Skip to content

Excessive FIPS checks #4917

Closed
Closed
@chuckatkins

Description

@chuckatkins

Many of the FIPS related rules unnecessarily check whether or not the installed OS is FIPS certified.

For example, take the rule to check whether AIDE is configured to use FIPS 140-2 hashes. The criteria are:

<oval:criteria operator="AND">
  <oval:extend_definition comment="Installed OS is FIPS certified" definition_ref="oval:ssg-installed_OS_is_FIPS_certified:def:1"/>
  <oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
  <oval:criterion comment="non-FIPS hashes are not configured" test_ref="oval:ssg-test_aide_non_fips_hashes:tst:1"/>
  <oval:criterion comment="FIPS hashes are configured" test_ref="oval:ssg-test_aide_use_fips_hashes:tst:1"/>
</oval:criteria>

Whether or not the OS is FIPS certified is orthogonal to whether or not the FIPS approved algorithms are being used.

This is problematic when evaluating benchmarks on CentOS since it's not RHEL proper and thus not FIPS certified. Certainly it should fail the"Installed OS is FIPS certified" test, which is it's own stand alone rule, but that shouldn't preclude validation that various crypto components like ssh and AIDE use FIPS approved crypto algorithms and hashes.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions