From shawn at redhat.com Thu Aug 20 11:31:59 2015 Content-Type: multipart/mixed; boundary="===============6014984688718892049==" MIME-Version: 1.0 From: Shawn Wells To: scap-security-guide at lists.fedorahosted.org Subject: Re: [PATCH 2/2] linebreak removals from sessions file Date: Thu, 16 Aug 2012 19:41:19 -0400 Message-ID: <502D851F.4050803@redhat.com> In-Reply-To: 1345155910-10377-3-git-send-email-blank@eclipse.ncsc.mil --===============6014984688718892049== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable On 8/16/12 6:25 PM, Jeffrey Blank wrote: > Signed-off-by: Jeffrey Blank > --- > RHEL6/input/system/accounts/session.xml | 43 ++++++++----------------= ------- > 1 files changed, 11 insertions(+), 32 deletions(-) > > diff --git a/RHEL6/input/system/accounts/session.xml b/RHEL6/input/system= /accounts/session.xml > index a96cb79..66d9263 100644 > --- a/RHEL6/input/system/accounts/session.xml > +++ b/RHEL6/input/system/accounts/session.xml > @@ -1,9 +1,6 @@ > > - > -Secure Session Configuration Files for Login Accounts > - > - > -When a user logs into a Unix account, the system > +Secure Session Configuration Files for Login Accounts > +When a user logs into a Unix account, the system > configures the user's session by reading a number of files. Many of > these files are located in the user's home directory, and may have > weak permissions as a result of user error or misconfiguration. If > @@ -12,9 +9,7 @@ configuration information, he can often gain full access= to the > affected user's account. Therefore, it is important to test and > correct configuration file permissions for interactive accounts, > particularly those of privileged users such as root or system > -administrators. > - > - > +administrators. > = > operator=3D"equals" interactive=3D"0"> > @@ -28,9 +23,7 @@ operator=3D"equals" interactive=3D"0"> > > = > > - > -Set the number of concurrent login sessions allowed per user > - > +Set the number of concurrent login sessions allowed per user</tit= le> > <description> > Limiting the number of allowed users and sessions per user can limit ri= sks related to Denial of > Service attacks. This addresses concurrent sessions for a single accoun= t and does not address > @@ -70,9 +63,7 @@ privileged commands by typing the full path to the > command.</description> > = > <Rule id=3D"root_path_no_dot"> > -<title> > -Ensure that Root's Path Does Not Include Relative Paths or Null Director= ies > - > +Ensure that Root's Path Does Not Include Relative Paths or Null D= irectories > > Ensure that none of the directories in root's path is equal to a single > . character, or > @@ -94,9 +85,7 @@ execute code from an untrusted location. > > = > > - > -Ensure that Root's Path Does Not Include World or Group-Writable Directo= ries > - > +Ensure that Root's Path Does Not Include World or Group-Writable = Directories > > For each element in root's path, run: >
# ls -ld DIR
> @@ -115,9 +104,7 @@ and potentially malicious code. >
> = > > - > -Ensure that User Home Directories are not Group-Writable or World-Readab= le > - > +Ensure that User Home Directories are not Group-Writable or World= -Readable > For each human user USER of the system, view the > permissions of the user's home directory: >
# ls -ld /home/USER
> @@ -201,9 +188,7 @@ operator=3D"equals" interactive=3D"0"> > > = > > - > -Ensure the Default Bash Umask is Set Correctly > - > +Ensure the Default Bash Umask is Set Correctly > > To ensure the default umask for users of the Bash shell is set properly, > add or correct in /etc/bashrc the line: > @@ -218,9 +203,7 @@ written to by unauthorized users. > > = > > - > -Ensure the Default C Shell Umask is Set Correctly > - > +Ensure the Default C Shell Umask is Set Correctly > > To ensure the default umask for users of the C shell is set properly, > add or correct in /etc/csh.cshrc the line: > @@ -236,9 +219,7 @@ written to by unauthorized users. > = > = > > - > -Ensure the Default Umask is Set Correctly in /etc/profile > - > +Ensure the Default Umask is Set Correctly in /etc/profile > > To ensure the default umask controlled by /etc/profile is set = properly, > add or correct the line: > @@ -254,9 +235,7 @@ written to by unauthorized users. > = > = > > - > -Ensure the Default Umask is Set Correctly in login.defs > - > +Ensure the Default Umask is Set Correctly in login.defs > > To ensure the default umask controlled by /etc/login.defs is s= et properly, > add or correct the line: Ack -- = Shawn Wells Technical Director, U.S. Intelligence Programs (e) shawn(a)redhat.com (c) 443.534.0130 --===============6014984688718892049==--