Open marcofortina opened 7 months ago
for firewall rules you will need to use a tailoring file to select the firewall you want. By default the profile is enabled for nftables only.
for firewall rules you will need to use a tailoring file to select the firewall you want. By default the profile is enabled for nftables only.
Hello! Could you please explain as to use a tailoring file?
Thanks
for firewall rules you will need to use a tailoring file to select the firewall you want. By default the profile is enabled for nftables only.
Hello! Could you please explain as to use a tailoring file?
Thanks
you can either use scap-workbench or use autotailor for more information see: https://github.com/OpenSCAP/openscap/blob/main/docs/manual/manual.adoc#61-creating-tailoring-files
for firewall rules you will need to use a tailoring file to select the firewall you want. By default the profile is enabled for nftables only.
Hello! Could you please explain as to use a tailoring file? Thanks
you can either use scap-workbench or use autotailor for more information see: https://github.com/OpenSCAP/openscap/blob/main/docs/manual/manual.adoc#61-creating-tailoring-files
Could you please guide me to do this writing a step-by-step procedure for dummies?
Thanks
for firewall rules you will need to use a tailoring file to select the firewall you want. By default the profile is enabled for nftables only.
Hello! Could you please explain as to use a tailoring file? Thanks
you can either use scap-workbench or use autotailor for more information see: https://github.com/OpenSCAP/openscap/blob/main/docs/manual/manual.adoc#61-creating-tailoring-files
Could you please guide me to do this writing a step-by-step procedure for dummies?
Thanks
You will need to install openscap-utils in a newer release of ubuntu for that as the tool is only packaged in openscap 1.3.
Then you can:
$ autotailor --select package_ufw_installed --select service_nftables_disabled --select package_nftables_removed --unselect package_nftables_installed --unselect package_ufw_removed --output csl2.xml -p xccdf_org.ssgproject.content_profile_cis_level2_server_customized ssg-ubuntu2204-ds.xml xccdf_org.ssgproject.content_profile_cis_level2_server
That generates a csl2.xml
file that you can use with oscap.
With that you can follow https://github.com/OpenSCAP/openscap/blob/main/docs/manual/manual.adoc#using-tailoring-files
Description of problem:
CIS Ubuntu Linux 22.04 LTS Benchmark offers the option to use any of ufw, nftables or iptables, but if you choose to use ufw as your system firewall, all checks give incorrect results.
SCAP Security Guide Version:
master branch
Operating System Version:
Ubuntu 22.04 LTS
Steps to Reproduce:
oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis_level2_server ssg-ubuntu2204-ds.xml
Actual Results:
Expected Results:
Additional Information/Debugging Steps:
PR #10812 Fixed checks on rhel-like using firewalld, but not on debian-like using Uncomplicated Firewall.