-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal : ADDING networkfirewall_test #112
Proposal : ADDING networkfirewall_test #112
Conversation
…TEST and NETWORKFIREWALL_TEST to Linux/Unix OVAL schema
@ebouillard at a first, quick look, this looks pretty good! One change I'd ask you to make would be to move the specification of the I'll take a deeper look into the elements and functionality as well and hopefully have some more feedback for you soon! Thanks for the proposal! |
Hi @ebouillard, I've cursorily examined your submission. First, I would like to thank you for this contribution. We absolutely want and value the input of individuals such as yourself, and welcome these kinds of contributions. The new auditctl-based test looks pretty good to me, and I will try to implement it in the next week or so if possible (which will give me the opportunity to dig much deeper), but the unix:networkfirewall test needs some work. Placing a test in the Unix schema means it probably applies to FreeBSD, macOS, AIX, Solaris, HP-UX and Linux. Although the problem of querying for firewall rules is certainly generic enough, there is no consistently-available software firewall management mechanism available across all those platforms (at least, not that I am aware of). For example, I know of the So, I think it would make more sense to define, e.g., a linux:iptables test, an aix:packetfilter test, etc. Additionally, some of the annotations look to have been copied and pasted, as they refer to auditctl entities. Also as @wmunyan noted, the EntityItemPacketDirectionType and EntityItemFilteringActionType types belong in a system-characteristics schema, not a definitions schema. |
I would say that splitting these two proposals into two separate issues (and PRs) would be helpful for understanding and fruitful discussion about each of these cases. I agree with David regarding the firewall test. In Linux, for example, there are at least iptables and nftables. Also there is an ongoing effort to unify firewalling with bpf (https://lwn.net/Articles/747551/). |
Thanks everyone for your feedback. @solind I have a member of my team who is currently working on the implementation of the auditctl-based test. I will ask him to join the discussion if you want to discuss about this implementation. |
Hello, I am currently working on an openscap implementation of auditdline. |
@ebouillard please split the |
…tityItemFilteringActionType out of the unix-definition-schema and into the unix-system-characteristics-schema, and kicking auditdline_test from this branch to put it in a separate one
So, the PR in the OpenSCAP repo (OpenSCAP/openscap#1724) sheds some light on the goals and implementation details that are not present in this proposal. First of all it is for The implementation does use
Also, the real nft configuration file is not JSON:
It would be interesting to have the ability to work with the offline configuration in addition to the test with |
@ebouillard can you follow up on this PR so that we may take some action? If we don't reach a resolution within 14 days (we're resetting the consensus period clock), then we'll close this PR. |
@evgenyz thank you for your feedback. |
@ebouillard Well, |
@evgenyz Ok so the guideline regarding schema implementation is to make simple tests related to a specific technology like iptable/nftable (just an example), even if the same informations could be retrieved with these two ? |
Yep, pretty much. It would make it easier for different scanners to implement tests selectively and also to make these tests as simple as possible. |
@evgenyz I think we should close this PR. This test is too far from what is currently implemented in OVAL. |
This publication is made by Sopra Steria France.
The following tests were initially authored by French Ministry of Army (DGA-MI).
The auditdline_test is used to check the living rules of the auditd service.
The networkfirewall_test is used to check the living filtering rules of the network firewall on a UNIX system.
Related issue : #111