schema_version>5.11</ns5:schema_version>
<ns5:timestamp>2017-08-11T21:23:24</ns5:timestamp>
</ns3:generator>
<ns3:definitions><ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos6:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:6" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 6</ns3:description>
</ns3:metadata>
<ns3:criteria>
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS6 is installed" test_ref="oval:ssg-test_centos6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_centos7:def:1" version="2">
<ns3:metadata>
<ns3:title>CentOS 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:centos:centos:7" source="CPE" />
<ns3:description>The operating system installed on the system is
CentOS 7</ns3:description>
</ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="CentOS7 is installed" test_ref="oval:ssg-test_centos7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_fedora:def:1" version="3">
<ns3:metadata>
<ns3:title>Installed operating system is Fedora</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:22" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:23" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:24" source="CPE" />
<ns3:reference ref_id="cpe:/o:fedoraproject:fedora:25" source="CPE" />
<ns3:description>The operating system installed on the system is Fedora</ns3:description>
</ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="fedora-release RPM package is installed" test_ref="oval:ssg-test_fedora_release_rpm:tst:1" />
<ns3:criterion comment="CPE vendor is 'fedoraproject' and product is 'fedora'" test_ref="oval:ssg-test_fedora_vendor_product:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
<ns3:metadata>
<ns3:title>Installed operating system is part of the Unix family</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:description>The operating system installed on the system is part of the Unix OS family</ns3:description>
</ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_family:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel6:def:1" version="2">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 6</ns3:description>
</ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 6 Workstation is installed" test_ref="oval:ssg-test_rhel_workstation:tst:1" />
<ns3:criterion comment="RHEL 6 Server is installed" test_ref="oval:ssg-test_rhel_server:tst:1" />
<ns3:criterion comment="RHEL 6 Compute Node is installed" test_ref="oval:ssg-test_rhel_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_rhel7:def:1" version="1">
<ns3:metadata>
<ns3:title>Red Hat Enterprise Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:redhat:enterprise_linux:7" source="CPE" />
<ns3:description>The operating system installed on the system is
Red Hat Enterprise Linux 7</ns3:description>
</ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_rhel7_unix_family:tst:1" />
<ns3:criteria operator="OR">
<ns3:criterion comment="RHEL 7 Workstation is installed" test_ref="oval:ssg-test_rhel7_workstation:tst:1" />
<ns3:criterion comment="RHEL 7 Server is installed" test_ref="oval:ssg-test_rhel7_server:tst:1" />
<ns3:criterion comment="RHEL 7 Compute Node is installed" test_ref="oval:ssg-test_rhel7_computenode:tst:1" />
</ns3:criteria>
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl6:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 6</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 6</ns3:description>
</ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 6 is installed" test_ref="oval:ssg-test_sl6:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_sl7:def:1" version="2">
<ns3:metadata>
<ns3:title>Scientific Linux 7</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:scientificlinux:scientificlinux:6" source="CPE" />
<ns3:description>The operating system installed on the system is
Scientific Linux 7</ns3:description>
</ns3:metadata>
<ns3:criteria operator="AND">
<ns3:extend_definition comment="Installed OS is part of the Unix family" definition_ref="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" />
<ns3:criterion comment="Scientific Linux 7 is installed" test_ref="oval:ssg-test_sl7:tst:1" />
</ns3:criteria>
</ns3:definition>
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_wrlinux:def:1" version="1">
<ns3:metadata>
<ns3:title>WRLinux</ns3:title>
<ns3:affected family="unix">
</ns3:affected>
<ns3:reference ref_id="cpe:/o:windriver:wrlinux" source="CPE" />
<ns3:description>The operating system installed on the system is
Wind River Linux</ns3:description>
</ns3:metadata>
<ns3:criteria>
<ns3:criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg-test_unix_wrlinux:tst:1" />
<ns3:criterion comment="WRLinux is installed" test_ref="oval:ssg-test_wrlinux:tst:1" />
</ns3:criteria>
</ns3:definition>
</ns3:definitions><ns3:tests><ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 6" id="oval:ssg-test_centos6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos6:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="centos-release is version 7" id="oval:ssg-test_centos7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_centos7:obj:1" />
<ns8:state state_ref="oval:ssg-state_centos7:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="only_one_exists" comment="fedora-release RPM package is installed" id="oval:ssg-test_fedora_release_rpm:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_fedora_release_rpm:obj:1" />
</ns8:rpminfo_test>
<ns7:textfilecontent54_test check="all" comment="CPE vendor is 'fedoraproject' and 'product' is fedora" id="oval:ssg-test_fedora_vendor_product:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_fedora_vendor_product:obj:1" />
</ns7:textfilecontent54_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="Test installed OS is part of the unix family" id="oval:ssg-test_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 6" id="oval:ssg-test_rhel_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 6" id="oval:ssg-test_rhel_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 6" id="oval:ssg-test_rhel_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel_computenode:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_rhel7_unix_family:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_rhel7_unix_family:obj:1" />
<ns7:state state_ref="oval:ssg-state_rhel7_unix_family:ste:1" />
</ns7:family_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-workstation is version 7" id="oval:ssg-test_rhel7_workstation:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_workstation:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_workstation:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-server is version 7" id="oval:ssg-test_rhel7_server:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_server:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_server:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="redhat-release-computenode is version 7" id="oval:ssg-test_rhel7_computenode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_rhel7_computenode:obj:1" />
<ns8:state state_ref="oval:ssg-state_rhel7_computenode:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 6" id="oval:ssg-test_sl6:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl6:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl6:ste:1" />
</ns8:rpminfo_test>
<ns8:rpminfo_test check="all" check_existence="at_least_one_exists" comment="sl-release is version 7" id="oval:ssg-test_sl7:tst:1" version="1">
<ns8:object object_ref="oval:ssg-obj_sl7:obj:1" />
<ns8:state state_ref="oval:ssg-state_sl7:ste:1" />
</ns8:rpminfo_test>
<ns7:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg-test_unix_wrlinux:tst:1" version="1">
<ns7:object object_ref="oval:ssg-obj_unix_wrlinux:obj:1" />
<ns7:state state_ref="oval:ssg-state_unix_wrlinux:ste:1" />
</ns7:family_test>
<ns6:file_test check="all" check_existence="at_least_one_exists" comment="Test presence of /etc/wrlinux-release." id="oval:ssg-test_wrlinux:tst:1" version="1">
<ns6:object object_ref="oval:ssg-obj_test_wrlinux:obj:1" />
</ns6:file_test>
</ns3:tests><ns3:objects><ns8:rpminfo_object id="oval:ssg-obj_centos6:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_centos7:obj:1" version="1">
<ns8:name>centos-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-object_fedora_release_rpm:obj:1" version="1">
<ns8:name>fedora-release</ns8:name>
</ns8:rpminfo_object>
<ns7:textfilecontent54_object id="oval:ssg-object_fedora_vendor_product:obj:1" version="1">
<ns7:filepath>/etc/system-release-cpe</ns7:filepath>
<ns7:pattern operation="pattern match">^cpe:\/o:fedoraproject:fedora:[\d]+$</ns7:pattern>
<ns7:instance datatype="int" operation="equals">1</ns7:instance>
</ns7:textfilecontent54_object>
<ns7:family_object id="oval:ssg-object_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_rhel7_unix_family:obj:1" version="1" />
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_workstation:obj:1" version="1">
<ns8:name>redhat-release-workstation</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_server:obj:1" version="1">
<ns8:name>redhat-release-server</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_rhel7_computenode:obj:1" version="1">
<ns8:name>redhat-release-computenode</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl6:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns8:rpminfo_object id="oval:ssg-obj_sl7:obj:1" version="1">
<ns8:name>sl-release</ns8:name>
</ns8:rpminfo_object>
<ns7:family_object id="oval:ssg-obj_unix_wrlinux:obj:1" version="1" />
<ns6:file_object id="oval:ssg-obj_test_wrlinux:obj:1" version="1">
<ns6:filepath>/etc/wrlinux-release</ns6:filepath>
</ns6:file_object>
</ns3:objects><ns3:states><ns8:rpminfo_state id="oval:ssg-state_centos6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_centos7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_server:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_rhel7_unix_family:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_workstation:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_server:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_rhel7_computenode:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl6:ste:1" version="1">
<ns8:version operation="pattern match">^6.*$</ns8:version>
</ns8:rpminfo_state>
<ns8:rpminfo_state id="oval:ssg-state_sl7:ste:1" version="1">
<ns8:version operation="pattern match">^7.*$</ns8:version>
</ns8:rpminfo_state>
<ns7:family_state id="oval:ssg-state_unix_wrlinux:ste:1" version="1">
<ns7:family>unix</ns7:family>
</ns7:family_state>
</ns3:states></ns3:oval_definitions></ns0:component><ns0:component id="scap_org.open-scap_comp_output--ssg-rhel6-cpe-dictionary.xml" timestamp="2017-08-11T21:23:29"><ns13:cpe-list xsi:schemaLocation="http://cpe.mitre.org/dictionary/2.0 http://cpe.mitre.org/files/cpe-dictionary_2.1.xsd">
<ns13:cpe-item name="cpe:/o:redhat:enterprise_linux:6">
<ns13:title xml:lang="en-us">Red Hat Enterprise Linux 6</ns13:title>
<ns13:check href="ssg-rhel6-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_rhel6:def:1</ns13:check>
</ns13:cpe-item>
<ns13:cpe-item name="cpe:/o:redhat:enterprise_linux:6::client">
<ns13:title xml:lang="en-us">Red Hat Enterprise Linux 6 Client</ns13:title>
<ns13:check href="ssg-rhel6-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_rhel6:def:1</ns13:check>
</ns13:cpe-item>
<ns13:cpe-item name="cpe:/o:redhat:enterprise_linux:6::computenode">
<ns13:title xml:lang="en-us">Red Hat Enterprise Linux 6 ComputeNode</ns13:title>
<ns13:check href="ssg-rhel6-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_rhel6:def:1</ns13:check>
</ns13:cpe-item>
<ns13:cpe-item name="cpe:/o:centos:centos:6">
<ns13:title xml:lang="en-us">CentOS 6</ns13:title>
<ns13:check href="ssg-rhel6-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_centos6:def:1</ns13:check>
</ns13:cpe-item>
<ns13:cpe-item name="cpe:/o:scientificlinux:scientificlinux:6">
<ns13:title xml:lang="en-us">Scientific Linux 6</ns13:title>
<ns13:check href="ssg-rhel6-cpe-oval.xml" system="http://oval.mitre.org/XMLSchema/oval-definitions-5">oval:ssg-installed_OS_is_sl6:def:1</ns13:check>
</ns13:cpe-item>
</ns13:cpe-list></ns0:component></ns0:data-stream-collection>
|