<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:ind="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:unix="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:linux="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd   http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd   http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd   http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd   http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
  <generator>
    <oval:product_name>python</oval:product_name>
    <oval:product_version>2.6.6</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2011-09-21T13:44:00</oval:timestamp>
  </generator>
  <definitions>

    <definition class="compliance" id="oval:ssg:def:10101" version="1">
       <metadata>
          <title>Check for the existence of any non-Red Hat signed packages</title>
	  <description>This definition is intended to evalutate to true if there are any packages installed on the system that are not signed by Red Hat.</description>
       </metadata>
      <criteria>
         <criterion comment="Check for the existence of any non-Red Hat signed packages." test_ref="oval:ssg:tst:10101"/>
      </criteria>
    </definition>

    <definition class="compliance" id="oval:ssg:def:110" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv6.conf.default.accept_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv6.conf.default.accept_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv6_conf_default_accept_redirects"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg:def:111"/>
        <criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to 0" test_ref="oval:ssg:tst:112"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:113" version="1">
      <metadata>
        <title>Disallow inbound firewall access to the SSH Server port.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>If inbound SSH access is not needed, the firewall should disallow or reject access to
      the SSH port (22).</description>
      <reference source="ssg" ref_id="iptables_sshd_disabled"/></metadata>
      <criteria operator="AND">
        <criterion comment="Test ipv4 port 22 Deny" test_ref="oval:ssg:tst:114"/>
        <criterion comment="Test ipv6 port 22 Deny" test_ref="oval:ssg:tst:115"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:116" version="1">
      <metadata>
        <title>Service irqbalance Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The irqbalance service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_irqbalance_enabled"/></metadata>
      <criteria comment="package irqbalance installed and service irqbalance is configured to start" operator="AND">
        <extend_definition comment="irqbalance installed" definition_ref="oval:ssg:def:117"/>
        <criteria operator="OR" comment="service irqbalance is configured to start">
          <criterion comment="irqbalance runlevel 0" test_ref="oval:ssg:tst:118"/>
          <criterion comment="irqbalance runlevel 1" test_ref="oval:ssg:tst:119"/>
          <criterion comment="irqbalance runlevel 2" test_ref="oval:ssg:tst:120"/>
          <criterion comment="irqbalance runlevel 3" test_ref="oval:ssg:tst:121"/>
          <criterion comment="irqbalance runlevel 4" test_ref="oval:ssg:tst:122"/>
          <criterion comment="irqbalance runlevel 5" test_ref="oval:ssg:tst:123"/>
          <criterion comment="irqbalance runlevel 6" test_ref="oval:ssg:tst:124"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:125" version="1">
      <metadata>
        <title>Service httpd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The httpd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_httpd_disabled"/></metadata>
      <criteria comment="package httpd removed or service httpd is not configured to start" operator="OR">
        <extend_definition comment="httpd removed" definition_ref="oval:ssg:def:126"/>
        <criteria operator="AND" comment="service httpd is not configured to start">
          <criterion comment="httpd runlevel 0" test_ref="oval:ssg:tst:127"/>
          <criterion comment="httpd runlevel 1" test_ref="oval:ssg:tst:128"/>
          <criterion comment="httpd runlevel 2" test_ref="oval:ssg:tst:129"/>
          <criterion comment="httpd runlevel 3" test_ref="oval:ssg:tst:130"/>
          <criterion comment="httpd runlevel 4" test_ref="oval:ssg:tst:131"/>
          <criterion comment="httpd runlevel 5" test_ref="oval:ssg:tst:132"/>
          <criterion comment="httpd runlevel 6" test_ref="oval:ssg:tst:133"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:134" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.default.secure_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.default.secure_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_default_secure_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to 0" test_ref="oval:ssg:tst:135"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:136" version="1">
      <metadata>
        <title>Confirm Existence and Permissions of System Log
      Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All syslog log files should be owned by the
      appropriate group.</description>
      <reference source="ssg" ref_id="rsyslog_files_groupownership"/></metadata>
      <criteria>
        <criterion comment="check if group root owns all syslog log files" test_ref="oval:ssg:tst:137"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:138" version="1">
      <metadata>
        <title>Limit Password Reuse</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The passwords to remember should be set correctly.</description>
      <reference source="ssg" ref_id="accounts_password_reuse_limit"/></metadata>
      <criteria>
        <criterion comment="remember parameter is set to 0" test_ref="oval:ssg:tst:139"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:140" version="1">
      <metadata>
        <title>Implement idle activation of screen saver</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Idle activation of the screen saver should be enabled.</description>
      <reference source="ssg" ref_id="gconf_gnome_screensaver_idle_activation_enabled"/></metadata>
      <criteria>
        <criterion comment="gnome screensaver is activated on idle" test_ref="oval:ssg:tst:141"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:142" version="1">
      <metadata>
        <title>Disable rds Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module rds should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_rds_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:143" comment="kernel module rds disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:144" version="1">
      <metadata>
        <title>Bind Mount /var/tmp To /tmp</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /var/tmp directory should be bind mounted to /tmp
      in order to consolidate temporary storage into one location protected by the same
      techniques as /tmp.</description>
      <reference source="ssg" ref_id="mount_option_var_tmp_bind"/></metadata>
      <criteria>
        <criterion comment="Unknown test stub" test_ref="oval:ssg:tst:145"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:146" version="1">
      <metadata>
        <title>Service avahi-daemon Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The avahi-daemon service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_avahi-daemon_disabled"/></metadata>
      <criteria operator="AND" comment="service avahi-daemon is not configured to start">
        <criterion comment="avahi-daemon runlevel 0" test_ref="oval:ssg:tst:147"/>
        <criterion comment="avahi-daemon runlevel 1" test_ref="oval:ssg:tst:148"/>
        <criterion comment="avahi-daemon runlevel 2" test_ref="oval:ssg:tst:149"/>
        <criterion comment="avahi-daemon runlevel 3" test_ref="oval:ssg:tst:150"/>
        <criterion comment="avahi-daemon runlevel 4" test_ref="oval:ssg:tst:151"/>
        <criterion comment="avahi-daemon runlevel 5" test_ref="oval:ssg:tst:152"/>
        <criterion comment="avahi-daemon runlevel 6" test_ref="oval:ssg:tst:153"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:154" version="1">
      <metadata>
        <title>Disable Zeroconf Networking</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Disable Zeroconf automatic route assignment in
      the 169.245.0.0 subnet.</description>
      <reference source="ssg" ref_id="sysconfig_nozeroconf_yes"/></metadata>
      <criteria>
        <criterion comment="Look for NOZEROCONF=yes in /etc/sysconfig/network" test_ref="oval:ssg:tst:155"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:156" version="1">
      <metadata>
        <title>Add noexec Option to Removable Media Partitions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The noexec mount option prevents the direct
      execution of binaries on the mounted filesystem. Users should not
      be allowed to execute binaries that exist on partitions mounted
      from removable media (such as a USB key). The noexec
      option prevents code from being executed directly from the media
      itself, and may therefore provide a line of defense against
      certain types of worms or malicious code.</description>
      <reference source="ssg" ref_id="mount_option_noexec_removable_partitions"/></metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:ssg:tst:157" comment="noexec on removable partition"/>
        <criterion test_ref="oval:ssg:tst:158" comment="removable partition /etc/fstab"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:159" version="1">
      <metadata>
        <title>Ensure auditd Collects Information on the Use of
      Privileged Commands</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules about the Information on the Use of
      Privileged Commands are enabled</description>
      <reference source="ssg" ref_id="audit_rules_privileged_commands"/></metadata>
      <criteria>
        <criterion comment="/etc/audit/audit.rules contains -a always,exit -F path=/bin/ping -F perm=x -F auid&gt;=500 -F auid!=4294967295 -k privileged" test_ref="oval:ssg:tst:160"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:161" version="1">
      <metadata>
        <title>Confirm Existence and Permissions of System Log
      Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>File permissions for all syslog log files should
      be set correctly.</description>
      <reference source="ssg" ref_id="rsyslog_files_permissions"/></metadata>
      <criteria>
        <criterion comment="check permissions of all syslog log files" test_ref="oval:ssg:tst:162"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:163" version="1">
      <metadata>
        <title>Package iputils Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package iputils should be removed.</description>
      <reference source="ssg" ref_id="package_iputils_removed"/></metadata>
      <criteria>
        <criterion comment="package iputils is removed" test_ref="oval:ssg:tst:164"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:165" version="1">
      <metadata>
        <title>Verify that Shared Library Files Have Root Ownership</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and objects therein, are owned by root</description>
      <reference source="ssg" ref_id="file_ownership_library_dirs"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:166"/>
        <criterion test_ref="oval:ssg:tst:167"/>
        <criterion test_ref="oval:ssg:tst:168"/>
        <criterion test_ref="oval:ssg:tst:169"/>
        <criterion test_ref="oval:ssg:tst:170"/>
        <criterion test_ref="oval:ssg:tst:171"/>
        <criterion test_ref="oval:ssg:tst:172"/>
        <criterion test_ref="oval:ssg:tst:173"/>
        <criterion test_ref="oval:ssg:tst:174"/>
        <criterion test_ref="oval:ssg:tst:175"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:176" version="1">
      <metadata>
        <title>Disable bluetooth Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module bluetooth should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_bluetooth_disabled"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:177" comment="kernel module bluetooth disabled"/>
        <criterion test_ref="oval:ssg:tst:178" comment="kernel module net-pf-31 disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:179" version="1">
      <metadata>
        <title>Package tftp-server Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package tftp-server should be removed.</description>
      <reference source="ssg" ref_id="package_tftp-server_removed"/></metadata>
      <criteria>
        <criterion comment="package tftp-server is removed" test_ref="oval:ssg:tst:180"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:181" version="1">
      <metadata>
        <title>Package sendmail Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package sendmail should be removed.</description>
      <reference source="ssg" ref_id="package_sendmail_removed"/></metadata>
      <criteria>
        <criterion comment="package sendmail is removed" test_ref="oval:ssg:tst:182"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:183" version="1">
      <metadata>
        <title>Ensure that Users Have Sensible Umask Values in
      /etc/profile</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The default umask for all users should be set
      correctly</description>
      <reference source="ssg" ref_id="accounts_umask_etc_profile"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:184"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:185" version="1">
      <metadata>
        <title>Package iptables-ipv6 Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package iptables-ipv6 should be installed.</description>
      <reference source="ssg" ref_id="package_iptables-ipv6_installed"/></metadata>
      <criteria>
        <criterion comment="package iptables-ipv6 is installed" test_ref="oval:ssg:tst:186"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:187" version="1">
      <metadata>
        <title>Verify that All World-Writable Directories Have Sticky Bits Set</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The sticky bit should be set for all world-writable directories.</description>
      <reference source="ssg" ref_id="dir_perms_world_writable_sticky_bits"/></metadata>
      <criteria>
        <criterion comment="all local world writable directories have sticky bit set" test_ref="oval:ssg:tst:188" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:189" version="1">
      <metadata>
        <title>Auditd Email Account to Notify Upon Action</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>action_mail_acct setting in /etc/audit/auditd.conf is set to a certain account</description>
      <reference source="ssg" ref_id="auditd_data_retention_action_mail_acct"/></metadata>
      <criteria>
        <criterion comment="action_mail_acct setting in auditd.conf" test_ref="oval:ssg:tst:190"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:191" version="1">
      <metadata>
        <title>Configure Postfix Against Unnecessary Release of Information</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Protect against unnecessary release of information.</description>
      <reference source="ssg" ref_id="postfix_server_banner"/></metadata>
      <criteria operator="AND">
        <criterion comment="Limit release of information" test_ref="oval:ssg:tst:192"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:193" version="1">
      <metadata>
        <title>Manually Assign Global IPv6 Address</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Manually configure addresses for IPv6</description>
      <reference source="ssg" ref_id="network_ipv6_static_address"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg:def:111"/>
        <criterion comment="Set static IPv6 address on each interface" test_ref="oval:ssg:tst:194"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:195" version="1">
      <metadata>
        <title>Disable squashfs Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module squashfs should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_squashfs_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:196" comment="kernel module squashfs disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:197" version="1">
      <metadata>
        <title>Disable Interactive Boot</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The ability for users to perform interactive
      startups should be disabled.</description>
      <reference source="ssg" ref_id="interactive_boot_disable"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:198"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:199" version="1">
      <metadata>
        <title>Verify /var/log/audit Ownership</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks that all /var/log/audit files and directories are owned by the root user and group.</description>
      <reference source="ssg" ref_id="file_ownership_var_log_audit"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:200"/>
        <criterion test_ref="oval:ssg:tst:201"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:202" version="1">
      <metadata>
        <title>Package openswan Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package openswan should be installed.</description>
      <reference source="ssg" ref_id="package_openswan_installed"/></metadata>
      <criteria>
        <criterion comment="package openswan is installed" test_ref="oval:ssg:tst:203"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:204" version="1">
      <metadata>
        <title>Package dhcp Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package dhcp should be removed.</description>
      <reference source="ssg" ref_id="package_dhcp_removed"/></metadata>
      <criteria>
        <criterion comment="package dhcp is removed" test_ref="oval:ssg:tst:205"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:206" version="1">
      <metadata>
        <title>Set SHA512 Password Hashing Algorithm In /etc/login.defs</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password hashing algorithm should be set correctly in /etc/login.defs.</description>
      <reference source="ssg" ref_id="set_password_hashing_algorithm_logindefs"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:207"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:208" version="1">
      <metadata>
        <title>Package cronie Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package cronie should be installed.</description>
      <reference source="ssg" ref_id="package_cronie_installed"/></metadata>
      <criteria>
        <criterion comment="package cronie is installed" test_ref="oval:ssg:tst:209"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:210" version="1">
      <metadata>
        <title>Verify group who owns 'passwd' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/passwd file should be owned by the
      appropriate group.</description>
      <reference source="ssg" ref_id="file_groupowner_etc_passwd"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:211"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:212" version="1">
      <metadata>
        <title>Add nodev Option to Removable Media Partitions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nodev mount option prevents files from being
      interpreted as character or block devices. Legitimate character and block
      devices should exist in the /dev directory on the root partition or
      within chroot jails built for system services. All other locations should not
      allow character and block devices.</description>
      <reference source="ssg" ref_id="mount_option_nodev_removable_partitions"/></metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:ssg:tst:213" comment="nodev on removable partition"/>
        <criterion test_ref="oval:ssg:tst:214" comment="removable partition /etc/fstab"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:215" version="1">
      <metadata>
        <title>Service postfix Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The postfix service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_postfix_enabled"/></metadata>
      <criteria comment="package postfix installed and service postfix is configured to start" operator="AND">
        <extend_definition comment="postfix installed" definition_ref="oval:ssg:def:216"/>
        <criteria operator="OR" comment="service postfix is configured to start">
          <criterion comment="postfix runlevel 0" test_ref="oval:ssg:tst:217"/>
          <criterion comment="postfix runlevel 1" test_ref="oval:ssg:tst:218"/>
          <criterion comment="postfix runlevel 2" test_ref="oval:ssg:tst:219"/>
          <criterion comment="postfix runlevel 3" test_ref="oval:ssg:tst:220"/>
          <criterion comment="postfix runlevel 4" test_ref="oval:ssg:tst:221"/>
          <criterion comment="postfix runlevel 5" test_ref="oval:ssg:tst:222"/>
          <criterion comment="postfix runlevel 6" test_ref="oval:ssg:tst:223"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:224" version="1">
      <metadata>
        <title>File /boot/grub/grub.conf Owned By root User</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /boot/grub/grub.conf file should be owned by the root user.</description>
      <reference source="ssg" ref_id="file_user_owner_grub_conf"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:225"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:226" version="1">
      <metadata>
        <title>Package audit Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package audit should be installed.</description>
      <reference source="ssg" ref_id="package_audit_installed"/></metadata>
      <criteria>
        <criterion comment="package audit is installed" test_ref="oval:ssg:tst:227"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:228" version="1">
      <metadata>
        <title>Set Daemon umask</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The daemon umask should be set as
      appropriate</description>
      <reference source="ssg" ref_id="umask_for_daemons"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:229"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:230" version="1">
      <metadata>
        <title>Disable telnet Service</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Disable telnet Service</description>
      <reference source="ssg" ref_id="service_telnetd_disabled"/></metadata>
      <criteria operator="AND">
        <criterion comment="Disable telnet Service" test_ref="oval:ssg:tst:231"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:232" version="1">
      <metadata>
        <title>Service rlogin Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rlogin service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rlogin_disabled"/></metadata>
      <criteria comment="package rsh-server removed or service rlogin is not configured to start" operator="OR">
        <extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg:def:233"/>
        <criterion comment="rlogin disabled" test_ref="oval:ssg:tst:234"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:235" version="1">
      <metadata>
        <title>Ensure gpgcheck Enabled For All Yum Package Repositories</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Ensure all yum repositories utilize signature checking.</description>
      <reference source="ssg" ref_id="ensure_gpgcheck_never_disabled"/></metadata>
      <criteria comment="ensure all yum repositories utilize signiature checking" operator="AND">
        <criterion comment="verify no gpgpcheck=0 present in /etc/yum.repos.d files" test_ref="oval:ssg:tst:236"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:237" version="1">
      <metadata>
        <title>No Legacy .rhosts Or hosts.equiv Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>There should not be any .rhosts or hosts.equiv files on the system.</description>
      <reference source="ssg" ref_id="no_rsh_trust_files"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:238" negate="true"/>
        <criterion test_ref="oval:ssg:tst:239" negate="true"/>
        <criterion test_ref="oval:ssg:tst:240" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:241" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.rp_filter" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.rp_filter" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_rp_filter"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to 1" test_ref="oval:ssg:tst:242"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:243" version="1">
      <metadata>
        <title>Package dovecot Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package dovecot should be removed.</description>
      <reference source="ssg" ref_id="package_dovecot_removed"/></metadata>
      <criteria>
        <criterion comment="package dovecot is removed" test_ref="oval:ssg:tst:244"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:245" version="1">
      <metadata>
        <title>Verify /etc/shadow Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>This test makes sure that /etc/shadow is owned by 0, group owned by 0, and has mode 0000. If
      the target file or directory has an extended ACL then it will fail the mode check.</description>
      <reference source="ssg" ref_id="file_permissions_etc_shadow"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:246"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:247" version="1">
      <metadata>
        <title>Package policycoreutils Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package policycoreutils should be installed.</description>
      <reference source="ssg" ref_id="package_policycoreutils_installed"/></metadata>
      <criteria>
        <criterion comment="package policycoreutils is installed" test_ref="oval:ssg:tst:248"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:249" version="1">
      <metadata>
        <title>Set Password ucredit Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password ucredit should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_ucredit"/></metadata>
      <criteria>
        <criterion comment="Conditions for ucredit are satisfied" test_ref="oval:ssg:tst:250"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:251" version="1">
      <metadata>
        <title>Service cgconfig Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The cgconfig service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_cgconfig_disabled"/></metadata>
      <criteria comment="package libcgroup removed or service cgconfig is not configured to start" operator="OR">
        <extend_definition comment="libcgroup removed" definition_ref="oval:ssg:def:252"/>
        <criteria operator="AND" comment="service cgconfig is not configured to start">
          <criterion comment="cgconfig runlevel 0" test_ref="oval:ssg:tst:253"/>
          <criterion comment="cgconfig runlevel 1" test_ref="oval:ssg:tst:254"/>
          <criterion comment="cgconfig runlevel 2" test_ref="oval:ssg:tst:255"/>
          <criterion comment="cgconfig runlevel 3" test_ref="oval:ssg:tst:256"/>
          <criterion comment="cgconfig runlevel 4" test_ref="oval:ssg:tst:257"/>
          <criterion comment="cgconfig runlevel 5" test_ref="oval:ssg:tst:258"/>
          <criterion comment="cgconfig runlevel 6" test_ref="oval:ssg:tst:259"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:260" version="1">
      <metadata>
        <title>Disable X Windows Startup By Setting Runlevel</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks /etc/inittab to ensure that default runlevel is set to 3.</description>
      <reference source="ssg" ref_id="xwindows_runlevel_setting"/></metadata>
      <criteria>
        <criterion comment="default runlevel is 3" test_ref="oval:ssg:tst:261"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:262" version="1">
      <metadata>
        <title>Find files unowned by a group</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All files should be owned by a
      group</description>
      <reference source="ssg" ref_id="file_permissions_ungroupowned"/></metadata>
      <criteria>
        <criterion comment="Check all files and make sure they are owned by a group" negate="true" test_ref="oval:ssg:tst:263"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:264" version="1">
      <metadata>
        <title>Restrict Serial Port Root Logins</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Preventing direct root login to serial port interfaces
      helps ensure accountability for actions taken on the system
      using the root account.</description>
      <reference source="ssg" ref_id="restrict_serial_port_logins"/></metadata>
      <criteria>
        <criterion comment="serial ports /etc/securetty" test_ref="oval:ssg:tst:265" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:266" version="1">
      <metadata>
        <title>Use Only Approved Ciphers</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Limit the ciphers to those which are FIPS-approved and
      only use ciphers in counter (CTR) mode.</description>
      <reference source="ssg" ref_id="sshd_use_approved_ciphers"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <!-- <extend_definition comment="sshd service is disabled" definition_ref="service_sshd_disabled" /> -->
        <criterion comment="check ClientAliveInterval in /etc/ssh/sshd_config" test_ref="oval:ssg:tst:267"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:268" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "kernel.randomize_va_space" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "kernel.randomize_va_space" should be set to "2".</description>
      <reference source="ssg" ref_id="sysctl_kernel_randomize_va_space"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter kernel.randomize_va_space set to 2" test_ref="oval:ssg:tst:269"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:270" version="1">
      <metadata>
        <title>Enable SSL in Dovecot</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>SSL capabilities should be enabled for the mail server.</description>
      <reference source="ssg" ref_id="dovecot_enable_ssl"/></metadata>
      <criteria comment="Enable SSL in Dovecot">
        <criterion test_ref="oval:ssg:tst:271"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:272" version="1">
      <metadata>
        <title>Package xinetd Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package xinetd should be removed.</description>
      <reference source="ssg" ref_id="package_xinetd_removed"/></metadata>
      <criteria>
        <criterion comment="package xinetd is removed" test_ref="oval:ssg:tst:273"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:274" version="1">
      <metadata>
        <title>Verify user who owns 'group' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/group file should be owned by the
      appropriate user.</description>
      <reference source="ssg" ref_id="file_owner_etc_group"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:275"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:276" version="1">
      <metadata>
        <title>Package oddjob Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package oddjob should be removed.</description>
      <reference source="ssg" ref_id="package_oddjob_removed"/></metadata>
      <criteria>
        <criterion comment="package oddjob is removed" test_ref="oval:ssg:tst:277"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:278" version="1">
      <metadata>
        <title>Verify /etc/gshadow Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>This test makes sure that /etc/gshadow is owned by 0, group owned by 0, and has mode 0000. If
      the target file or directory has an extended ACL then it will fail the mode check.</description>
      <reference source="ssg" ref_id="file_permissions_etc_gshadow"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:279"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:280" version="1">
      <metadata>
        <title>Disable Core Dumps for setuid programs</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Core dumps for setuid programs should be
      disabled</description>
      <reference source="ssg" ref_id="core_dump_suid_progs_limits_conf"/></metadata>
      <criteria>
        <criterion comment="Are core dumps for setuid programs disabled?" test_ref="oval:ssg:tst:281"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:252" version="1">
      <metadata>
        <title>Package libcgroup Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package libcgroup should be removed.</description>
      <reference source="ssg" ref_id="package_libcgroup_removed"/></metadata>
      <criteria>
        <criterion comment="package libcgroup is removed" test_ref="oval:ssg:tst:282"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:283" version="1">
      <metadata>
        <title>Disable Kernel Support for USB via Bootloader Configuration</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Look for argument "nousb" in the kernel line in /etc/grub.conf</description>
      <reference source="ssg" ref_id="bootloader_nousb_argument"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:284" comment="look for argument 'nousb' in the kernel line in /etc/grub.conf"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:285" version="1">
      <metadata>
        <title>Package pam_ldap Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package pam_ldap should be removed.</description>
      <reference source="ssg" ref_id="package_pam_ldap_removed"/></metadata>
      <criteria>
        <criterion comment="package pam_ldap is removed" test_ref="oval:ssg:tst:286"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:287" version="1">
      <metadata>
        <title>Ensure Only Protocol 2 Connections Allowed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The OpenSSH daemon should be running protocol 2.</description>
      <reference source="ssg" ref_id="sshd_protocol_2"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="rpm package openssh-server removed" definition_ref="oval:ssg:def:288"/>
        <criterion comment="/etc/ssh/sshd_config configured for protocol 2" test_ref="oval:ssg:tst:289"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:290" version="1">
      <metadata>
        <title>Set Password retry Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password retry should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_retry"/></metadata>
      <criteria>
        <criterion comment="Conditions for retry are satisfied" test_ref="oval:ssg:tst:291"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:292" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.accept_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.accept_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_accept_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to 0" test_ref="oval:ssg:tst:293"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:294" version="1">
      <metadata>
        <title>Audit File Deletion Events</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit files deletion events.</description>
      <reference source="ssg" ref_id="audit_rules_file_deletion_events"/></metadata>
      <criteria>
        <criterion comment="audit file delete" test_ref="oval:ssg:tst:295"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:296" version="1">
      <metadata>
        <title>Service quota_nld Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The quota_nld service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_quota_nld_disabled"/></metadata>
      <criteria comment="package quota removed or service quota_nld is not configured to start" operator="OR">
        <extend_definition comment="quota removed" definition_ref="oval:ssg:def:297"/>
        <criteria operator="AND" comment="service quota_nld is not configured to start">
          <criterion comment="quota_nld runlevel 0" test_ref="oval:ssg:tst:298"/>
          <criterion comment="quota_nld runlevel 1" test_ref="oval:ssg:tst:299"/>
          <criterion comment="quota_nld runlevel 2" test_ref="oval:ssg:tst:300"/>
          <criterion comment="quota_nld runlevel 3" test_ref="oval:ssg:tst:301"/>
          <criterion comment="quota_nld runlevel 4" test_ref="oval:ssg:tst:302"/>
          <criterion comment="quota_nld runlevel 5" test_ref="oval:ssg:tst:303"/>
          <criterion comment="quota_nld runlevel 6" test_ref="oval:ssg:tst:304"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:305" version="1">
      <metadata>
        <title>Verify that Shared Library Files Have Restrictive Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and objects therein, are not group-writable
      or world-writable.</description>
      <reference source="ssg" ref_id="file_permissions_library_dirs"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:306"/>
        <criterion test_ref="oval:ssg:tst:307"/>
        <criterion test_ref="oval:ssg:tst:308"/>
        <criterion test_ref="oval:ssg:tst:309"/>
        <criterion test_ref="oval:ssg:tst:310"/>
        <criterion test_ref="oval:ssg:tst:311"/>
        <criterion test_ref="oval:ssg:tst:312"/>
        <criterion test_ref="oval:ssg:tst:313"/>
        <criterion test_ref="oval:ssg:tst:314"/>
        <criterion test_ref="oval:ssg:tst:315"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:316" version="1">
      <metadata>
        <title>Manually Assign IPv6 Router Address</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Define default gateways for IPv6 traffic</description>
      <reference source="ssg" ref_id="network_ipv6_default_gateway"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg:def:111"/>
        <criterion comment="Define default gateways" test_ref="oval:ssg:tst:317"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:318" version="1">
      <metadata>
        <title>Postfix network listening should be disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Postfix network listening should be
      disabled</description>
      <reference source="ssg" ref_id="postfix_network_listening_disabled"/></metadata>
      <criteria>
        <criterion comment="Unknown test stub" test_ref="oval:ssg:tst:319"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:320" version="1">
      <metadata>
        <title>Set Password difok Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password difok should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_difok"/></metadata>
      <criteria>
        <criterion comment="Conditions for difok are satisfied" test_ref="oval:ssg:tst:321"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:322" version="1">
      <metadata>
        <title>Package smartmontools Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package smartmontools should be removed.</description>
      <reference source="ssg" ref_id="package_smartmontools_removed"/></metadata>
      <criteria>
        <criterion comment="package smartmontools is removed" test_ref="oval:ssg:tst:323"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:324" version="1">
      <metadata>
        <title>Send Logs to a Remote Loghost</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Syslog logs should be sent to a remote
      loghost</description>
      <reference source="ssg" ref_id="rsyslog_remote_loghost"/></metadata>
      <criteria>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:325"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:326" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.log_martians" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.log_martians" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_log_martians"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to 1" test_ref="oval:ssg:tst:327"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:328" version="1">
      <metadata>
        <title>TFTP Daemon Uses Secure Mode</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The TFTP daemon should use secure mode.</description>
      <reference source="ssg" ref_id="tftpd_uses_secure_mode"/></metadata>
      <criteria comment="package tftp-server removed or /etc/xinetd.d/tftp configured correctly" operator="OR">
        <extend_definition comment="rpm package tftp-server removed" definition_ref="oval:ssg:def:179"/>
        <criterion comment="tftpd secure mode" test_ref="oval:ssg:tst:329"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:330" version="1">
      <metadata>
        <title>Package at Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package at should be removed.</description>
      <reference source="ssg" ref_id="package_at_removed"/></metadata>
      <criteria>
        <criterion comment="package at is removed" test_ref="oval:ssg:tst:331"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:332" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fremovexattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fremovexattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fremovexattr x32" test_ref="oval:ssg:tst:333"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fremovexattr x64" test_ref="oval:ssg:tst:335"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:336" version="1">
      <metadata>
        <title>Red Hat Release and Auxiliary gpg-pubkey Packages Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The Red Hat release and auxiliary key packages are required to be installed.</description>
      <reference source="ssg" ref_id="package_red_hat_gpgkeys_installed"/></metadata>
      <criteria comment="packages gpg-pubkey-fd431d51-4ae0493b and gpg-pubkey-2fa658e0-45700c69 are installed" operator="AND">
        <criterion comment="package gpg-pubkey-fd431d51-4ae0493b is installed" test_ref="oval:ssg:tst:337"/>
        <criterion comment="package gpg-pubkey-2fa658e0-45700c69 is installed" test_ref="oval:ssg:tst:338"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:339" version="1">
      <metadata>
        <title>Service ntpd Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The ntpd service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_ntpd_enabled"/></metadata>
      <criteria comment="package ntp installed and service ntpd is configured to start" operator="AND">
        <extend_definition comment="ntp installed" definition_ref="oval:ssg:def:340"/>
        <criteria operator="OR" comment="service ntpd is configured to start">
          <criterion comment="ntpd runlevel 0" test_ref="oval:ssg:tst:341"/>
          <criterion comment="ntpd runlevel 1" test_ref="oval:ssg:tst:342"/>
          <criterion comment="ntpd runlevel 2" test_ref="oval:ssg:tst:343"/>
          <criterion comment="ntpd runlevel 3" test_ref="oval:ssg:tst:344"/>
          <criterion comment="ntpd runlevel 4" test_ref="oval:ssg:tst:345"/>
          <criterion comment="ntpd runlevel 5" test_ref="oval:ssg:tst:346"/>
          <criterion comment="ntpd runlevel 6" test_ref="oval:ssg:tst:347"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:348" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fchmodat</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fchmodat"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fchmodat x32" test_ref="oval:ssg:tst:349"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fchmodat x64" test_ref="oval:ssg:tst:350"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:351" version="1">
      <metadata>
        <title>Service ntpdate Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The ntpdate service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_ntpdate_disabled"/></metadata>
      <criteria comment="package ntpdate removed or service ntpdate is not configured to start" operator="OR">
        <extend_definition comment="ntpdate removed" definition_ref="oval:ssg:def:352"/>
        <criteria operator="AND" comment="service ntpdate is not configured to start">
          <criterion comment="ntpdate runlevel 0" test_ref="oval:ssg:tst:353"/>
          <criterion comment="ntpdate runlevel 1" test_ref="oval:ssg:tst:354"/>
          <criterion comment="ntpdate runlevel 2" test_ref="oval:ssg:tst:355"/>
          <criterion comment="ntpdate runlevel 3" test_ref="oval:ssg:tst:356"/>
          <criterion comment="ntpdate runlevel 4" test_ref="oval:ssg:tst:357"/>
          <criterion comment="ntpdate runlevel 5" test_ref="oval:ssg:tst:358"/>
          <criterion comment="ntpdate runlevel 6" test_ref="oval:ssg:tst:359"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:360" version="1">
      <metadata>
        <title>Ensure /var/log Located On Separate Partition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>System logs are stored in the /var/log directory.
      Ensure that it has its own partition or logical volume.</description>
      <reference source="ssg" ref_id="partition_for_var_log"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:361" comment="/var/log on own partition"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:362" version="1">
      <metadata>
        <title>Change the default policy to DROP (from ACCEPT) for
      the INPUT built-in chain</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Change the default policy to DROP (from ACCEPT)
      for the INPUT built-in chain.</description>
      <reference source="ssg" ref_id="iptables_default_policy_drop"/></metadata>
      <criteria>
        <criterion comment=":INPUT DROP [0:0]" test_ref="oval:ssg:tst:363"/>
        <criterion comment=":INPUT ACCEPT [0:0]" negate="true" test_ref="oval:ssg:tst:364"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:365" version="1">
      <metadata>
        <title>Enable Privacy Extensions for IPv6</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Enable privacy extensions for IPv6</description>
      <reference source="ssg" ref_id="network_ipv6_privacy_extensions"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg:def:111"/>
        <criterion comment="Enable privacy extensions per interface" test_ref="oval:ssg:tst:366"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:367" version="1">
      <metadata>
        <title>Package dbus Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package dbus should be removed.</description>
      <reference source="ssg" ref_id="package_dbus_removed"/></metadata>
      <criteria>
        <criterion comment="package dbus is removed" test_ref="oval:ssg:tst:368"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:233" version="1">
      <metadata>
        <title>Package rsh-server Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package rsh-server should be removed.</description>
      <reference source="ssg" ref_id="package_rsh-server_removed"/></metadata>
      <criteria>
        <criterion comment="package rsh-server is removed" test_ref="oval:ssg:tst:369"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:370" version="1">
      <metadata>
        <title>Do Not Allow Users to Set Environment Options</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>PermitUserEnvironment should be
      disabled</description>
      <reference source="ssg" ref_id="sshd_no_user_envset"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Check value of PermitUserEnvironment in /etc/ssh/sshd_config" negate="true" test_ref="oval:ssg:tst:372"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:373" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.icmp_ignore_bogus_error_responses" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.icmp_ignore_bogus_error_responses" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_icmp_ignore_bogus_error_responses"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to 1" test_ref="oval:ssg:tst:374"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:375" version="1">
      <metadata>
        <title>Directory /var/log/httpd/ Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Directory permissions for /var/log/httpd should be set to 0750.</description>
      <reference source="ssg" ref_id="dir_perms_var_log_httpd"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:376"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:377" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.secure_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.secure_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_secure_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to 0" test_ref="oval:ssg:tst:378"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:379" version="1">
      <metadata>
        <title>Disable jffs2 Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module jffs2 should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_jffs2_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:380" comment="kernel module jffs2 disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:381" version="1">
      <metadata>
        <title>Ensure that Users Have Sensible Umask Values set for csh</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The default umask for users of the csh shell</description>
      <reference source="ssg" ref_id="accounts_umask_cshrc"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:382"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:216" version="1">
      <metadata>
        <title>Package postfix Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package postfix should be installed.</description>
      <reference source="ssg" ref_id="package_postfix_installed"/></metadata>
      <criteria>
        <criterion comment="package postfix is installed" test_ref="oval:ssg:tst:383"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:384" version="1">
      <metadata>
        <title>Add nodev Option to /tmp</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Legitimate character and block devices should not exist
      within temporary directories like /tmp. The nodev mount option should
      be specified for /tmp.</description>
      <reference source="ssg" ref_id="mount_option_tmp_nodev"/></metadata>
      <criteria>
        <criterion comment="nodev on /tmp" test_ref="oval:ssg:tst:385"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:386" version="1">
      <metadata>
        <title>Service ip6tables Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The ip6tables service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_ip6tables_enabled"/></metadata>
      <criteria comment="package iptables-ipv6 installed and service ip6tables is configured to start" operator="AND">
        <extend_definition comment="iptables-ipv6 installed" definition_ref="oval:ssg:def:185"/>
        <criteria operator="OR" comment="service ip6tables is configured to start">
          <criterion comment="ip6tables runlevel 0" test_ref="oval:ssg:tst:387"/>
          <criterion comment="ip6tables runlevel 1" test_ref="oval:ssg:tst:388"/>
          <criterion comment="ip6tables runlevel 2" test_ref="oval:ssg:tst:389"/>
          <criterion comment="ip6tables runlevel 3" test_ref="oval:ssg:tst:390"/>
          <criterion comment="ip6tables runlevel 4" test_ref="oval:ssg:tst:391"/>
          <criterion comment="ip6tables runlevel 5" test_ref="oval:ssg:tst:392"/>
          <criterion comment="ip6tables runlevel 6" test_ref="oval:ssg:tst:393"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:394" version="1">
      <metadata>
        <title>Package sysstat Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package sysstat should be removed.</description>
      <reference source="ssg" ref_id="package_sysstat_removed"/></metadata>
      <criteria>
        <criterion comment="package sysstat is removed" test_ref="oval:ssg:tst:395"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:396" version="1">
      <metadata>
        <title>Package nfs-utils Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package nfs-utils should be removed.</description>
      <reference source="ssg" ref_id="package_nfs-utils_removed"/></metadata>
      <criteria>
        <criterion comment="package nfs-utils is removed" test_ref="oval:ssg:tst:397"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:398" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.icmp_echo_ignore_broadcasts" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.icmp_echo_ignore_broadcasts" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_icmp_echo_ignore_broadcasts"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to 1" test_ref="oval:ssg:tst:399"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:400" version="1">
      <metadata>
        <title>Service acpid Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The acpid service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_acpid_disabled"/></metadata>
      <criteria operator="AND" comment="service acpid is not configured to start">
        <criterion comment="acpid runlevel 0" test_ref="oval:ssg:tst:401"/>
        <criterion comment="acpid runlevel 1" test_ref="oval:ssg:tst:402"/>
        <criterion comment="acpid runlevel 2" test_ref="oval:ssg:tst:403"/>
        <criterion comment="acpid runlevel 3" test_ref="oval:ssg:tst:404"/>
        <criterion comment="acpid runlevel 4" test_ref="oval:ssg:tst:405"/>
        <criterion comment="acpid runlevel 5" test_ref="oval:ssg:tst:406"/>
        <criterion comment="acpid runlevel 6" test_ref="oval:ssg:tst:407"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:408" version="1">
      <metadata>
        <title>Package hal Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package hal should be removed.</description>
      <reference source="ssg" ref_id="package_hal_removed"/></metadata>
      <criteria>
        <criterion comment="package hal is removed" test_ref="oval:ssg:tst:409"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:410" version="1">
      <metadata>
        <title>Service abrtd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The abrtd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_abrtd_disabled"/></metadata>
      <criteria comment="package abrt removed or service abrtd is not configured to start" operator="OR">
        <extend_definition comment="abrt removed" definition_ref="oval:ssg:def:411"/>
        <criteria operator="AND" comment="service abrtd is not configured to start">
          <criterion comment="abrtd runlevel 0" test_ref="oval:ssg:tst:412"/>
          <criterion comment="abrtd runlevel 1" test_ref="oval:ssg:tst:413"/>
          <criterion comment="abrtd runlevel 2" test_ref="oval:ssg:tst:414"/>
          <criterion comment="abrtd runlevel 3" test_ref="oval:ssg:tst:415"/>
          <criterion comment="abrtd runlevel 4" test_ref="oval:ssg:tst:416"/>
          <criterion comment="abrtd runlevel 5" test_ref="oval:ssg:tst:417"/>
          <criterion comment="abrtd runlevel 6" test_ref="oval:ssg:tst:418"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:419" version="1">
      <metadata>
        <title>Package squid Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package squid should be removed.</description>
      <reference source="ssg" ref_id="package_squid_removed"/></metadata>
      <criteria>
        <criterion comment="package squid is removed" test_ref="oval:ssg:tst:420"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:421" version="1">
      <metadata>
        <title>Enable Auditing for Processes Which Start Prior to the Audit Daemon</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Look for argument audit=1 in the kernel line in /etc/grub.conf.</description>
      <reference source="ssg" ref_id="bootloader_audit_argument"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:422" comment="check for audit=1 in /etc/grub.conf"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:423" version="1">
      <metadata>
        <title>Service rsh Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rsh service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rsh_disabled"/></metadata>
      <criteria comment="package rsh-server removed or service rsh is not configured to start" operator="OR">
        <extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg:def:233"/>
        <criterion comment="rsh disabled" test_ref="oval:ssg:tst:424"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:425" version="1">
      <metadata>
        <title>Service iptables Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The iptables service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_iptables_enabled"/></metadata>
      <criteria comment="package iptables installed and service iptables is configured to start" operator="AND">
        <extend_definition comment="iptables installed" definition_ref="oval:ssg:def:426"/>
        <criteria operator="OR" comment="service iptables is configured to start">
          <criterion comment="iptables runlevel 0" test_ref="oval:ssg:tst:427"/>
          <criterion comment="iptables runlevel 1" test_ref="oval:ssg:tst:428"/>
          <criterion comment="iptables runlevel 2" test_ref="oval:ssg:tst:429"/>
          <criterion comment="iptables runlevel 3" test_ref="oval:ssg:tst:430"/>
          <criterion comment="iptables runlevel 4" test_ref="oval:ssg:tst:431"/>
          <criterion comment="iptables runlevel 5" test_ref="oval:ssg:tst:432"/>
          <criterion comment="iptables runlevel 6" test_ref="oval:ssg:tst:433"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:434" version="1">
      <metadata>
        <title>Audit Information Export To Media</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules that detect the mounting of filesystems should be enabled.</description>
      <reference source="ssg" ref_id="audit_rules_media_export"/></metadata>
      <criteria>
        <criterion comment="audit mount" test_ref="oval:ssg:tst:435"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:436" version="1">
      <metadata>
        <title>Disable Printer Server if Possible</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>By default, locally configured printers will not be shared over the network, but if this functionality has somehow
been enabled, these recommendations will disable it again. Be sure to disable outgoing printer list broadcasts, or
remote users will still be able to see the locally configured printers, even if they cannot actually print to them.
To limit print serving to a particular set of users, use the Policy directive.
</description>
      <reference source="ssg" ref_id="cups_disable_printserver"/></metadata>
      <criteria operator="AND">
        <criterion comment="Don't use port directive" test_ref="oval:ssg:tst:437"/>
        <criterion comment="Do use the listen directive" test_ref="oval:ssg:tst:438"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:439" version="1">
      <metadata>
        <title>Enable SELinux</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The SELinux policy should be set
      appropriately.</description>
      <reference source="ssg" ref_id="selinux_policytype"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:440"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:441" version="1">
      <metadata>
        <title>Verify user who owns 'gshadow' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/gshadow file should be owned by the
      appropriate user.</description>
      <reference source="ssg" ref_id="file_owner_etc_gshadow"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:442"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:443" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - chmod</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_chmod"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification chmod x32" test_ref="oval:ssg:tst:444"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification chmod x64" test_ref="oval:ssg:tst:445"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:446" version="1">
      <metadata>
        <title>Service nfs Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nfs service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_nfs_disabled"/></metadata>
      <criteria comment="package nfs-utils removed or service nfs is not configured to start" operator="OR">
        <extend_definition comment="nfs-utils removed" definition_ref="oval:ssg:def:396"/>
        <criteria operator="AND" comment="service nfs is not configured to start">
          <criterion comment="nfs runlevel 0" test_ref="oval:ssg:tst:447"/>
          <criterion comment="nfs runlevel 1" test_ref="oval:ssg:tst:448"/>
          <criterion comment="nfs runlevel 2" test_ref="oval:ssg:tst:449"/>
          <criterion comment="nfs runlevel 3" test_ref="oval:ssg:tst:450"/>
          <criterion comment="nfs runlevel 4" test_ref="oval:ssg:tst:451"/>
          <criterion comment="nfs runlevel 5" test_ref="oval:ssg:tst:452"/>
          <criterion comment="nfs runlevel 6" test_ref="oval:ssg:tst:453"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:454" version="1">
      <metadata>
        <title>Package net-snmp Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package net-snmp should be removed.</description>
      <reference source="ssg" ref_id="package_net-snmp_removed"/></metadata>
      <criteria>
        <criterion comment="package net-snmp is removed" test_ref="oval:ssg:tst:455"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:456" version="1">
      <metadata>
        <title>Record Events that Modify the System's Mandatory Access Controls</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules that detect changes to the system's mandatory access controls (SELinux) are enabled.</description>
      <reference source="ssg" ref_id="audit_rules_mac_modification"/></metadata>
      <criteria>
        <criterion comment="audit changes selinux" test_ref="oval:ssg:tst:457"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:458" version="1">
      <metadata>
        <title>Service dovecot Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The dovecot service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_dovecot_disabled"/></metadata>
      <criteria comment="package dovecot removed or service dovecot is not configured to start" operator="OR">
        <extend_definition comment="dovecot removed" definition_ref="oval:ssg:def:243"/>
        <criteria operator="AND" comment="service dovecot is not configured to start">
          <criterion comment="dovecot runlevel 0" test_ref="oval:ssg:tst:459"/>
          <criterion comment="dovecot runlevel 1" test_ref="oval:ssg:tst:460"/>
          <criterion comment="dovecot runlevel 2" test_ref="oval:ssg:tst:461"/>
          <criterion comment="dovecot runlevel 3" test_ref="oval:ssg:tst:462"/>
          <criterion comment="dovecot runlevel 4" test_ref="oval:ssg:tst:463"/>
          <criterion comment="dovecot runlevel 5" test_ref="oval:ssg:tst:464"/>
          <criterion comment="dovecot runlevel 6" test_ref="oval:ssg:tst:465"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:466" version="1">
      <metadata>
        <title>Find world writable directories not owned by a system account</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All world writable directories should be owned by a system user.</description>
      <reference source="ssg" ref_id="dir_perms_world_writable_system_owned"/></metadata>
      <criteria comment="check for local directories that are world writable and have uid greater than or equal to 500" negate="true">
        <criterion comment="check for local directories that are world writable and have uid greater than or equal to 500" test_ref="oval:ssg:tst:467"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:468" version="1">
      <metadata>
        <title>Verify user who owns 'shadow' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/shadow file should be owned by the
      appropriate user.</description>
      <reference source="ssg" ref_id="file_owner_etc_shadow"/></metadata>
      <criteria>
        <criterion comment="Check file ownership of /etc/shadow" test_ref="oval:ssg:tst:469"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:470" version="1">
      <metadata>
        <title>Add nosuid Option to /dev/shm</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nosuid mount option should be set for temporary
      storage partitions such as /dev/shm. The suid/sgid permissions
      should not be required in these world-writable directories.</description>
      <reference source="ssg" ref_id="mount_option_dev_shm_nosuid"/></metadata>
      <criteria>
        <criterion comment="nosuid on /dev/shm" test_ref="oval:ssg:tst:471"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:472" version="1">
      <metadata>
        <title>Service certmonger Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The certmonger service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_certmonger_disabled"/></metadata>
      <criteria operator="AND" comment="service certmonger is not configured to start">
        <criterion comment="certmonger runlevel 0" test_ref="oval:ssg:tst:473"/>
        <criterion comment="certmonger runlevel 1" test_ref="oval:ssg:tst:474"/>
        <criterion comment="certmonger runlevel 2" test_ref="oval:ssg:tst:475"/>
        <criterion comment="certmonger runlevel 3" test_ref="oval:ssg:tst:476"/>
        <criterion comment="certmonger runlevel 4" test_ref="oval:ssg:tst:477"/>
        <criterion comment="certmonger runlevel 5" test_ref="oval:ssg:tst:478"/>
        <criterion comment="certmonger runlevel 6" test_ref="oval:ssg:tst:479"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:480" version="1">
      <metadata>
        <title>Disable dccp Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module dccp should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_dccp_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:481" comment="kernel module dccp disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:482" version="1">
      <metadata>
        <title>Write permissions are disabled for group and other in
      all directories in Root's Path</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Check each directory in root's path and make use
      it does not grant write permission to group and
      other</description>
      <reference source="ssg" ref_id="accounts_root_path_dirs_no_write"/></metadata>
      <criteria comment="Check that write permission to group and other in root's path is denied" negate="true" operator="OR">
        <criterion comment="Check for write permission to group in root's path" test_ref="oval:ssg:tst:483"/>
        <criterion comment="Check for write permission to other in root's path" test_ref="oval:ssg:tst:484"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:485" version="1">
      <metadata>
        <title>Service oddjobd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The oddjobd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_oddjobd_disabled"/></metadata>
      <criteria comment="package oddjob removed or service oddjobd is not configured to start" operator="OR">
        <extend_definition comment="oddjob removed" definition_ref="oval:ssg:def:276"/>
        <criteria operator="AND" comment="service oddjobd is not configured to start">
          <criterion comment="oddjobd runlevel 0" test_ref="oval:ssg:tst:486"/>
          <criterion comment="oddjobd runlevel 1" test_ref="oval:ssg:tst:487"/>
          <criterion comment="oddjobd runlevel 2" test_ref="oval:ssg:tst:488"/>
          <criterion comment="oddjobd runlevel 3" test_ref="oval:ssg:tst:489"/>
          <criterion comment="oddjobd runlevel 4" test_ref="oval:ssg:tst:490"/>
          <criterion comment="oddjobd runlevel 5" test_ref="oval:ssg:tst:491"/>
          <criterion comment="oddjobd runlevel 6" test_ref="oval:ssg:tst:492"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:493" version="1">
      <metadata>
        <title>Package bind Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package bind should be removed.</description>
      <reference source="ssg" ref_id="package_bind_removed"/></metadata>
      <criteria>
        <criterion comment="package bind is removed" test_ref="oval:ssg:tst:494"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:495" version="1">
      <metadata>
        <title>Ensure that No Dangerous Directories Exist in Root's Path</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The environment variable PATH should be set correctly for the root user.</description>
      <reference source="ssg" ref_id="accounts_dangerous_path_for_root"/></metadata>
      <criteria comment="environment variable PATH contains dangerous path" operator="AND">
        <criterion comment="environment variable PATH starts with : or ." test_ref="oval:ssg:tst:496"/>
        <criterion comment="environment variable PATH contains : twice in a row" test_ref="oval:ssg:tst:497"/>
        <criterion comment="environment variable PATH contains . twice in a row" test_ref="oval:ssg:tst:498"/>
        <criterion comment="environment variable PATH ends with : or ." test_ref="oval:ssg:tst:499"/>
        <criterion comment="environment variable PATH doesn't begin with a /" test_ref="oval:ssg:tst:500"/>
        <criterion comment="environment variable PATH doesn't contain relative paths" test_ref="oval:ssg:tst:501"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:502" version="1">
      <metadata>
        <title>Disable hfs Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module hfs should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_hfs_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:503" comment="kernel module hfs disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:504" version="1">
      <metadata>
        <title>Package cyrus-sasl Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package cyrus-sasl should be removed.</description>
      <reference source="ssg" ref_id="package_cyrus-sasl_removed"/></metadata>
      <criteria>
        <criterion comment="package cyrus-sasl is removed" test_ref="oval:ssg:tst:505"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:506" version="1">
      <metadata>
        <title>Service restorecond Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The restorecond service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_restorecond_enabled"/></metadata>
      <criteria comment="package policycoreutils installed and service restorecond is configured to start" operator="AND">
        <extend_definition comment="policycoreutils installed" definition_ref="oval:ssg:def:247"/>
        <criteria operator="OR" comment="service restorecond is configured to start">
          <criterion comment="restorecond runlevel 0" test_ref="oval:ssg:tst:507"/>
          <criterion comment="restorecond runlevel 1" test_ref="oval:ssg:tst:508"/>
          <criterion comment="restorecond runlevel 2" test_ref="oval:ssg:tst:509"/>
          <criterion comment="restorecond runlevel 3" test_ref="oval:ssg:tst:510"/>
          <criterion comment="restorecond runlevel 4" test_ref="oval:ssg:tst:511"/>
          <criterion comment="restorecond runlevel 5" test_ref="oval:ssg:tst:512"/>
          <criterion comment="restorecond runlevel 6" test_ref="oval:ssg:tst:513"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:514" version="1">
      <metadata>
        <title>Service mdmonitor Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The mdmonitor service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_mdmonitor_disabled"/></metadata>
      <criteria comment="package mdadm removed or service mdmonitor is not configured to start" operator="OR">
        <extend_definition comment="mdadm removed" definition_ref="oval:ssg:def:515"/>
        <criteria operator="AND" comment="service mdmonitor is not configured to start">
          <criterion comment="mdmonitor runlevel 0" test_ref="oval:ssg:tst:516"/>
          <criterion comment="mdmonitor runlevel 1" test_ref="oval:ssg:tst:517"/>
          <criterion comment="mdmonitor runlevel 2" test_ref="oval:ssg:tst:518"/>
          <criterion comment="mdmonitor runlevel 3" test_ref="oval:ssg:tst:519"/>
          <criterion comment="mdmonitor runlevel 4" test_ref="oval:ssg:tst:520"/>
          <criterion comment="mdmonitor runlevel 5" test_ref="oval:ssg:tst:521"/>
          <criterion comment="mdmonitor runlevel 6" test_ref="oval:ssg:tst:522"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:523" version="1">
      <metadata>
        <title>Disable freevxfs Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module freevxfs should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_freevxfs_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:524" comment="kernel module freevxfs disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:525" version="1">
      <metadata>
        <title>Set Password ocredit Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password ocredit should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_ocredit"/></metadata>
      <criteria>
        <criterion comment="Conditions for ocredit are satisfied" test_ref="oval:ssg:tst:526"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:117" version="1">
      <metadata>
        <title>Package irqbalance Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package irqbalance should be installed.</description>
      <reference source="ssg" ref_id="package_irqbalance_installed"/></metadata>
      <criteria>
        <criterion comment="package irqbalance is installed" test_ref="oval:ssg:tst:527"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:528" version="1">
      <metadata>
        <title>Verify permissions on 'group' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>File permissions for /etc/group should be set
      correctly.</description>
      <reference source="ssg" ref_id="file_permissions_etc_group"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:529"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:530" version="1">
      <metadata>
        <title>Confirm Existence and Permissions of System Log
      Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All rsyslog log files should be owned by root
      user.</description>
      <reference source="ssg" ref_id="rsyslog_files_exist_permissions"/></metadata>
      <criteria>
        <criterion comment="check if user root owns all syslog log files" test_ref="oval:ssg:tst:531"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:532" version="1">
      <metadata>
        <title>Service rexec Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rexec service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rexec_disabled"/></metadata>
      <criteria comment="package rsh-server removed or service rexec is not configured to start" operator="OR">
        <extend_definition comment="rpm package rsh-server removed" definition_ref="oval:ssg:def:233"/>
        <criterion comment="rexec disabled" test_ref="oval:ssg:tst:533"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:534" version="1">
      <metadata>
        <title>Service crond Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The crond service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_crond_enabled"/></metadata>
      <criteria comment="package cronie installed and service crond is configured to start" operator="AND">
        <extend_definition comment="cronie installed" definition_ref="oval:ssg:def:208"/>
        <criteria operator="OR" comment="service crond is configured to start">
          <criterion comment="crond runlevel 0" test_ref="oval:ssg:tst:535"/>
          <criterion comment="crond runlevel 1" test_ref="oval:ssg:tst:536"/>
          <criterion comment="crond runlevel 2" test_ref="oval:ssg:tst:537"/>
          <criterion comment="crond runlevel 3" test_ref="oval:ssg:tst:538"/>
          <criterion comment="crond runlevel 4" test_ref="oval:ssg:tst:539"/>
          <criterion comment="crond runlevel 5" test_ref="oval:ssg:tst:540"/>
          <criterion comment="crond runlevel 6" test_ref="oval:ssg:tst:541"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:542" version="1">
      <metadata>
        <title>Find Unauthorized SGID System Executables</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The sgid bit should be not set for all executable files.</description>
      <reference source="ssg" ref_id="file_permissions_unauthorized_sgid"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:543"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:126" version="1">
      <metadata>
        <title>Package httpd Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package httpd should be removed.</description>
      <reference source="ssg" ref_id="package_httpd_removed"/></metadata>
      <criteria>
        <criterion comment="package httpd is removed" test_ref="oval:ssg:tst:544"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:545" version="1">
      <metadata>
        <title>Service haldaemon Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The haldaemon service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_haldaemon_disabled"/></metadata>
      <criteria comment="package hal removed or service haldaemon is not configured to start" operator="OR">
        <extend_definition comment="hal removed" definition_ref="oval:ssg:def:408"/>
        <criteria operator="AND" comment="service haldaemon is not configured to start">
          <criterion comment="haldaemon runlevel 0" test_ref="oval:ssg:tst:546"/>
          <criterion comment="haldaemon runlevel 1" test_ref="oval:ssg:tst:547"/>
          <criterion comment="haldaemon runlevel 2" test_ref="oval:ssg:tst:548"/>
          <criterion comment="haldaemon runlevel 3" test_ref="oval:ssg:tst:549"/>
          <criterion comment="haldaemon runlevel 4" test_ref="oval:ssg:tst:550"/>
          <criterion comment="haldaemon runlevel 5" test_ref="oval:ssg:tst:551"/>
          <criterion comment="haldaemon runlevel 6" test_ref="oval:ssg:tst:552"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:553" version="1">
      <metadata>
        <title>Service rdisc Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rdisc service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rdisc_disabled"/></metadata>
      <criteria comment="package iputils removed or service rdisc is not configured to start" operator="OR">
        <extend_definition comment="iputils removed" definition_ref="oval:ssg:def:163"/>
        <criteria operator="AND" comment="service rdisc is not configured to start">
          <criterion comment="rdisc runlevel 0" test_ref="oval:ssg:tst:554"/>
          <criterion comment="rdisc runlevel 1" test_ref="oval:ssg:tst:555"/>
          <criterion comment="rdisc runlevel 2" test_ref="oval:ssg:tst:556"/>
          <criterion comment="rdisc runlevel 3" test_ref="oval:ssg:tst:557"/>
          <criterion comment="rdisc runlevel 4" test_ref="oval:ssg:tst:558"/>
          <criterion comment="rdisc runlevel 5" test_ref="oval:ssg:tst:559"/>
          <criterion comment="rdisc runlevel 6" test_ref="oval:ssg:tst:560"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:340" version="1">
      <metadata>
        <title>Package ntp Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package ntp should be installed.</description>
      <reference source="ssg" ref_id="package_ntp_installed"/></metadata>
      <criteria>
        <criterion comment="package ntp is installed" test_ref="oval:ssg:tst:561"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:562" version="1">
      <metadata>
        <title>Service portreserve Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The portreserve service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_portreserve_disabled"/></metadata>
      <criteria comment="package portreserve removed or service portreserve is not configured to start" operator="OR">
        <extend_definition comment="portreserve removed" definition_ref="oval:ssg:def:563"/>
        <criteria operator="AND" comment="service portreserve is not configured to start">
          <criterion comment="portreserve runlevel 0" test_ref="oval:ssg:tst:564"/>
          <criterion comment="portreserve runlevel 1" test_ref="oval:ssg:tst:565"/>
          <criterion comment="portreserve runlevel 2" test_ref="oval:ssg:tst:566"/>
          <criterion comment="portreserve runlevel 3" test_ref="oval:ssg:tst:567"/>
          <criterion comment="portreserve runlevel 4" test_ref="oval:ssg:tst:568"/>
          <criterion comment="portreserve runlevel 5" test_ref="oval:ssg:tst:569"/>
          <criterion comment="portreserve runlevel 6" test_ref="oval:ssg:tst:570"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:571" version="1">
      <metadata>
        <title>Ensure Logwatch SplitHosts Configured</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Check if splithosts line in logwatch.conf is set appropriately.</description>
      <reference source="ssg" ref_id="logwatch_configured_splithosts"/></metadata>
      <criteria>
        <criterion comment="splithosts" test_ref="oval:ssg:tst:572"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:573" version="1">
      <metadata>
        <title>Record Attempts to Alter Time Through Settimeofday</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Record attempts to alter time through settimeofday.
      </description>
      <reference source="ssg" ref_id="audit_rules_time_settimeofday"/></metadata>
      <criteria comment="Test for either..." operator="OR">
        <criteria comment="both..." operator="AND">
          <extend_definition comment="32bit and ..." definition_ref="oval:ssg:def:574"/>
          <criterion comment="32bit line settimeofday and key present" test_ref="oval:ssg:tst:575"/>
        </criteria>
        <criteria comment="both ..." operator="AND">
          <extend_definition comment="64bit and ..." definition_ref="oval:ssg:def:334"/>
          <criterion comment="64bit line for settimeofday and key present" test_ref="oval:ssg:tst:576"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:577" version="1">
      <metadata>
        <title>Set Maximum Number of Concurrent Login Sessions Per User</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The maximum number of concurrent login sessions per user should meet
      minimum requirements.</description>
      <reference source="ssg" ref_id="accounts_max_concurrent_login_sessions"/></metadata>
      <criteria comment="the value maxlogins should be set appropriately in /etc/security/limits.conf">
        <criterion test_ref="oval:ssg:tst:578"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:579" version="1">
      <metadata>
        <title>Service bluetooth Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The bluetooth service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_bluetooth_disabled"/></metadata>
      <criteria operator="AND" comment="service bluetooth is not configured to start">
        <criterion comment="bluetooth runlevel 0" test_ref="oval:ssg:tst:580"/>
        <criterion comment="bluetooth runlevel 1" test_ref="oval:ssg:tst:581"/>
        <criterion comment="bluetooth runlevel 2" test_ref="oval:ssg:tst:582"/>
        <criterion comment="bluetooth runlevel 3" test_ref="oval:ssg:tst:583"/>
        <criterion comment="bluetooth runlevel 4" test_ref="oval:ssg:tst:584"/>
        <criterion comment="bluetooth runlevel 5" test_ref="oval:ssg:tst:585"/>
        <criterion comment="bluetooth runlevel 6" test_ref="oval:ssg:tst:586"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:587" version="1">
      <metadata>
        <title>Service squid Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The squid service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_squid_disabled"/></metadata>
      <criteria comment="package squid removed or service squid is not configured to start" operator="OR">
        <extend_definition comment="squid removed" definition_ref="oval:ssg:def:419"/>
        <criteria operator="AND" comment="service squid is not configured to start">
          <criterion comment="squid runlevel 0" test_ref="oval:ssg:tst:588"/>
          <criterion comment="squid runlevel 1" test_ref="oval:ssg:tst:589"/>
          <criterion comment="squid runlevel 2" test_ref="oval:ssg:tst:590"/>
          <criterion comment="squid runlevel 3" test_ref="oval:ssg:tst:591"/>
          <criterion comment="squid runlevel 4" test_ref="oval:ssg:tst:592"/>
          <criterion comment="squid runlevel 5" test_ref="oval:ssg:tst:593"/>
          <criterion comment="squid runlevel 6" test_ref="oval:ssg:tst:594"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:595" version="1">
      <metadata>
        <title>Set Password Expiration Parameters</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password minimum length should be set appropriately.</description>
      <reference source="ssg" ref_id="accounts_password_minlen_login_defs"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:596"/>
        <criterion test_ref="oval:ssg:tst:597"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:598" version="1">
      <metadata>
        <title>Service saslauthd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The saslauthd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_saslauthd_disabled"/></metadata>
      <criteria comment="package cyrus-sasl removed or service saslauthd is not configured to start" operator="OR">
        <extend_definition comment="cyrus-sasl removed" definition_ref="oval:ssg:def:504"/>
        <criteria operator="AND" comment="service saslauthd is not configured to start">
          <criterion comment="saslauthd runlevel 0" test_ref="oval:ssg:tst:599"/>
          <criterion comment="saslauthd runlevel 1" test_ref="oval:ssg:tst:600"/>
          <criterion comment="saslauthd runlevel 2" test_ref="oval:ssg:tst:601"/>
          <criterion comment="saslauthd runlevel 3" test_ref="oval:ssg:tst:602"/>
          <criterion comment="saslauthd runlevel 4" test_ref="oval:ssg:tst:603"/>
          <criterion comment="saslauthd runlevel 5" test_ref="oval:ssg:tst:604"/>
          <criterion comment="saslauthd runlevel 6" test_ref="oval:ssg:tst:605"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:606" version="1">
      <metadata>
        <title>Ensure Yum gpgcheck Globally Activated</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The gpgcheck option should be used to ensure
      that checking of an RPM package's signature always occurs
      prior to its installation.</description>
      <reference source="ssg" ref_id="yum_gpgcheck_global_activation"/></metadata>
      <criteria>
        <criterion comment="check value of gpgcheck in /etc/yum.conf" test_ref="oval:ssg:tst:607"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:608" version="1">
      <metadata>
        <title>Service autofs Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The autofs service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_autofs_disabled"/></metadata>
      <criteria operator="AND" comment="service autofs is not configured to start">
        <criterion comment="autofs runlevel 0" test_ref="oval:ssg:tst:609"/>
        <criterion comment="autofs runlevel 1" test_ref="oval:ssg:tst:610"/>
        <criterion comment="autofs runlevel 2" test_ref="oval:ssg:tst:611"/>
        <criterion comment="autofs runlevel 3" test_ref="oval:ssg:tst:612"/>
        <criterion comment="autofs runlevel 4" test_ref="oval:ssg:tst:613"/>
        <criterion comment="autofs runlevel 5" test_ref="oval:ssg:tst:614"/>
        <criterion comment="autofs runlevel 6" test_ref="oval:ssg:tst:615"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:616" version="1">
      <metadata>
        <title>Package vsftpd Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package vsftpd should be removed.</description>
      <reference source="ssg" ref_id="package_vsftpd_removed"/></metadata>
      <criteria>
        <criterion comment="package vsftpd is removed" test_ref="oval:ssg:tst:617"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:618" version="1">
      <metadata>
        <title>All Password Hashes Shadowed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All password hashes should be shadowed.</description>
      <reference source="ssg" ref_id="accounts_password_all_shadowed"/></metadata>
      <criteria>
        <criterion comment="password hashes are shadowed" test_ref="oval:ssg:tst:619"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:620" version="1">
      <metadata>
        <title>Package cups Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package cups should be removed.</description>
      <reference source="ssg" ref_id="package_cups_removed"/></metadata>
      <criteria>
        <criterion comment="package cups is removed" test_ref="oval:ssg:tst:621"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:622" version="1">
      <metadata>
        <title>Restrict Virtual Console Root Logins</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Preventing direct root login to virtual console devices
      helps ensure accountability for actions taken on the system
      using the root account.</description>
      <reference source="ssg" ref_id="securetty_root_login_console_only"/></metadata>
      <criteria>
        <criterion comment="virtual consoles /etc/securetty" test_ref="oval:ssg:tst:623"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:624" version="1">
      <metadata>
        <title>Service cups Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The cups service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_cups_disabled"/></metadata>
      <criteria comment="package cups removed or service cups is not configured to start" operator="OR">
        <extend_definition comment="cups removed" definition_ref="oval:ssg:def:620"/>
        <criteria operator="AND" comment="service cups is not configured to start">
          <criterion comment="cups runlevel 0" test_ref="oval:ssg:tst:625"/>
          <criterion comment="cups runlevel 1" test_ref="oval:ssg:tst:626"/>
          <criterion comment="cups runlevel 2" test_ref="oval:ssg:tst:627"/>
          <criterion comment="cups runlevel 3" test_ref="oval:ssg:tst:628"/>
          <criterion comment="cups runlevel 4" test_ref="oval:ssg:tst:629"/>
          <criterion comment="cups runlevel 5" test_ref="oval:ssg:tst:630"/>
          <criterion comment="cups runlevel 6" test_ref="oval:ssg:tst:631"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:632" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.default.send_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.default.send_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_default_send_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" test_ref="oval:ssg:tst:633"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:634" version="1">
      <metadata>
        <title>Package telnet-server Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package telnet-server should be removed.</description>
      <reference source="ssg" ref_id="package_telnet-server_removed"/></metadata>
      <criteria>
        <criterion comment="package telnet-server is removed" test_ref="oval:ssg:tst:635"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:636" version="1">
      <metadata>
        <title>Verify File Hashes with RPM</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Verify the MD5 hashes of system binaries using the RPM database.</description>
      <reference source="ssg" ref_id="rpm_verify_hashes"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:637" comment="verify file md5 hashes"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:638" version="1">
      <metadata>
        <title>Ensure /home Located On Separate Partition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>If user home directories will be stored locally,
      create a separate partition for /home. If /home will be mounted
      from another system such as an NFS server, then creating a separate
      partition is not necessary at this time, and the mountpoint can
      instead be configured later.</description>
      <reference source="ssg" ref_id="partition_for_home"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:639" comment="/home on own partition"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:640" version="1">
      <metadata>
        <title>Set Last Logon/Access Notification</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Configure the system to notify users of last logon/access using pam_lastlog.</description>
      <reference source="ssg" ref_id="display_login_attempts"/></metadata>
      <criteria>
        <criterion comment="Conditions for pam_lastlog are satisfied" test_ref="oval:ssg:tst:641"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:288" version="1">
      <metadata>
        <title>Package openssh-server Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package openssh-server should be removed.</description>
      <reference source="ssg" ref_id="package_openssh-server_removed"/></metadata>
      <criteria>
        <criterion comment="package openssh-server is removed" test_ref="oval:ssg:tst:642"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:643" version="1">
      <metadata>
        <title>Add nosuid Option to /tmp</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nosuid mount option should be set for temporary
      storage partitions such as /tmp. The suid/sgid permissions
      should not be required in these world-writable directories.</description>
      <reference source="ssg" ref_id="mount_option_tmp_nosuid"/></metadata>
      <criteria>
        <criterion comment="nosuid on /tmp" test_ref="oval:ssg:tst:644"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:645" version="1">
      <metadata>
        <title>Package dhcpd Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package dhcpd should be removed.</description>
      <reference source="ssg" ref_id="package_dhcpd_removed"/></metadata>
      <criteria>
        <criterion comment="package dhcpd is removed" test_ref="oval:ssg:tst:646"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:647" version="1">
      <metadata>
        <title>Service cpuspeed Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The cpuspeed service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_cpuspeed_disabled"/></metadata>
      <criteria comment="package cpuspeed removed or service cpuspeed is not configured to start" operator="OR">
        <extend_definition comment="cpuspeed removed" definition_ref="oval:ssg:def:648"/>
        <criteria operator="AND" comment="service cpuspeed is not configured to start">
          <criterion comment="cpuspeed runlevel 0" test_ref="oval:ssg:tst:649"/>
          <criterion comment="cpuspeed runlevel 1" test_ref="oval:ssg:tst:650"/>
          <criterion comment="cpuspeed runlevel 2" test_ref="oval:ssg:tst:651"/>
          <criterion comment="cpuspeed runlevel 3" test_ref="oval:ssg:tst:652"/>
          <criterion comment="cpuspeed runlevel 4" test_ref="oval:ssg:tst:653"/>
          <criterion comment="cpuspeed runlevel 5" test_ref="oval:ssg:tst:654"/>
          <criterion comment="cpuspeed runlevel 6" test_ref="oval:ssg:tst:655"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:656" version="1">
      <metadata>
        <title>Service netconsole Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The netconsole service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_netconsole_disabled"/></metadata>
      <criteria operator="AND" comment="service netconsole is not configured to start">
        <criterion comment="netconsole runlevel 0" test_ref="oval:ssg:tst:657"/>
        <criterion comment="netconsole runlevel 1" test_ref="oval:ssg:tst:658"/>
        <criterion comment="netconsole runlevel 2" test_ref="oval:ssg:tst:659"/>
        <criterion comment="netconsole runlevel 3" test_ref="oval:ssg:tst:660"/>
        <criterion comment="netconsole runlevel 4" test_ref="oval:ssg:tst:661"/>
        <criterion comment="netconsole runlevel 5" test_ref="oval:ssg:tst:662"/>
        <criterion comment="netconsole runlevel 6" test_ref="oval:ssg:tst:663"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:664" version="1">
      <metadata>
        <title>Service rpcidmapd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rpcidmapd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rpcidmapd_disabled"/></metadata>
      <criteria comment="package nfs-utils removed or service rpcidmapd is not configured to start" operator="OR">
        <extend_definition comment="nfs-utils removed" definition_ref="oval:ssg:def:396"/>
        <criteria operator="AND" comment="service rpcidmapd is not configured to start">
          <criterion comment="rpcidmapd runlevel 0" test_ref="oval:ssg:tst:665"/>
          <criterion comment="rpcidmapd runlevel 1" test_ref="oval:ssg:tst:666"/>
          <criterion comment="rpcidmapd runlevel 2" test_ref="oval:ssg:tst:667"/>
          <criterion comment="rpcidmapd runlevel 3" test_ref="oval:ssg:tst:668"/>
          <criterion comment="rpcidmapd runlevel 4" test_ref="oval:ssg:tst:669"/>
          <criterion comment="rpcidmapd runlevel 5" test_ref="oval:ssg:tst:670"/>
          <criterion comment="rpcidmapd runlevel 6" test_ref="oval:ssg:tst:671"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:672" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - lsetxattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_lsetxattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification lsetxattr x32" test_ref="oval:ssg:tst:673"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification lsetxattr x64" test_ref="oval:ssg:tst:674"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:675" version="1">
      <metadata>
        <title>Add nosuid Option to Removable Media Partitions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nosuid mount option prevents set-user-identifier (suid)
      and set-group-identifier (sgid) permissions from taking effect. These permissions
      allow users to execute binaries with the same permissions as the owner and group
      of the file respectively. Users should not be allowed to introduce suid and guid
      files into the system via partitions mounted from removeable media.</description>
      <reference source="ssg" ref_id="mount_option_nosuid_removable_partitions"/></metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:ssg:tst:676" comment="nosuid on removable partition"/>
        <criterion test_ref="oval:ssg:tst:677" comment="removable partition /etc/fstab"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:678" version="1">
      <metadata>
        <title>Ensure /tmp Located On Separate Partition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /tmp directory is a world-writable directory
      used for temporary file storage. Verify that it has its own
      partition or logical volume.</description>
      <reference source="ssg" ref_id="partition_for_tmp"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:679" comment="/tmp on own partition"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:680" version="1">
      <metadata>
        <title>Set Password Hashing Algorithm in /etc/pam.d/system-auth</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.</description>
      <reference source="ssg" ref_id="set_password_hashing_algorithm_systemauth"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:681"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:682" version="1">
      <metadata>
        <title>Set OpenSSH Idle Timeout Interval</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The SSH idle timeout interval should be set to an
      appropriate value.</description>
      <reference source="ssg" ref_id="sshd_idle_timeout"/></metadata>
      <criteria comment="sshd service disabled or timeout set" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="check ClientAliveInterval in /etc/ssh/sshd_config" test_ref="oval:ssg:tst:683"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:684" version="1">
      <metadata>
        <title>Configure GUI Screen Locking</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The allowed period of inactivity before the screensaver is activated.</description>
      <reference source="ssg" ref_id="gconf_gnome_screensaver_idle_delay"/></metadata>
      <criteria>
        <criterion comment="check value of idle_delay in GCONF" test_ref="oval:ssg:tst:685"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:686" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "kernel.exec-shield" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "kernel.exec-shield" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_kernel_exec_shield"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter kernel.exec-shield set to 1" test_ref="oval:ssg:tst:687"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:688" version="1">
      <metadata>
        <title>Service xinetd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The xinetd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_xinetd_disabled"/></metadata>
      <criteria comment="package xinetd removed or service xinetd is not configured to start" operator="OR">
        <extend_definition comment="xinetd removed" definition_ref="oval:ssg:def:272"/>
        <criteria operator="AND" comment="service xinetd is not configured to start">
          <criterion comment="xinetd runlevel 0" test_ref="oval:ssg:tst:689"/>
          <criterion comment="xinetd runlevel 1" test_ref="oval:ssg:tst:690"/>
          <criterion comment="xinetd runlevel 2" test_ref="oval:ssg:tst:691"/>
          <criterion comment="xinetd runlevel 3" test_ref="oval:ssg:tst:692"/>
          <criterion comment="xinetd runlevel 4" test_ref="oval:ssg:tst:693"/>
          <criterion comment="xinetd runlevel 5" test_ref="oval:ssg:tst:694"/>
          <criterion comment="xinetd runlevel 6" test_ref="oval:ssg:tst:695"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:352" version="1">
      <metadata>
        <title>Package ntpdate Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package ntpdate should be removed.</description>
      <reference source="ssg" ref_id="package_ntpdate_removed"/></metadata>
      <criteria>
        <criterion comment="package ntpdate is removed" test_ref="oval:ssg:tst:696"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:697" version="1">
      <metadata>
        <title>Configure LDAP to Use TLS for All Transactions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Require the use of TLS for ldap clients.</description>
      <reference source="ssg" ref_id="ldap_client_start_tls"/></metadata>
      <criteria comment="package pam_ldap is not present" operator="OR">
        <extend_definition comment="pam_ldap not present or not in use" definition_ref="oval:ssg:def:698" negate="true"/>
        <criterion comment="look for ssl start_tls in /etc/pam_ldap.conf" test_ref="oval:ssg:tst:699"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:700" version="1">
      <metadata>
        <title>Find Unauthorized World-Writable Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The world-write permission should be disabled for all files.</description>
      <reference source="ssg" ref_id="file_permissions_unauthorized_world_writable"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:701"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:702" version="1">
      <metadata>
        <title>Implement idle activation of screen lock</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Idle activation of the screen lock should be enabled.</description>
      <reference source="ssg" ref_id="gconf_gnome_screensaver_lock_enabled"/></metadata>
      <criteria>
        <criterion comment="screensaver lock is enabled" test_ref="oval:ssg:tst:703"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:704" version="1">
      <metadata>
        <title>Record Attempts to Alter Time Through Stime</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Record attempts to alter time through stime, note that this
 is only relevant on 32bit architecture.</description>
      <reference source="ssg" ref_id="audit_rules_time_stime"/></metadata>
      <criteria comment="Test for either..." operator="OR">
        <criteria comment="both..." operator="AND">
          <extend_definition comment="32bit and ..." definition_ref="oval:ssg:def:574"/>
          <criterion comment="32bit line stime and key present" test_ref="oval:ssg:tst:705"/>
        </criteria>
        <criteria comment="both ...">
          <extend_definition comment="64bit and ..." definition_ref="oval:ssg:def:334"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:706" version="1">
      <metadata>
        <title>Disable Plaintext Authentication in Dovecot</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Plaintext authentication of mail clients should be disabled.</description>
      <reference source="ssg" ref_id="dovecot_disable_plaintext_auth"/></metadata>
      <criteria comment="Disable Plaintext Authentication in Dovecot">
        <criterion test_ref="oval:ssg:tst:707"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:708" version="1">
      <metadata>
        <title>File /boot/grub/grub.conf Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>File permissions for /boot/grub/grub.conf should be set to 0600.</description>
      <reference source="ssg" ref_id="file_permissions_grub_conf"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:709"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:710" version="1">
      <metadata>
        <title>Service rsyslog Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rsyslog service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_rsyslog_enabled"/></metadata>
      <criteria comment="package rsyslog installed and service rsyslog is configured to start" operator="AND">
        <extend_definition comment="rsyslog installed" definition_ref="oval:ssg:def:711"/>
        <criteria operator="OR" comment="service rsyslog is configured to start">
          <criterion comment="rsyslog runlevel 0" test_ref="oval:ssg:tst:712"/>
          <criterion comment="rsyslog runlevel 1" test_ref="oval:ssg:tst:713"/>
          <criterion comment="rsyslog runlevel 2" test_ref="oval:ssg:tst:714"/>
          <criterion comment="rsyslog runlevel 3" test_ref="oval:ssg:tst:715"/>
          <criterion comment="rsyslog runlevel 4" test_ref="oval:ssg:tst:716"/>
          <criterion comment="rsyslog runlevel 5" test_ref="oval:ssg:tst:717"/>
          <criterion comment="rsyslog runlevel 6" test_ref="oval:ssg:tst:718"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:719" version="1">
      <metadata>
        <title>Record Attempts to Alter Time Through Adjtimex</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Record attempts to alter time through adjtimex.
      </description>
      <reference source="ssg" ref_id="audit_rules_time_adjtimex"/></metadata>
      <criteria comment="Test for either..." operator="OR">
        <criteria comment="both..." operator="AND">
          <extend_definition comment="32bit and ..." definition_ref="oval:ssg:def:574"/>
          <criterion comment="32bit line adjtimex and key present" test_ref="oval:ssg:tst:720"/>
        </criteria>
        <criteria comment="both ..." operator="AND">
          <extend_definition comment="64bit and ..." definition_ref="oval:ssg:def:334"/>
          <criterion comment="64bit line for adjtimex and key present" test_ref="oval:ssg:tst:721"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:722" version="1">
      <metadata>
        <title>Disable udf Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module udf should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_udf_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:723" comment="kernel module udf disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:724" version="1">
      <metadata>
        <title>Verify /etc/passwd Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>This test makes sure that /etc/passwd is owned by 0, group owned by 0, and has mode 0644. If
      the target file or directory has an extended ACL then it will fail the mode check.</description>
      <reference source="ssg" ref_id="file_permissions_etc_passwd"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:725"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:726" version="1">
      <metadata>
        <title>Service cgred Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The cgred service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_cgred_disabled"/></metadata>
      <criteria operator="AND" comment="service cgred is not configured to start">
        <criterion comment="cgred runlevel 0" test_ref="oval:ssg:tst:727"/>
        <criterion comment="cgred runlevel 1" test_ref="oval:ssg:tst:728"/>
        <criterion comment="cgred runlevel 2" test_ref="oval:ssg:tst:729"/>
        <criterion comment="cgred runlevel 3" test_ref="oval:ssg:tst:730"/>
        <criterion comment="cgred runlevel 4" test_ref="oval:ssg:tst:731"/>
        <criterion comment="cgred runlevel 5" test_ref="oval:ssg:tst:732"/>
        <criterion comment="cgred runlevel 6" test_ref="oval:ssg:tst:733"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:734" version="1">
      <metadata>
        <title>Enable SELinux</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>SELinux should be enabled</description>
      <reference source="ssg" ref_id="selinux_bootloader_notdisabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:735"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:736" version="1">
      <metadata>
        <title>SELinux Enforcing</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The SELinux state should be enforcing the local policy.</description>
      <reference source="ssg" ref_id="selinux_mode"/></metadata>
      <criteria operator="AND">
        <criterion comment="enforce is disabled" test_ref="oval:ssg:tst:737"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:738" version="1">
      <metadata>
        <title>Audit System Administrator Actions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit actions taken by system administrators on the system.</description>
      <reference source="ssg" ref_id="audit_rules_sysadmin_actions"/></metadata>
      <criteria>
        <criterion comment="audit sudoers" test_ref="oval:ssg:tst:739"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:740" version="1">
      <metadata>
        <title>Auditd Action to Take When Disk Starting to Run Low on Space</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>space_left_action setting in /etc/audit/auditd.conf is set to a certain action</description>
      <reference source="ssg" ref_id="auditd_data_retention_space_left_action"/></metadata>
      <criteria>
        <criterion comment="space_left_action setting in auditd.conf" test_ref="oval:ssg:tst:741"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:742" version="1">
      <metadata>
        <title>Service auditd Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The auditd service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_auditd_enabled"/></metadata>
      <criteria comment="package audit installed and service auditd is configured to start" operator="AND">
        <extend_definition comment="audit installed" definition_ref="oval:ssg:def:226"/>
        <criteria operator="OR" comment="service auditd is configured to start">
          <criterion comment="auditd runlevel 0" test_ref="oval:ssg:tst:743"/>
          <criterion comment="auditd runlevel 1" test_ref="oval:ssg:tst:744"/>
          <criterion comment="auditd runlevel 2" test_ref="oval:ssg:tst:745"/>
          <criterion comment="auditd runlevel 3" test_ref="oval:ssg:tst:746"/>
          <criterion comment="auditd runlevel 4" test_ref="oval:ssg:tst:747"/>
          <criterion comment="auditd runlevel 5" test_ref="oval:ssg:tst:748"/>
          <criterion comment="auditd runlevel 6" test_ref="oval:ssg:tst:749"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:750" version="1">
      <metadata>
        <title>Ensure /var Located On Separate Partition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Ensuring that /var is mounted on its own partition enables the
      setting of more restrictive mount options, which is used as temporary
      storage by many program, particularly system services such as daemons.
      It is not uncommon for the /var directory to contain world-writable directories,
      installed by other software packages.</description>
      <reference source="ssg" ref_id="partition_for_var"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:751" comment="/var on own partition"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:752" version="1">
      <metadata>
        <title>Set Boot Loader Password</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The grub boot loader should have password protection enabled.</description>
      <reference source="ssg" ref_id="bootloader_password"/></metadata>
      <criteria>
        <criterion comment="make sure a password is defined in /etc/grub.conf" test_ref="oval:ssg:tst:753"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:754" version="1">
      <metadata>
        <title>Verify user who owns 'passwd' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/passwd file should be owned by the
      appropriate user.</description>
      <reference source="ssg" ref_id="file_owner_etc_passwd"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:755"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:756" version="1">
      <metadata>
        <title>Verify SSH Private Host Keys Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks for correct permissions on SSH private host keys in the given SSH configuration directory.</description>
      <reference source="ssg" ref_id="file_ssh_host_keys_private_permissions"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:757"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:758" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - removexattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_removexattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification removexattr x32" test_ref="oval:ssg:tst:759"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification removexattr x64" test_ref="oval:ssg:tst:760"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:761" version="1">
      <metadata>
        <title>Disable Rsyslogd from Accepting Remote Messages on
      Loghosts Only</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>RSyslogd should reject remote
      messages</description>
      <reference source="ssg" ref_id="rsyslog_nolisten"/></metadata>
      <criteria>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:762"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:763" version="1">
      <metadata>
        <title>Find Unauthorized SUID System Executables</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The suid bit should be not set for all files.</description>
      <reference source="ssg" ref_id="file_permissions_unauthorized_suid"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:764"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:765" version="1">
      <metadata>
        <title>Service atd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The atd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_atd_disabled"/></metadata>
      <criteria comment="package at removed or service atd is not configured to start" operator="OR">
        <extend_definition comment="at removed" definition_ref="oval:ssg:def:330"/>
        <criteria operator="AND" comment="service atd is not configured to start">
          <criterion comment="atd runlevel 0" test_ref="oval:ssg:tst:766"/>
          <criterion comment="atd runlevel 1" test_ref="oval:ssg:tst:767"/>
          <criterion comment="atd runlevel 2" test_ref="oval:ssg:tst:768"/>
          <criterion comment="atd runlevel 3" test_ref="oval:ssg:tst:769"/>
          <criterion comment="atd runlevel 4" test_ref="oval:ssg:tst:770"/>
          <criterion comment="atd runlevel 5" test_ref="oval:ssg:tst:771"/>
          <criterion comment="atd runlevel 6" test_ref="oval:ssg:tst:772"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:773" version="1">
      <metadata>
        <title>Disable root Login via SSH</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Root login via SSH should be disabled (and
      dependencies are met)</description>
      <reference source="ssg" ref_id="sshd_permitrootlogin_no"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:774"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:775" version="1">
      <metadata>
        <title>Package ypbind Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package ypbind should be removed.</description>
      <reference source="ssg" ref_id="package_ypbind_removed"/></metadata>
      <criteria>
        <criterion comment="package ypbind is removed" test_ref="oval:ssg:tst:776"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:777" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fchown</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fchown"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fchown x32" test_ref="oval:ssg:tst:778"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fchown x64" test_ref="oval:ssg:tst:779"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="miscellaneous" id="oval:ssg:def:574" version="1">
      <!-- Note that this does not meet requirements for class=inventory as that 
only tests for patches per 5.10.1 Revision 1 -->
      <metadata>
        <title>Test for x86 Architecture</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Generic test for x86 architecture to be used by other tests</description>
      <reference source="ssg" ref_id="system_info_architecture_x86"/></metadata>
      <criteria>
        <criterion comment="Generic test for x86 architecture" test_ref="oval:ssg:tst:780"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:781" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - setxattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_setxattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification setxattr x32" test_ref="oval:ssg:tst:782"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification setxattr x64" test_ref="oval:ssg:tst:783"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:784" version="1">
      <metadata>
        <title>Service rpcgssd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rpcgssd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rpcgssd_disabled"/></metadata>
      <criteria comment="package nfs-utils removed or service rpcgssd is not configured to start" operator="OR">
        <extend_definition comment="nfs-utils removed" definition_ref="oval:ssg:def:396"/>
        <criteria operator="AND" comment="service rpcgssd is not configured to start">
          <criterion comment="rpcgssd runlevel 0" test_ref="oval:ssg:tst:785"/>
          <criterion comment="rpcgssd runlevel 1" test_ref="oval:ssg:tst:786"/>
          <criterion comment="rpcgssd runlevel 2" test_ref="oval:ssg:tst:787"/>
          <criterion comment="rpcgssd runlevel 3" test_ref="oval:ssg:tst:788"/>
          <criterion comment="rpcgssd runlevel 4" test_ref="oval:ssg:tst:789"/>
          <criterion comment="rpcgssd runlevel 5" test_ref="oval:ssg:tst:790"/>
          <criterion comment="rpcgssd runlevel 6" test_ref="oval:ssg:tst:791"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:792" version="1">
      <metadata>
        <title>Disable DHCP Client</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>DHCP configuration should be static for all
      interfaces.</description>
      <reference source="ssg" ref_id="sysconfig_networking_bootproto_ifcfg"/></metadata>
      <criteria comment="Test for BOOTPROTO=static across all interfaces">
        <criterion test_ref="oval:ssg:tst:793"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:794" version="1">
      <metadata>
        <title>No nullok Option in /etc/pam.d/system-auth</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The file /etc/pam.d/system-auth should not contain the nullok option</description>
      <reference source="ssg" ref_id="accounts_pam_no_nullok"/></metadata>
      <criteria>
        <criterion comment="make sure the nullok option is not used in /etc/pam.d/system-auth" test_ref="oval:ssg:tst:795"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:796" version="1">
      <metadata>
        <title>Set Accounts to Expire Following Password Expiration</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The accounts should be configured to expire automatically following password expiration.</description>
      <reference source="ssg" ref_id="accounts_disable_post_pw_expiration"/></metadata>
      <criteria comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd">
        <criterion test_ref="oval:ssg:tst:797"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:798" version="1">
      <metadata>
        <title>Disable Core Dumps</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Core dumps for all users should be
      disabled</description>
      <reference source="ssg" ref_id="core_dumps_limitsconf"/></metadata>
      <criteria>
        <criterion comment="Are core dumps disabled" test_ref="oval:ssg:tst:799"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:800" version="1">
      <metadata>
        <title>Set Password Expiration Parameters</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The minimum password age policy should be set appropriately.</description>
      <reference source="ssg" ref_id="accounts_minimum_age_login_defs"/></metadata>
      <criteria comment="the value PASS_MIN_DAYS should be set appropriately in /etc/login.defs">
        <criterion test_ref="oval:ssg:tst:801"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:802" version="1">
      <metadata>
        <title>Package psacct Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package psacct should be installed.</description>
      <reference source="ssg" ref_id="package_psacct_installed"/></metadata>
      <criteria>
        <criterion comment="package psacct is installed" test_ref="oval:ssg:tst:803"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:804" version="1">
      <metadata>
        <title>Deactivate Wireless Interfaces</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All wireless interfaces should be disabled.</description>
      <reference source="ssg" ref_id="wireless_disable_interfaces"/></metadata>
      <criteria>
        <criterion comment="query /proc/net/wireless" test_ref="oval:ssg:tst:805"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:806" version="1">
      <metadata>
        <title>Disable All GNOME Thumbnailers</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The system's default desktop environment, GNOME, uses a number of different thumbnailer programs to generate thumbnails for any new or modified content in an opened folder. Disable the execution of these thumbnail applications within GNOME.</description>
      <reference source="ssg" ref_id="gconf_gnome_disable_thumbnailers"/></metadata>
      <criteria>
        <criterion comment="Disable thumbnailers in GNOME" test_ref="oval:ssg:tst:807"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:808" version="1">
      <metadata>
        <title>Audit Kernel Module Loading and Unloading</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The audit rules should be configured to log information about kernel module loading and unloading.</description>
      <reference source="ssg" ref_id="audit_rules_kernel_module_loading"/></metadata>
      <criteria operator="AND">
        <criterion comment="audit insmod" test_ref="oval:ssg:tst:809"/>
        <criterion comment="audit rmmod" test_ref="oval:ssg:tst:810"/>
        <criterion comment="audit rmmod" test_ref="oval:ssg:tst:811"/>
        <criterion comment="audit module syscalls" test_ref="oval:ssg:tst:812"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:813" version="1">
      <metadata>
        <title>Package rhnsd Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package rhnsd should be removed.</description>
      <reference source="ssg" ref_id="package_rhnsd_removed"/></metadata>
      <criteria>
        <criterion comment="package rhnsd is removed" test_ref="oval:ssg:tst:814"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:411" version="1">
      <metadata>
        <title>Package abrt Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package abrt should be removed.</description>
      <reference source="ssg" ref_id="package_abrt_removed"/></metadata>
      <criteria>
        <criterion comment="package abrt is removed" test_ref="oval:ssg:tst:815"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:816" version="1">
      <metadata>
        <title>Add nodev Option to /dev/shm</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Legitimate character and block devices should not exist
      within temporary directories like /dev/shm. The nodev mount option should
      be specified for /dev/shm.</description>
      <reference source="ssg" ref_id="mount_option_dev_shm_nodev"/></metadata>
      <criteria>
        <criterion comment="nodev on /dev/shm" test_ref="oval:ssg:tst:817"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:818" version="1">
      <metadata>
        <title>Auditd Action to Take When Disk is Low on Space</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action</description>
      <reference source="ssg" ref_id="auditd_data_retention_admin_space_left_action"/></metadata>
      <criteria>
        <criterion comment="admin_space_left_action setting in auditd.conf" test_ref="oval:ssg:tst:819"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:820" version="1">
      <metadata>
        <title>Require Client SMB Packet Signing in smb.conf</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Require samba clients which use smb.conf, such as smbclient, to 
      use packet signing. A Samba client should only communicate with servers who can support SMB packet signing.</description>
      <reference source="ssg" ref_id="smb_client_signing_smb_conf"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="package samba-common is not installed" definition_ref="oval:ssg:def:821"/>
        <criterion comment="check for client signing = mandatory in /etc/samba/smb.conf" test_ref="oval:ssg:tst:822"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:823" version="1">
      <metadata>
        <title>Auditd Maximum Log File Size</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>max_log_file setting in /etc/audit/auditd.conf is set to at least a certain value</description>
      <reference source="ssg" ref_id="auditd_data_retention_max_log_file"/></metadata>
      <criteria>
        <criterion comment="max_log_file setting in auditd.conf" test_ref="oval:ssg:tst:824"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:825" version="1">
      <metadata>
        <title>Ensure auditd Collects Unauthorized Access Attempts to
      Files (unsuccessful)</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules about the Unauthorized Access
      Attempts to Files (unsuccessful) are enabled</description>
      <reference source="ssg" ref_id="audit_rules_unsuccessful_file_modification"/></metadata>
      <criteria operator="AND">
        <criterion comment="audit file eacces" test_ref="oval:ssg:tst:826"/>
        <criterion comment="audit file eperm" test_ref="oval:ssg:tst:827"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:828" version="1">
      <metadata>
        <title>Verify group who owns 'gshadow' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/gshadow file should be owned by the
      appropriate group.</description>
      <reference source="ssg" ref_id="file_groupowner_etc_gshadow"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:829"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:830" version="1">
      <metadata>
        <title>Service smb Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The smb service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_smb_disabled"/></metadata>
      <criteria operator="AND" comment="service smb is not configured to start">
        <criterion comment="smb runlevel 0" test_ref="oval:ssg:tst:831"/>
        <criterion comment="smb runlevel 1" test_ref="oval:ssg:tst:832"/>
        <criterion comment="smb runlevel 2" test_ref="oval:ssg:tst:833"/>
        <criterion comment="smb runlevel 3" test_ref="oval:ssg:tst:834"/>
        <criterion comment="smb runlevel 4" test_ref="oval:ssg:tst:835"/>
        <criterion comment="smb runlevel 5" test_ref="oval:ssg:tst:836"/>
        <criterion comment="smb runlevel 6" test_ref="oval:ssg:tst:837"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:838" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv6.conf.default.accept_ra" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv6.conf.default.accept_ra" should be set to configured.</description>
      <reference source="ssg" ref_id="sysctl_net_ipv6_conf_default_accept_ra"/></metadata>
      <criteria operator="OR">
        <extend_definition comment="IPv6 disabled or..." definition_ref="oval:ssg:def:111"/>
        <criterion comment="kernel runtime parameter net.ipv6.conf.default.accept_ra is set" test_ref="oval:ssg:tst:839"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:840" version="1">
      <metadata>
        <title>Service qpidd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The qpidd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_qpidd_disabled"/></metadata>
      <criteria comment="package qpid-cpp-server removed or service qpidd is not configured to start" operator="OR">
        <extend_definition comment="qpid-cpp-server removed" definition_ref="oval:ssg:def:841"/>
        <criteria operator="AND" comment="service qpidd is not configured to start">
          <criterion comment="qpidd runlevel 0" test_ref="oval:ssg:tst:842"/>
          <criterion comment="qpidd runlevel 1" test_ref="oval:ssg:tst:843"/>
          <criterion comment="qpidd runlevel 2" test_ref="oval:ssg:tst:844"/>
          <criterion comment="qpidd runlevel 3" test_ref="oval:ssg:tst:845"/>
          <criterion comment="qpidd runlevel 4" test_ref="oval:ssg:tst:846"/>
          <criterion comment="qpidd runlevel 5" test_ref="oval:ssg:tst:847"/>
          <criterion comment="qpidd runlevel 6" test_ref="oval:ssg:tst:848"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:849" version="1">
      <metadata>
        <title>Directory /etc/httpd/conf/ Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Directory permissions for /etc/httpd/conf/ should be set to 0750.</description>
      <reference source="ssg" ref_id="dir_perms_etc_httpd_conf"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:850"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:851" version="1">
      <metadata>
        <title>Confirm Existence and Permissions of System Log
      Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All syslog log files should be owned by the
      appropriate user.</description>
      <reference source="ssg" ref_id="rsyslog_files_ownership"/></metadata>
      <criteria>
        <criterion comment="check if group root owns all syslog log files" test_ref="oval:ssg:tst:852"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:853" version="1">
      <metadata>
        <title>Service tftp Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The tftp service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_tftp_disabled"/></metadata>
      <criteria comment="package tftp-server removed or service tftp is not configured to start" operator="OR">
        <extend_definition comment="tftp-server removed" definition_ref="oval:ssg:def:179"/>
        <criteria operator="AND" comment="service tftp is not configured to start">
          <criterion comment="tftp runlevel 0" test_ref="oval:ssg:tst:854"/>
          <criterion comment="tftp runlevel 1" test_ref="oval:ssg:tst:855"/>
          <criterion comment="tftp runlevel 2" test_ref="oval:ssg:tst:856"/>
          <criterion comment="tftp runlevel 3" test_ref="oval:ssg:tst:857"/>
          <criterion comment="tftp runlevel 4" test_ref="oval:ssg:tst:858"/>
          <criterion comment="tftp runlevel 5" test_ref="oval:ssg:tst:859"/>
          <criterion comment="tftp runlevel 6" test_ref="oval:ssg:tst:860"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:861" version="1">
      <metadata>
        <title>Add nodev Option to Non-Root Local Partitions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nodev mount option prevents files from being
      interpreted as character or block devices. Legitimate character and block
      devices should exist in the /dev directory on the root partition or
      within chroot jails built for system services. All other locations should not
      allow character and block devices.</description>
      <reference source="ssg" ref_id="mount_option_nodev_nonroot_local_partitions"/></metadata>
      <criteria>
        <criterion comment="nodev on local filesystems" test_ref="oval:ssg:tst:862"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:863" version="1">
      <metadata>
        <title>Package vsftpd Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package vsftpd should be installed.</description>
      <reference source="ssg" ref_id="package_vsftpd_installed"/></metadata>
      <criteria>
        <criterion comment="package vsftpd is installed" test_ref="oval:ssg:tst:864"/>
      </criteria>
    </definition>
    <definition class="inventory" id="oval:ssg:def:100" version="1">
      <metadata>
        <title>Red Hat Enterprise Linux 6</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <reference ref_id="cpe:/o:redhat:enterprise_linux:6" source="CPE"/>
        <description>The operating system installed on the system is
      Red Hat Enterprise Linux 6</description>
      <reference source="ssg" ref_id="installed_OS_is_rhel6"/></metadata>
      <criteria>
        <criterion comment="Installed operating system is part of the unix family" test_ref="oval:ssg:tst:101"/>
        <criterion comment="Red Hat Enterprise Linux 6 Workstation is installed" test_ref="oval:ssg:tst:102"/>
        <criterion comment="Red Hat Enterprise Linux 6 Server is installed" test_ref="oval:ssg:tst:103"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:865" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.send_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.send_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_send_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" test_ref="oval:ssg:tst:866"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:867" version="1">
      <metadata>
        <title>Service smartd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The smartd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_smartd_disabled"/></metadata>
      <criteria comment="package smartmontools removed or service smartd is not configured to start" operator="OR">
        <extend_definition comment="smartmontools removed" definition_ref="oval:ssg:def:322"/>
        <criteria operator="AND" comment="service smartd is not configured to start">
          <criterion comment="smartd runlevel 0" test_ref="oval:ssg:tst:868"/>
          <criterion comment="smartd runlevel 1" test_ref="oval:ssg:tst:869"/>
          <criterion comment="smartd runlevel 2" test_ref="oval:ssg:tst:870"/>
          <criterion comment="smartd runlevel 3" test_ref="oval:ssg:tst:871"/>
          <criterion comment="smartd runlevel 4" test_ref="oval:ssg:tst:872"/>
          <criterion comment="smartd runlevel 5" test_ref="oval:ssg:tst:873"/>
          <criterion comment="smartd runlevel 6" test_ref="oval:ssg:tst:874"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:875" version="1">
      <metadata>
        <title>Service snmpd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The snmpd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_snmpd_disabled"/></metadata>
      <criteria comment="package net-snmp removed or service snmpd is not configured to start" operator="OR">
        <extend_definition comment="net-snmp removed" definition_ref="oval:ssg:def:454"/>
        <criteria operator="AND" comment="service snmpd is not configured to start">
          <criterion comment="snmpd runlevel 0" test_ref="oval:ssg:tst:876"/>
          <criterion comment="snmpd runlevel 1" test_ref="oval:ssg:tst:877"/>
          <criterion comment="snmpd runlevel 2" test_ref="oval:ssg:tst:878"/>
          <criterion comment="snmpd runlevel 3" test_ref="oval:ssg:tst:879"/>
          <criterion comment="snmpd runlevel 4" test_ref="oval:ssg:tst:880"/>
          <criterion comment="snmpd runlevel 5" test_ref="oval:ssg:tst:881"/>
          <criterion comment="snmpd runlevel 6" test_ref="oval:ssg:tst:882"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:883" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.default.rp_filter" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.default.rp_filter" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_default_rp_filter"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to 1" test_ref="oval:ssg:tst:884"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:885" version="1">
      <metadata>
        <title>Package xorg-x11-server-common Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package xorg-x11-server-common should be removed.</description>
      <reference source="ssg" ref_id="package_xorg-x11-server-common_removed"/></metadata>
      <criteria>
        <criterion comment="package xorg-x11-server-common is removed" test_ref="oval:ssg:tst:886"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:887" version="1">
      <metadata>
        <title>Verify SSH Public Host Keys Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks for correct permissions on SSH public host keys in the given SSH configuration directory.</description>
      <reference source="ssg" ref_id="file_ssh_host_keys_public_permissions"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:888"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:889" version="1">
      <metadata>
        <title>Disable GNOME Automounting</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The system's default desktop environment, GNOME, will mount devices and removable media (such as DVDs, CDs and USB flash drives) whenever they are inserted into the system.  Disable automount and autorun within GNOME.</description>
      <reference source="ssg" ref_id="gconf_gnome_disable_automount"/></metadata>
      <criteria operator="AND">
        <criterion comment="Disable automount in GNOME" test_ref="oval:ssg:tst:890"/>
        <criterion comment="Disable autorun in GNOME" test_ref="oval:ssg:tst:891"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:892" version="1">
      <metadata>
        <title>Service vsftpd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The vsftpd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_vsftpd_disabled"/></metadata>
      <criteria comment="package vsftpd removed or service vsftpd is not configured to start" operator="OR">
        <extend_definition comment="vsftpd removed" definition_ref="oval:ssg:def:616"/>
        <criteria operator="AND" comment="service vsftpd is not configured to start">
          <criterion comment="vsftpd runlevel 0" test_ref="oval:ssg:tst:893"/>
          <criterion comment="vsftpd runlevel 1" test_ref="oval:ssg:tst:894"/>
          <criterion comment="vsftpd runlevel 2" test_ref="oval:ssg:tst:895"/>
          <criterion comment="vsftpd runlevel 3" test_ref="oval:ssg:tst:896"/>
          <criterion comment="vsftpd runlevel 4" test_ref="oval:ssg:tst:897"/>
          <criterion comment="vsftpd runlevel 5" test_ref="oval:ssg:tst:898"/>
          <criterion comment="vsftpd runlevel 6" test_ref="oval:ssg:tst:899"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:900" version="1">
      <metadata>
        <title>Package screen Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package screen should be installed.</description>
      <reference source="ssg" ref_id="package_screen_installed"/></metadata>
      <criteria>
        <criterion comment="package screen is installed" test_ref="oval:ssg:tst:901"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:902" version="1">
      <metadata>
        <title>Service rhsmcertd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rhsmcertd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rhsmcertd_disabled"/></metadata>
      <criteria comment="package subscription-manager removed or service rhsmcertd is not configured to start" operator="OR">
        <extend_definition comment="subscription-manager removed" definition_ref="oval:ssg:def:903"/>
        <criteria operator="AND" comment="service rhsmcertd is not configured to start">
          <criterion comment="rhsmcertd runlevel 0" test_ref="oval:ssg:tst:904"/>
          <criterion comment="rhsmcertd runlevel 1" test_ref="oval:ssg:tst:905"/>
          <criterion comment="rhsmcertd runlevel 2" test_ref="oval:ssg:tst:906"/>
          <criterion comment="rhsmcertd runlevel 3" test_ref="oval:ssg:tst:907"/>
          <criterion comment="rhsmcertd runlevel 4" test_ref="oval:ssg:tst:908"/>
          <criterion comment="rhsmcertd runlevel 5" test_ref="oval:ssg:tst:909"/>
          <criterion comment="rhsmcertd runlevel 6" test_ref="oval:ssg:tst:910"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:911" version="1">
      <metadata>
        <title>Add noexec Option to /dev/shm</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>It can be dangerous to allow the execution of binaries
      from world-writable temporary storage directories such as /dev/shm.
      The noexec mount option prevents binaries from being executed out of /dev/shm.</description>
      <reference source="ssg" ref_id="mount_option_dev_shm_noexec"/></metadata>
      <criteria>
        <criterion comment="noexec on /dev/shm" test_ref="oval:ssg:tst:912"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:297" version="1">
      <metadata>
        <title>Package quota Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package quota should be removed.</description>
      <reference source="ssg" ref_id="package_quota_removed"/></metadata>
      <criteria>
        <criterion comment="package quota is removed" test_ref="oval:ssg:tst:913"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:914" version="1">
      <metadata>
        <title>Ensure Logwatch HostLimit Configured</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Test if HostLimit line in logwatch.conf is set appropriately.</description>
      <reference source="ssg" ref_id="logwatch_configured_hostlimit"/></metadata>
      <criteria operator="AND">
        <criterion comment="hostlimit" test_ref="oval:ssg:tst:915"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:916" version="1">
      <metadata>
        <title>Verify Permissions On Apache Web Server Configuration Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/httpd/conf/* files should have the appropriate permissions.</description>
      <reference source="ssg" ref_id="file_permissions_httpd_server_conf_files"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:917"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:918" version="1">
      <metadata>
        <title>Service ypbind Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The ypbind service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_ypbind_disabled"/></metadata>
      <criteria comment="package ypbind removed or service ypbind is not configured to start" operator="OR">
        <extend_definition comment="ypbind removed" definition_ref="oval:ssg:def:775"/>
        <criteria operator="AND" comment="service ypbind is not configured to start">
          <criterion comment="ypbind runlevel 0" test_ref="oval:ssg:tst:919"/>
          <criterion comment="ypbind runlevel 1" test_ref="oval:ssg:tst:920"/>
          <criterion comment="ypbind runlevel 2" test_ref="oval:ssg:tst:921"/>
          <criterion comment="ypbind runlevel 3" test_ref="oval:ssg:tst:922"/>
          <criterion comment="ypbind runlevel 4" test_ref="oval:ssg:tst:923"/>
          <criterion comment="ypbind runlevel 5" test_ref="oval:ssg:tst:924"/>
          <criterion comment="ypbind runlevel 6" test_ref="oval:ssg:tst:925"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:926" version="1">
      <metadata>
        <title>Verify No netrc Files Exist</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The .netrc files contain login information used to auto-login into FTP servers and reside in the user's home directory. Any .netrc files should be removed.</description>
      <reference source="ssg" ref_id="no_netrc_files"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:927" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:928" version="1">
      <metadata>
        <title>Ensure All Logs are Rotated by logrotate</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The logrotate (syslog rotater) service should be
      enabled.</description>
      <reference source="ssg" ref_id="logrotate_rotate_all_files"/></metadata>
      <criteria>
        <criterion comment="Find each file in /etc/syslog.conf in /etc/logrotate.d/syslog" test_ref="oval:ssg:tst:929"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:930" version="1">
      <metadata>
        <title>Disable the network sniffer</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Disable the network sniffer</description>
      <reference source="ssg" ref_id="network_sniffer_disabled"/></metadata>
      <criteria>
        <criterion comment="promisc interfaces" test_ref="oval:ssg:tst:931" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:932" version="1">
      <metadata>
        <title>Service messagebus Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The messagebus service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_messagebus_disabled"/></metadata>
      <criteria comment="package dbus removed or service messagebus is not configured to start" operator="OR">
        <extend_definition comment="dbus removed" definition_ref="oval:ssg:def:367"/>
        <criteria operator="AND" comment="service messagebus is not configured to start">
          <criterion comment="messagebus runlevel 0" test_ref="oval:ssg:tst:933"/>
          <criterion comment="messagebus runlevel 1" test_ref="oval:ssg:tst:934"/>
          <criterion comment="messagebus runlevel 2" test_ref="oval:ssg:tst:935"/>
          <criterion comment="messagebus runlevel 3" test_ref="oval:ssg:tst:936"/>
          <criterion comment="messagebus runlevel 4" test_ref="oval:ssg:tst:937"/>
          <criterion comment="messagebus runlevel 5" test_ref="oval:ssg:tst:938"/>
          <criterion comment="messagebus runlevel 6" test_ref="oval:ssg:tst:939"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:563" version="1">
      <metadata>
        <title>Package portreserve Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package portreserve should be removed.</description>
      <reference source="ssg" ref_id="package_portreserve_removed"/></metadata>
      <criteria>
        <criterion comment="package portreserve is removed" test_ref="oval:ssg:tst:940"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:941" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.all.accept_source_route" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.all.accept_source_route" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_all_accept_source_route"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to 0" test_ref="oval:ssg:tst:942"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:943" version="1">
      <metadata>
        <title>Set ClientAliveCountMax for User Logins</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The SSH ClientAliveCountMax should be set to an
      appropriate value (and dependencies are met)</description>
      <reference source="ssg" ref_id="sshd_clientalivecountmax"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="check ClientAliveCountMax in /etc/ssh/sshd_config" test_ref="oval:ssg:tst:944"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:945" version="1">
      <metadata>
        <title>Record Events that Modify the System's Network Environment</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The network environment should not be modified by anything other than
      administrator action. Any change to network parameters should be audited.</description>
      <reference source="ssg" ref_id="audit_rules_networkconfig_modification"/></metadata>
      <criteria operator="AND">
        <criterion comment="network modification syscall" test_ref="oval:ssg:tst:946"/>
        <criterion comment="/etc/issue modification" test_ref="oval:ssg:tst:947"/>
        <criterion comment="/etc/issue.net modification" test_ref="oval:ssg:tst:948"/>
        <criterion comment="/etc/hosts modification" test_ref="oval:ssg:tst:949"/>
        <criterion comment="/etc/sysconfig/network modification" test_ref="oval:ssg:tst:950"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:951" version="1">
      <metadata>
        <title>Set Password dcredit Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password dcredit should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_dcredit"/></metadata>
      <criteria>
        <criterion comment="Conditions for dcredit are satisfied" test_ref="oval:ssg:tst:952"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:953" version="2">
      <metadata>
        <title>Disable Host-Based Authentication</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>SSH host-based authentication should be disabled.</description>
      <reference source="ssg" ref_id="sshd_hostbasedauthentication"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:954"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:955" version="1">
      <metadata>
        <title>Make Audit Configuration Immutable</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Force a reboot to change audit rules is
      enabled</description>
      <reference source="ssg" ref_id="audit_rules_immutable"/></metadata>
      <criteria>
        <criterion comment="immutable" test_ref="oval:ssg:tst:956"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:957" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - chown</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_chown"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification chown x32" test_ref="oval:ssg:tst:958"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification chown x64" test_ref="oval:ssg:tst:959"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:960" version="1">
      <metadata>
        <title>Enable GUI Warning Banner</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Enable the GUI warning banner.</description>
      <reference source="ssg" ref_id="banner_gui_enabled"/></metadata>
      <criteria>
        <criterion comment="check settings" test_ref="oval:ssg:tst:961"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:962" version="1">
      <metadata>
        <title>Package openldap-servers Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package openldap-servers should be removed.</description>
      <reference source="ssg" ref_id="package_openldap-servers_removed"/></metadata>
      <criteria>
        <criterion comment="package openldap-servers is removed" test_ref="oval:ssg:tst:963"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:964" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fchownat</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fchownat"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fchownat x32" test_ref="oval:ssg:tst:965"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fchownat x64" test_ref="oval:ssg:tst:966"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:903" version="1">
      <metadata>
        <title>Package subscription-manager Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package subscription-manager should be removed.</description>
      <reference source="ssg" ref_id="package_subscription-manager_removed"/></metadata>
      <criteria>
        <criterion comment="package subscription-manager is removed" test_ref="oval:ssg:tst:967"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:968" version="1">
      <metadata>
        <title>Disable Support for RPC IPv6</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Disable ipv6 based rpc services</description>
      <reference source="ssg" ref_id="network_ipv6_disable_rpc"/></metadata>
      <criteria operator="AND">
        <criterion comment="Disable udp6" test_ref="oval:ssg:tst:969"/>
        <criterion comment="Disable tcp6" test_ref="oval:ssg:tst:970"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:426" version="1">
      <metadata>
        <title>Package iptables Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package iptables should be installed.</description>
      <reference source="ssg" ref_id="package_iptables_installed"/></metadata>
      <criteria>
        <criterion comment="package iptables is installed" test_ref="oval:ssg:tst:971"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:972" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.ip_forward" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.ip_forward" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_ip_forward"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.ip_forward set to 0" test_ref="oval:ssg:tst:973"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:974" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.default.accept_redirects" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.default.accept_redirects" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_default_accept_redirects"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to 0" test_ref="oval:ssg:tst:975"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:976" version="1">
      <metadata>
        <title>Service netfs Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The netfs service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_netfs_disabled"/></metadata>
      <criteria operator="AND" comment="service netfs is not configured to start">
        <criterion comment="netfs runlevel 0" test_ref="oval:ssg:tst:977"/>
        <criterion comment="netfs runlevel 1" test_ref="oval:ssg:tst:978"/>
        <criterion comment="netfs runlevel 2" test_ref="oval:ssg:tst:979"/>
        <criterion comment="netfs runlevel 3" test_ref="oval:ssg:tst:980"/>
        <criterion comment="netfs runlevel 4" test_ref="oval:ssg:tst:981"/>
        <criterion comment="netfs runlevel 5" test_ref="oval:ssg:tst:982"/>
        <criterion comment="netfs runlevel 6" test_ref="oval:ssg:tst:983"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:984" version="1">
      <metadata>
        <title>Ensure /var/log/audit Located On Separate Partition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit logs are stored in the /var/log/audit directory.
      Ensure that it has its own partition or logical volume. Make
      absolutely certain that it is large enough to store all audit logs
      that will be created by the auditing daemon.</description>
      <reference source="ssg" ref_id="partition_for_var_log_audit"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:985" comment="/var/log/audit on own partition"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:986" version="1">
      <metadata>
        <title>Service psacct Enabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The psacct service should be enabled if possible.</description>
      <reference source="ssg" ref_id="service_psacct_enabled"/></metadata>
      <criteria comment="package psacct installed and service psacct is configured to start" operator="AND">
        <extend_definition comment="psacct installed" definition_ref="oval:ssg:def:802"/>
        <criteria operator="OR" comment="service psacct is configured to start">
          <criterion comment="psacct runlevel 0" test_ref="oval:ssg:tst:987"/>
          <criterion comment="psacct runlevel 1" test_ref="oval:ssg:tst:988"/>
          <criterion comment="psacct runlevel 2" test_ref="oval:ssg:tst:989"/>
          <criterion comment="psacct runlevel 3" test_ref="oval:ssg:tst:990"/>
          <criterion comment="psacct runlevel 4" test_ref="oval:ssg:tst:991"/>
          <criterion comment="psacct runlevel 5" test_ref="oval:ssg:tst:992"/>
          <criterion comment="psacct runlevel 6" test_ref="oval:ssg:tst:993"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:994" version="1">
      <metadata>
        <title>Disable tipc Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module tipc should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_tipc_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:995" comment="kernel module tipc disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:996" version="1">
      <metadata>
        <title>Ensure that Users Have Sensible Umask Values set for bash</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The default umask for users of the bash shell</description>
      <reference source="ssg" ref_id="accounts_umask_bashrc"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:997"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:998" version="1">
      <metadata>
        <title>Mount Remote Filesystems with nodev</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nodev option should be enabled for all NFS mounts in /etc/fstab.</description>
      <reference source="ssg" ref_id="mount_option_nodev_remote_filesystems"/></metadata>
      <criteria operator="XOR">
        <!-- these tests are designed to be mutually exclusive; either no nfs mounts exist in /etc/fstab -->
        <!-- or all of the nfs mounts defined in /etc/fstab have the nodev mount option specified -->
        <criterion comment="remote nfs filesystems" test_ref="oval:ssg:tst:999"/>
        <criterion comment="remote nfs filesystems" test_ref="oval:ssg:tst:1000"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1001" version="1">
      <metadata>
        <title>Ensure that Users Have Sensible Umask Values in
      /etc/login.defs</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The default umask for all users specified in /etc/login.defs</description>
      <reference source="ssg" ref_id="accounts_umask_login_defs"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1002"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1003" version="1">
      <metadata>
        <title>Disable usb-storage Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module usb-storage should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_usb-storage_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1004" comment="kernel module usb-storage disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1005" version="1">
      <metadata>
        <title>Service named Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The named service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_named_disabled"/></metadata>
      <criteria comment="package bind removed or service named is not configured to start" operator="OR">
        <extend_definition comment="bind removed" definition_ref="oval:ssg:def:493"/>
        <criteria operator="AND" comment="service named is not configured to start">
          <criterion comment="named runlevel 0" test_ref="oval:ssg:tst:1006"/>
          <criterion comment="named runlevel 1" test_ref="oval:ssg:tst:1007"/>
          <criterion comment="named runlevel 2" test_ref="oval:ssg:tst:1008"/>
          <criterion comment="named runlevel 3" test_ref="oval:ssg:tst:1009"/>
          <criterion comment="named runlevel 4" test_ref="oval:ssg:tst:1010"/>
          <criterion comment="named runlevel 5" test_ref="oval:ssg:tst:1011"/>
          <criterion comment="named runlevel 6" test_ref="oval:ssg:tst:1012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1013" version="1">
      <metadata>
        <title>Lock out account after failed login attempts</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The number of allowed failed logins should be set correctly.</description>
      <reference source="ssg" ref_id="accounts_passwords_pam_faillock_deny"/></metadata>
      <criteria>
        <criterion comment="default is set to 5" test_ref="oval:ssg:tst:1014"/>
        <criterion comment="default is set to 5" test_ref="oval:ssg:tst:1015"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1016" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - lchown</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_lchown"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification lchown x32" test_ref="oval:ssg:tst:1017"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification lchown x64" test_ref="oval:ssg:tst:1018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1019" version="1">
      <metadata>
        <title>Verify /var/log/audit Permissions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Checks for correct permissions for all log files in /var/log/audit.</description>
      <reference source="ssg" ref_id="file_permissions_var_log_audit"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1020" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1021" version="1">
      <metadata>
        <title>Service kdump Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kdump service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_kdump_disabled"/></metadata>
      <criteria comment="package kexec-tools removed or service kdump is not configured to start" operator="OR">
        <extend_definition comment="kexec-tools removed" definition_ref="oval:ssg:def:1022"/>
        <criteria operator="AND" comment="service kdump is not configured to start">
          <criterion comment="kdump runlevel 0" test_ref="oval:ssg:tst:1023"/>
          <criterion comment="kdump runlevel 1" test_ref="oval:ssg:tst:1024"/>
          <criterion comment="kdump runlevel 2" test_ref="oval:ssg:tst:1025"/>
          <criterion comment="kdump runlevel 3" test_ref="oval:ssg:tst:1026"/>
          <criterion comment="kdump runlevel 4" test_ref="oval:ssg:tst:1027"/>
          <criterion comment="kdump runlevel 5" test_ref="oval:ssg:tst:1028"/>
          <criterion comment="kdump runlevel 6" test_ref="oval:ssg:tst:1029"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1030" version="1">
      <metadata>
        <title>Set SHA512 Password Hashing Algorithm in /etc/libuser.conf</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password hashing algorithm should be set correctly in /etc/libuser.conf.</description>
      <reference source="ssg" ref_id="set_password_hashing_algorithm_libuserconf"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:1031"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1032" version="1">
      <metadata>
        <title>Service nfslock Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nfslock service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_nfslock_disabled"/></metadata>
      <criteria comment="package nfs-utils removed or service nfslock is not configured to start" operator="OR">
        <extend_definition comment="nfs-utils removed" definition_ref="oval:ssg:def:396"/>
        <criteria operator="AND" comment="service nfslock is not configured to start">
          <criterion comment="nfslock runlevel 0" test_ref="oval:ssg:tst:1033"/>
          <criterion comment="nfslock runlevel 1" test_ref="oval:ssg:tst:1034"/>
          <criterion comment="nfslock runlevel 2" test_ref="oval:ssg:tst:1035"/>
          <criterion comment="nfslock runlevel 3" test_ref="oval:ssg:tst:1036"/>
          <criterion comment="nfslock runlevel 4" test_ref="oval:ssg:tst:1037"/>
          <criterion comment="nfslock runlevel 5" test_ref="oval:ssg:tst:1038"/>
          <criterion comment="nfslock runlevel 6" test_ref="oval:ssg:tst:1039"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1040" version="1">
      <metadata>
        <title>Implement blank screen saver</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The screen saver should be blank.</description>
      <reference source="ssg" ref_id="gconf_gnome_screensaver_mode_blank"/></metadata>
      <criteria>
        <criterion comment="gnome screensaver set to blank screen" test_ref="oval:ssg:tst:1041"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:711" version="1">
      <metadata>
        <title>Package rsyslog Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package rsyslog should be installed.</description>
      <reference source="ssg" ref_id="package_rsyslog_installed"/></metadata>
      <criteria>
        <criterion comment="package rsyslog is installed" test_ref="oval:ssg:tst:1042"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1043" version="1">
      <metadata>
        <title>Specify a Remote NTP Server for Time Data</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>A remote NTP Server for time synchronization
      should be specified (and dependencies are met)</description>
      <reference source="ssg" ref_id="ntp_remote_server"/></metadata>
      <criteria comment="ntpd is enabled and conditions are met" operator="AND">
        <extend_definition comment="ntpd is enabled" definition_ref="oval:ssg:def:339"/>
        <criterion test_ref="oval:ssg:tst:1044"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1045" version="1">
      <metadata>
        <title>Disable sctp Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module sctp should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_sctp_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1046" comment="kernel module sctp disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1047" version="1">
      <metadata>
        <title>Require Authentication for Single-User Mode</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The requirement for a password to boot into
      single-user mode should be configured
      correctly.</description>
      <reference source="ssg" ref_id="singleuser_password"/></metadata>
      <criteria>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:1048"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1049" version="1">
      <metadata>
        <title>Record Attempts to Alter Time Through the Localtime File</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Record attempts to alter time through /etc/localtime
      </description>
      <reference source="ssg" ref_id="audit_rules_time_watch_localtime"/></metadata>
      <criteria comment="Test for localtime file being watched">
        <criterion comment="watch localtime file" test_ref="oval:ssg:tst:1050"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1051" version="1">
      <metadata>
        <title>Record Attempts to Alter Process and Session Initiation Information</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules should capture information about session initiation.</description>
      <reference source="ssg" ref_id="audit_rules_session_events"/></metadata>
      <criteria operator="AND">
        <criterion comment="utmp" test_ref="oval:ssg:tst:1052"/>
        <criterion comment="btmp" test_ref="oval:ssg:tst:1053"/>
        <criterion comment="wtmp" test_ref="oval:ssg:tst:1054"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1055" version="1">
      <metadata>
        <title>Require Client SMB Packet Signing, if using
      mount.cifs</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Require packet signing of clients who mount
      Samba shares using the mount.cifs program (e.g., those who
      specify shares in /etc/fstab). To do so, ensure that signing
      options (either sec=krb5i or sec=ntlmv2i) are
      used.</description>
      <reference source="ssg" ref_id="mount_option_smb_client_signing"/></metadata>
      <criteria operator="OR">
        <criteria operator="AND">
          <criteria operator="OR">
            <criterion comment="check for no cifs in /etc/fstab" test_ref="oval:ssg:tst:1056"/>
            <criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" test_ref="oval:ssg:tst:1057"/>
          </criteria>
          <criteria operator="OR">
            <criterion comment="check for no cifs in /etc/mtab" test_ref="oval:ssg:tst:1058"/>
            <criterion comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" test_ref="oval:ssg:tst:1059"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1060" version="1">
      <metadata>
        <title>Verify File Ownership And Permissions Using RPM</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Verify the integrity of installed packages
      by comparing the installed files with information about the
      files taken from the package metadata stored in the RPM
      database.</description>
      <reference source="ssg" ref_id="rpm_verify_permissions"/></metadata>
      <criteria operator="AND">
        <criterion test_ref="oval:ssg:tst:1061" comment="user ownership of all files matches local rpm database"/>
        <criterion test_ref="oval:ssg:tst:1062" comment="group ownership of all files matches local rpm database"/>
        <criterion test_ref="oval:ssg:tst:1063" comment="mode of all files matches local rpm database"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1064" version="1">
      <metadata>
        <title>Disable cramfs Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module cramfs should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_cramfs_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1065" comment="kernel module cramfs disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1066" version="1">
      <metadata>
        <title>Service dhcpd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The dhcpd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_dhcpd_disabled"/></metadata>
      <criteria comment="package dhcp removed or service dhcpd is not configured to start" operator="OR">
        <extend_definition comment="dhcp removed" definition_ref="oval:ssg:def:204"/>
        <criteria operator="AND" comment="service dhcpd is not configured to start">
          <criterion comment="dhcpd runlevel 0" test_ref="oval:ssg:tst:1067"/>
          <criterion comment="dhcpd runlevel 1" test_ref="oval:ssg:tst:1068"/>
          <criterion comment="dhcpd runlevel 2" test_ref="oval:ssg:tst:1069"/>
          <criterion comment="dhcpd runlevel 3" test_ref="oval:ssg:tst:1070"/>
          <criterion comment="dhcpd runlevel 4" test_ref="oval:ssg:tst:1071"/>
          <criterion comment="dhcpd runlevel 5" test_ref="oval:ssg:tst:1072"/>
          <criterion comment="dhcpd runlevel 6" test_ref="oval:ssg:tst:1073"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1074" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.tcp_syncookies" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.tcp_syncookies" should be set to "1".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_tcp_syncookies"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.tcp_syncookies set to 1" test_ref="oval:ssg:tst:1075"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1076" version="1">
      <metadata>
        <title>Record Attempts to Alter Logon and Logout Events</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules should be configured to log successful and unsuccessful logon and logout events.</description>
      <reference source="ssg" ref_id="audit_rules_login_events"/></metadata>
      <criteria operator="AND">
        <criterion comment="faillog" test_ref="oval:ssg:tst:1077"/>
        <criterion comment="lastlog" test_ref="oval:ssg:tst:1078"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1079" version="1">
      <metadata>
        <title>Kernel Runtime Parameter "net.ipv4.conf.default.accept_source_route" Check</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel runtime parameter "net.ipv4.conf.default.accept_source_route" should be set to "0".</description>
      <reference source="ssg" ref_id="sysctl_net_ipv4_conf_default_accept_source_route"/></metadata>
      <criteria>
        <criterion comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to 0" test_ref="oval:ssg:tst:1080"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1081" version="1">
      <metadata>
        <title>Auditd Action to Take When Maximum Log Size Reached</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>max_log_file_action setting in /etc/audit/auditd.conf is set to a certain action</description>
      <reference source="ssg" ref_id="auditd_data_retention_max_log_file_action"/></metadata>
      <criteria>
        <criterion comment="max_log_file_action setting in auditd.conf" test_ref="oval:ssg:tst:1082"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1083" version="1">
      <metadata>
        <title>System Login Banner Compliance</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The system login banner text should be set correctly.</description>
      <reference source="ssg" ref_id="banner_etc_issue"/></metadata>
      <criteria>
        <criterion comment="/etc/issue is set appropriately" test_ref="oval:ssg:tst:1084"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1085" version="1">
      <metadata>
        <title>Set Password lcredit Requirements</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password lcredit should meet minimum
      requirements using pam_cracklib</description>
      <reference source="ssg" ref_id="accounts_password_pam_cracklib_lcredit"/></metadata>
      <criteria>
        <criterion comment="Conditions for lcredit are satisfied" test_ref="oval:ssg:tst:1086"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1022" version="1">
      <metadata>
        <title>Package kexec-tools Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package kexec-tools should be removed.</description>
      <reference source="ssg" ref_id="package_kexec-tools_removed"/></metadata>
      <criteria>
        <criterion comment="package kexec-tools is removed" test_ref="oval:ssg:tst:1087"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1088" version="1">
      <metadata>
        <title>Disable hfsplus Kernel Module</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The kernel module hfsplus should be disabled.</description>
      <reference source="ssg" ref_id="kernel_module_hfsplus_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1089" comment="kernel module hfsplus disabled"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:821" version="1">
      <metadata>
        <title>Package samba-common Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package samba-common should be removed.</description>
      <reference source="ssg" ref_id="package_samba-common_removed"/></metadata>
      <criteria>
        <criterion comment="package samba-common is removed" test_ref="oval:ssg:tst:1090"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1091" version="1">
      <metadata>
        <title>Package aide Installed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package aide should be installed.</description>
      <reference source="ssg" ref_id="package_aide_installed"/></metadata>
      <criteria>
        <criterion comment="package aide is installed" test_ref="oval:ssg:tst:1092"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:371" version="1">
      <metadata>
        <title>Service sshd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The sshd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_sshd_disabled"/></metadata>
      <criteria comment="package openssh-server removed or service sshd is not configured to start" operator="OR">
        <extend_definition comment="openssh-server removed" definition_ref="oval:ssg:def:288"/>
        <criteria operator="AND" comment="service sshd is not configured to start">
          <criterion comment="sshd runlevel 0" test_ref="oval:ssg:tst:1093"/>
          <criterion comment="sshd runlevel 1" test_ref="oval:ssg:tst:1094"/>
          <criterion comment="sshd runlevel 2" test_ref="oval:ssg:tst:1095"/>
          <criterion comment="sshd runlevel 3" test_ref="oval:ssg:tst:1096"/>
          <criterion comment="sshd runlevel 4" test_ref="oval:ssg:tst:1097"/>
          <criterion comment="sshd runlevel 5" test_ref="oval:ssg:tst:1098"/>
          <criterion comment="sshd runlevel 6" test_ref="oval:ssg:tst:1099"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1100" version="1">
      <metadata>
        <title>Proper Permissions User Home Directories</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>File permissions should be set correctly for the home directories for all user accounts.</description>
      <reference source="ssg" ref_id="file_permissions_home_dirs"/></metadata>
      <criteria>
        <criterion comment="home directories" test_ref="oval:ssg:tst:1101" negate="true"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1102" version="1">
      <metadata>
        <title>Enable a Warning Banner</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>SSH warning banner should be enabled (and
      dependencies are met)</description>
      <reference source="ssg" ref_id="sshd_banner_set"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:1103"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1104" version="1">
      <metadata>
        <title>Service rhnsd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rhnsd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rhnsd_disabled"/></metadata>
      <criteria comment="package rhnsd removed or service rhnsd is not configured to start" operator="OR">
        <extend_definition comment="rhnsd removed" definition_ref="oval:ssg:def:813"/>
        <criteria operator="AND" comment="service rhnsd is not configured to start">
          <criterion comment="rhnsd runlevel 0" test_ref="oval:ssg:tst:1105"/>
          <criterion comment="rhnsd runlevel 1" test_ref="oval:ssg:tst:1106"/>
          <criterion comment="rhnsd runlevel 2" test_ref="oval:ssg:tst:1107"/>
          <criterion comment="rhnsd runlevel 3" test_ref="oval:ssg:tst:1108"/>
          <criterion comment="rhnsd runlevel 4" test_ref="oval:ssg:tst:1109"/>
          <criterion comment="rhnsd runlevel 5" test_ref="oval:ssg:tst:1110"/>
          <criterion comment="rhnsd runlevel 6" test_ref="oval:ssg:tst:1111"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1112" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fsetxattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fsetxattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fsetxattr x32" test_ref="oval:ssg:tst:1113"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fsetxattr x64" test_ref="oval:ssg:tst:1114"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1115" version="1">
      <metadata>
        <title>Record Attempts to Alter Time Through Clock_settime</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Record attempts to alter time through clock_settime.
      </description>
      <reference source="ssg" ref_id="audit_rules_time_clock_settime"/></metadata>
      <criteria comment="Test for either..." operator="OR">
        <criteria comment="both..." operator="AND">
          <extend_definition comment="32bit and ..." definition_ref="oval:ssg:def:574"/>
          <criterion comment="32bit line clock_settime and key present" test_ref="oval:ssg:tst:1116"/>
        </criteria>
        <criteria comment="both ..." operator="AND">
          <extend_definition comment="64bit and ..." definition_ref="oval:ssg:def:334"/>
          <criterion comment="64bit line for clock_settime and key present" test_ref="oval:ssg:tst:1117"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1118" version="1">
      <metadata>
        <title>UID 0 Belongs Only To Root</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Only the root account should be assigned a user id of 0.</description>
      <reference source="ssg" ref_id="accounts_no_uid_except_zero"/></metadata>
      <criteria>
        <criterion comment="tests for reg exp ^[^r][^o][^o][^t].*:0 in /etc/passwd file" test_ref="oval:ssg:tst:1119"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1120" version="1">
      <metadata>
        <title>Device Files Have Proper SELinux Context</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All device files in /dev should be assigned an SELinux security context other than 'unlabeled_t'.</description>
      <reference source="ssg" ref_id="selinux_all_devicefiles_labeled"/></metadata>
      <criteria>
        <criterion comment="unlabeled_t in /dev" test_ref="oval:ssg:tst:1121"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1122" version="1">
      <metadata>
        <title>Disable Empty Passwords</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Remote connections from accounts with empty
      passwords should be disabled (and dependencies are
      met)</description>
      <reference source="ssg" ref_id="sshd_permitemptypasswords_no"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Conditions are satisfied" negate="true" test_ref="oval:ssg:tst:1123"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1124" version="1">
      <metadata>
        <title>Set Password Expiration Parameters</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The password expiration warning age should be set appropriately.</description>
      <reference source="ssg" ref_id="accounts_password_warn_age_login_defs"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1125"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1126" version="1">
      <metadata>
        <title>Set Password Expiration Parameters</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The maximum password age policy should meet
      minimum requirements.</description>
      <reference source="ssg" ref_id="accounts_maximum_age_login_defs"/></metadata>
      <criteria comment="the value PASS_MAX_DAYS should be set appropriately in /etc/login.defs">
        <criterion test_ref="oval:ssg:tst:1127"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1128" version="1">
      <metadata>
        <title>Verify group who owns 'shadow' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/shadow file should be owned by the
      appropriate group.</description>
      <reference source="ssg" ref_id="file_groupowner_etc_shadow"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1129"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1130" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - lremovexattr</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_lremovexattr"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification lremovexattr x32" test_ref="oval:ssg:tst:1131"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification lremovexattr x64" test_ref="oval:ssg:tst:1132"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1133" version="1">
      <metadata>
        <title>Disable .rhosts Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Emulation of the rsh command through the ssh
      server should be disabled (and dependencies are
      met)</description>
      <reference source="ssg" ref_id="sshd_rsh_emulation_disabled"/></metadata>
      <criteria comment="SSH is not being used or conditions are met" operator="OR">
        <extend_definition comment="sshd service is disabled" definition_ref="oval:ssg:def:371"/>
        <criterion comment="Conditions are satisfied" test_ref="oval:ssg:tst:1134"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1135" version="1">
      <metadata>
        <title>Package ypserv Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package ypserv should be removed.</description>
      <reference source="ssg" ref_id="package_ypserv_removed"/></metadata>
      <criteria>
        <criterion comment="package ypserv is removed" test_ref="oval:ssg:tst:1136"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:698" version="1">
      <metadata>
        <title>Test for use of pam_ldap</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Check for pam_ldap.so presence.</description>
      <reference source="ssg" ref_id="ldap_client_pam_ldap_present"/></metadata>
      <criteria comment="package pam_ldap is present and used" operator="OR">
        <extend_definition comment="pam_ldap rpm installed? (note negation)" definition_ref="oval:ssg:def:285" negate="true"/>
        <criterion comment="look for pam_ldap.so" test_ref="oval:ssg:tst:1137"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1138" version="1">
      <metadata>
        <title>Audit User/Group Information</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Audit rules should detect modification to system files that hold information about users and groups.</description>
      <reference source="ssg" ref_id="audit_rules_usergroup_modification"/></metadata>
      <criteria operator="AND">
        <criterion comment="audit /etc/group" test_ref="oval:ssg:tst:1139"/>
        <criterion comment="audit /etc/passwd" test_ref="oval:ssg:tst:1140"/>
        <criterion comment="audit /etc/gshadow" test_ref="oval:ssg:tst:1141"/>
        <criterion comment="audit /etc/shadow" test_ref="oval:ssg:tst:1142"/>
        <criterion comment="audit /etc/security/opasswd" test_ref="oval:ssg:tst:1143"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1144" version="1">
      <metadata>
        <title>Service rpcsvcgssd Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The rpcsvcgssd service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_rpcsvcgssd_disabled"/></metadata>
      <criteria comment="package nfs-utils removed or service rpcsvcgssd is not configured to start" operator="OR">
        <extend_definition comment="nfs-utils removed" definition_ref="oval:ssg:def:396"/>
        <criteria operator="AND" comment="service rpcsvcgssd is not configured to start">
          <criterion comment="rpcsvcgssd runlevel 0" test_ref="oval:ssg:tst:1145"/>
          <criterion comment="rpcsvcgssd runlevel 1" test_ref="oval:ssg:tst:1146"/>
          <criterion comment="rpcsvcgssd runlevel 2" test_ref="oval:ssg:tst:1147"/>
          <criterion comment="rpcsvcgssd runlevel 3" test_ref="oval:ssg:tst:1148"/>
          <criterion comment="rpcsvcgssd runlevel 4" test_ref="oval:ssg:tst:1149"/>
          <criterion comment="rpcsvcgssd runlevel 5" test_ref="oval:ssg:tst:1150"/>
          <criterion comment="rpcsvcgssd runlevel 6" test_ref="oval:ssg:tst:1151"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1152" version="1">
      <metadata>
        <title>Disable Printer Browsing Entirely if Possible</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The CUPS print service can be configured to broadcast a list of available printers to the network. Other machines on the network, also running the CUPS print service, can be configured to listen to these broadcasts and add and configure these printers for immediate use. By disabling this browsing capability, the machine will no longer generate or receive such broadcasts.</description>
      <reference source="ssg" ref_id="cups_disable_browsing"/></metadata>
      <criteria operator="AND">
        <criterion comment="Protect browsing_off" test_ref="oval:ssg:tst:1153"/>
        <criterion comment="Protect browsingallow" test_ref="oval:ssg:tst:1154"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1155" version="1">
      <metadata>
        <title>Find files unowned by a user</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>All files should be owned by a
      user</description>
      <reference source="ssg" ref_id="file_permissions_unowned"/></metadata>
      <criteria>
        <criterion comment="Check all files and make sure they are owned by a user" negate="true" test_ref="oval:ssg:tst:1156"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1157" version="1">
      <metadata>
        <title>Auditd Maximum Number of Logs to Retain</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>num_logs setting in /etc/audit/auditd.conf is set to at least a certain value</description>
      <reference source="ssg" ref_id="auditd_data_retention_num_logs"/></metadata>
      <criteria>
        <criterion comment="num_logs setting in auditd.conf" test_ref="oval:ssg:tst:1158"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1159" version="1">
      <metadata>
        <title>Configure LDAP CA Certificate Path</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Require the use of TLS for ldap clients.</description>
      <reference source="ssg" ref_id="ldap_client_tls_cacertpath"/></metadata>
      <criteria comment="package pam_ldap is not present" operator="OR">
        <extend_definition comment="pam_ldap not present or in use" definition_ref="oval:ssg:def:698" negate="true"/>
        <criterion comment="look for tls_cacertdir in /etc/pam_ldap.conf" test_ref="oval:ssg:tst:1160"/>
        <criterion comment="look for tls_cacertfile in /etc/pam_ldap.conf" test_ref="oval:ssg:tst:1161"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:841" version="1">
      <metadata>
        <title>Package qpid-cpp-server Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package qpid-cpp-server should be removed.</description>
      <reference source="ssg" ref_id="package_qpid-cpp-server_removed"/></metadata>
      <criteria>
        <criterion comment="package qpid-cpp-server is removed" test_ref="oval:ssg:tst:1162"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:648" version="1">
      <metadata>
        <title>Package cpuspeed Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package cpuspeed should be removed.</description>
      <reference source="ssg" ref_id="package_cpuspeed_removed"/></metadata>
      <criteria>
        <criterion comment="package cpuspeed is removed" test_ref="oval:ssg:tst:1163"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1164" version="1">
      <metadata>
        <title>Audit Discretionary Access Control Modification Events - fchmod</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The changing of file permissions and attributes should be 
      audited.</description>
      <reference source="ssg" ref_id="audit_rules_dac_modification_fchmod"/></metadata>
      <!-- x32 system calls are monitored and ... -->
      <criteria operator="AND">
        <criterion comment="dac modification fchmod x32" test_ref="oval:ssg:tst:1165"/>
        <!-- system is not x64 or x64 system calls are monitored  -->
        <criteria operator="OR">
          <extend_definition comment="x64?" definition_ref="oval:ssg:def:334" negate="true"/>
          <criterion comment="dac modification fchmod x64" test_ref="oval:ssg:tst:1166"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1167" version="1">
      <metadata>
        <title>File /boot/grub/grub.conf Owned By root Group </title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /boot/grub/grub.conf file should be owned by the root group.</description>
      <reference source="ssg" ref_id="file_group_owner_grub_conf"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1168"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:111" version="1">
      <metadata>
        <title>Disable IPv6 Kernel Module Functionality via Disable Option</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The disable option will allow the IPv6 module to be inserted, but prevent address assignment and activation of the network stack.</description>
      <reference source="ssg" ref_id="kernel_module_ipv6_option_disabled"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1169" comment="ipv6 disabled any modprobe conf file"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1170" version="1">
      <metadata>
        <title>Service sysstat Disabled</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The sysstat service should be disabled if possible.</description>
      <reference source="ssg" ref_id="service_sysstat_disabled"/></metadata>
      <criteria comment="package sysstat removed or service sysstat is not configured to start" operator="OR">
        <extend_definition comment="sysstat removed" definition_ref="oval:ssg:def:394"/>
        <criteria operator="AND" comment="service sysstat is not configured to start">
          <criterion comment="sysstat runlevel 0" test_ref="oval:ssg:tst:1171"/>
          <criterion comment="sysstat runlevel 1" test_ref="oval:ssg:tst:1172"/>
          <criterion comment="sysstat runlevel 2" test_ref="oval:ssg:tst:1173"/>
          <criterion comment="sysstat runlevel 3" test_ref="oval:ssg:tst:1174"/>
          <criterion comment="sysstat runlevel 4" test_ref="oval:ssg:tst:1175"/>
          <criterion comment="sysstat runlevel 5" test_ref="oval:ssg:tst:1176"/>
          <criterion comment="sysstat runlevel 6" test_ref="oval:ssg:tst:1177"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="miscellaneous" id="oval:ssg:def:334" version="1">
      <!-- Note that this does not meet requirements for class=inventory as that 
     only tests for patches per 5.10.1 Revision 1 -->
      <metadata>
        <title>Test for x86_64 Architecture</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>Generic test for x86_64 architecture to be used by other tests</description>
      <reference source="ssg" ref_id="system_info_architecture_x86_64"/></metadata>
      <criteria>
        <criterion comment="Generic test for x86_64 architecture" test_ref="oval:ssg:tst:1178"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1179" version="1">
      <metadata>
        <title>Verify group who owns 'group' file</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The /etc/group file should be owned by the
      appropriate group.</description>
      <reference source="ssg" ref_id="file_groupowner_etc_group"/></metadata>
      <criteria>
        <criterion test_ref="oval:ssg:tst:1180"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:515" version="1">
      <metadata>
        <title>Package mdadm Removed</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The RPM package mdadm should be removed.</description>
      <reference source="ssg" ref_id="package_mdadm_removed"/></metadata>
      <criteria>
        <criterion comment="package mdadm is removed" test_ref="oval:ssg:tst:1181"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1182" version="1">
      <metadata>
        <title>Add noexec Option to /tmp</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>It can be dangerous to allow the execution of binaries
      from world-writable temporary storage directories such as /tmp.
      The noexec mount option prevents binaries from being executed out of /tmp.</description>
      <reference source="ssg" ref_id="mount_option_tmp_noexec"/></metadata>
      <criteria>
        <criterion comment="noexec on /tmp" test_ref="oval:ssg:tst:1183"/>
      </criteria>
    </definition>
    <definition class="compliance" id="oval:ssg:def:1184" version="1">
      <metadata>
        <title>Mount Remote Filesystems with nosuid</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 6</platform>
        </affected>
        <description>The nosuid option should be enabled for all NFS mounts in /etc/fstab.</description>
      <reference source="ssg" ref_id="mount_option_nosuid_remote_filesystems"/></metadata>
      <criteria operator="XOR">
        <!-- these tests are designed to be mutually exclusive; either no nfs mounts exist in /etc/fstab -->
        <!-- or all of the nfs mounts defined in /etc/fstab have the nosuid mount option specified -->
        <criterion comment="remote nfs filesystems" test_ref="oval:ssg:tst:1185"/>
        <criterion comment="remote nfs filesystems" test_ref="oval:ssg:tst:1186"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.default.accept_redirects set to 0" id="oval:ssg:tst:112" version="1">
      <unix:object object_ref="oval:ssg:obj:1187"/>
      <unix:state state_ref="oval:ssg:ste:1188"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv4" id="oval:ssg:tst:114" version="1">
      <ind:object object_ref="oval:ssg:obj:1189"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for port 22 access over ipv6" id="oval:ssg:tst:115" version="1">
      <ind:object object_ref="oval:ssg:obj:1190"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:118" version="2">
      <unix:object object_ref="oval:ssg:obj:1191"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:119" version="2">
      <unix:object object_ref="oval:ssg:obj:1193"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:120" version="2">
      <unix:object object_ref="oval:ssg:obj:1194"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:121" version="2">
      <unix:object object_ref="oval:ssg:obj:1195"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:122" version="2">
      <unix:object object_ref="oval:ssg:obj:1196"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:123" version="2">
      <unix:object object_ref="oval:ssg:obj:1197"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:124" version="2">
      <unix:object object_ref="oval:ssg:obj:1198"/>
      <unix:state state_ref="oval:ssg:ste:1192"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:127" version="2">
      <unix:object object_ref="oval:ssg:obj:1199"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:128" version="2">
      <unix:object object_ref="oval:ssg:obj:1201"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:129" version="2">
      <unix:object object_ref="oval:ssg:obj:1202"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:130" version="2">
      <unix:object object_ref="oval:ssg:obj:1203"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:131" version="2">
      <unix:object object_ref="oval:ssg:obj:1204"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:132" version="2">
      <unix:object object_ref="oval:ssg:obj:1205"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:133" version="2">
      <unix:object object_ref="oval:ssg:obj:1206"/>
      <unix:state state_ref="oval:ssg:ste:1200"/>
    </unix:runlevel_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.secure_redirects set to 0" id="oval:ssg:tst:135" version="1">
      <unix:object object_ref="oval:ssg:obj:1207"/>
      <unix:state state_ref="oval:ssg:ste:1208"/>
    </unix:sysctl_test>
    <ind:unknown_test check="all" comment="use extended content to evaluated this test" id="oval:ssg:tst:137" version="1"/>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="remember is set in /etc/pam.d/system-auth" id="oval:ssg:tst:139" version="1">
      <ind:object object_ref="oval:ssg:obj:1209"/>
      <ind:state state_ref="oval:ssg:ste:1210"/>
    </ind:textfilecontent54_test>
    <ind:xmlfilecontent_test check="all" comment="gnome screensaver is activated on idle" id="oval:ssg:tst:141" version="1">
      <ind:object object_ref="oval:ssg:obj:1211"/>
      <ind:state state_ref="oval:ssg:ste:1212"/>
    </ind:xmlfilecontent_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:143" version="1" check="all" comment="kernel module rds disabled">
      <ind:object object_ref="oval:ssg:obj:1213"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="bind mount /var/tmp to /tmp" id="oval:ssg:tst:145" version="1">
      <ind:object object_ref="oval:ssg:obj:1214"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:147" version="2">
      <unix:object object_ref="oval:ssg:obj:1215"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:148" version="2">
      <unix:object object_ref="oval:ssg:obj:1217"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:149" version="2">
      <unix:object object_ref="oval:ssg:obj:1218"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:150" version="2">
      <unix:object object_ref="oval:ssg:obj:1219"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:151" version="2">
      <unix:object object_ref="oval:ssg:obj:1220"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:152" version="2">
      <unix:object object_ref="oval:ssg:obj:1221"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:153" version="2">
      <unix:object object_ref="oval:ssg:obj:1222"/>
      <unix:state state_ref="oval:ssg:ste:1216"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check NOZEROCONF=yes in /etc/sysconfig/network" id="oval:ssg:tst:155" version="1">
      <ind:object object_ref="oval:ssg:obj:1223"/>
    </ind:textfilecontent54_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:157" version="1" comment="noexec on removable partition">
      <linux:object object_ref="oval:ssg:obj:1224"/>
      <linux:state state_ref="oval:ssg:ste:1225"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="at least one" comment="removable partition /etc/fstab" id="oval:ssg:tst:158" version="1">
      <ind:object object_ref="oval:ssg:obj:1226"/>
      <ind:state state_ref="oval:ssg:ste:1227"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="/etc/audit/audit.rules contains -a always,exit -F path=/bin/ping -F perm=x -F auid&gt;=500 -F auid!=4294967295 -k privileged" id="oval:ssg:tst:160" version="1">
      <ind:object object_ref="oval:ssg:obj:1228"/>
    </ind:textfilecontent54_test>
    <ind:unknown_test check="all" comment="use extended content to evaluated this test" id="oval:ssg:tst:162" version="1"/>
  
    <linux:rpminfo_test check="all" check_existence="at_least_one_exists" id="oval:ssg:tst:10101" version="1" comment="Check for the existence of any non-Red Hat signed packages." >
       <linux:object object_ref="oval:ssg:obj:10101"/>
    </linux:rpminfo_test>

    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:164" version="1" comment="package iputils is removed">
      <linux:object object_ref="oval:ssg:obj:1229"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib directories uid root" id="oval:ssg:tst:166" version="1">
      <unix:object object_ref="oval:ssg:obj:1230"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib files uid root" id="oval:ssg:tst:171" version="1">
      <unix:object object_ref="oval:ssg:obj:1231"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib64 directories uid root" id="oval:ssg:tst:167" version="1">
      <unix:object object_ref="oval:ssg:obj:1232"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib64 files uid root" id="oval:ssg:tst:172" version="1">
      <unix:object object_ref="oval:ssg:obj:1233"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib directories uid root" id="oval:ssg:tst:168" version="1">
      <unix:object object_ref="oval:ssg:obj:1234"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib files uid root" id="oval:ssg:tst:173" version="1">
      <unix:object object_ref="oval:ssg:obj:1235"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib64 directories uid root" id="oval:ssg:tst:169" version="1">
      <unix:object object_ref="oval:ssg:obj:1236"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib64 files uid root" id="oval:ssg:tst:174" version="1">
      <unix:object object_ref="oval:ssg:obj:1237"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib/modules directories uid root" id="oval:ssg:tst:170" version="1">
      <unix:object object_ref="oval:ssg:obj:1238"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib/modules files uid root" id="oval:ssg:tst:175" version="1">
      <unix:object object_ref="oval:ssg:obj:1239"/>
    </unix:file_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:177" version="1" check="all" check_existence="all_exist" comment="kernel module bluetooth disabled">
      <ind:object object_ref="oval:ssg:obj:1240"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:178" version="1" check="all" check_existence="all_exist" comment="kernel module net-pf-31 disabled">
      <ind:object object_ref="oval:ssg:obj:1241"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:180" version="1" comment="package tftp-server is removed">
      <linux:object object_ref="oval:ssg:obj:1242"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:182" version="1" comment="package sendmail is removed">
      <linux:object object_ref="oval:ssg:obj:1243"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/profile file" id="oval:ssg:tst:184" version="1">
      <ind:object object_ref="oval:ssg:obj:1244"/>
      <ind:state state_ref="oval:ssg:ste:1245"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:186" version="1" comment="package iptables-ipv6 is installed">
      <linux:object object_ref="oval:ssg:obj:1246"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="all local world-writable directories have sticky bit set" id="oval:ssg:tst:188" version="1">
      <unix:object object_ref="oval:ssg:obj:1247"/>
      <unix:state state_ref="oval:ssg:ste:1248"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" comment="email account for actions" id="oval:ssg:tst:190" version="1">
      <ind:object object_ref="oval:ssg:obj:1249"/>
      <ind:state state_ref="oval:ssg:ste:1250"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Set banner" id="oval:ssg:tst:192" version="1">
      <ind:object object_ref="oval:ssg:obj:1251"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Set static IPv6 address on each interface" id="oval:ssg:tst:194" version="1">
      <ind:object object_ref="oval:ssg:obj:1252"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:196" version="1" check="all" comment="kernel module squashfs disabled">
      <ind:object object_ref="oval:ssg:obj:1253"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the PROMPT[\s]*=[\s]*([^#]*) expression in the /etc/sysconfig/init file" id="oval:ssg:tst:198" version="1">
      <ind:object object_ref="oval:ssg:obj:1254"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/var/log/audit directories uid root gid root" id="oval:ssg:tst:201" version="1">
      <unix:object object_ref="oval:ssg:obj:1255"/>
      <unix:state state_ref="oval:ssg:ste:1256"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/var/log/audit files uid root gid root" id="oval:ssg:tst:200" version="1">
      <unix:object object_ref="oval:ssg:obj:1257"/>
      <unix:state state_ref="oval:ssg:ste:1256"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:203" version="1" comment="package openswan is installed">
      <linux:object object_ref="oval:ssg:obj:1258"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:205" version="1" comment="package dhcp is removed">
      <linux:object object_ref="oval:ssg:obj:1259"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="check ENCRYPT_METHOD in /etc/login.defs" id="oval:ssg:tst:207" version="1">
      <ind:object object_ref="oval:ssg:obj:1260"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:209" version="1" comment="package cronie is installed">
      <linux:object object_ref="oval:ssg:obj:1261"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing group ownership of /etc/passwd" id="oval:ssg:tst:211" version="1">
      <unix:object object_ref="oval:ssg:obj:1262"/>
      <unix:state state_ref="oval:ssg:ste:1263"/>
    </unix:file_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:213" version="1" comment="nodev on removable partition">
      <linux:object object_ref="oval:ssg:obj:1264"/>
      <linux:state state_ref="oval:ssg:ste:1265"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="at least one" comment="removable partition /etc/fstab" id="oval:ssg:tst:214" version="1">
      <ind:object object_ref="oval:ssg:obj:1266"/>
      <ind:state state_ref="oval:ssg:ste:1267"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:217" version="2">
      <unix:object object_ref="oval:ssg:obj:1268"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:218" version="2">
      <unix:object object_ref="oval:ssg:obj:1270"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:219" version="2">
      <unix:object object_ref="oval:ssg:obj:1271"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:220" version="2">
      <unix:object object_ref="oval:ssg:obj:1272"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:221" version="2">
      <unix:object object_ref="oval:ssg:obj:1273"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:222" version="2">
      <unix:object object_ref="oval:ssg:obj:1274"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:223" version="2">
      <unix:object object_ref="oval:ssg:obj:1275"/>
      <unix:state state_ref="oval:ssg:ste:1269"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg:tst:225" version="1">
      <unix:object object_ref="oval:ssg:obj:1276"/>
      <unix:state state_ref="oval:ssg:ste:1277"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:227" version="1" comment="package audit is installed">
      <linux:object object_ref="oval:ssg:obj:1278"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the umask[\s]+(.*) expression in the /etc/sysconfig/init file" id="oval:ssg:tst:229" version="1">
      <ind:object object_ref="oval:ssg:obj:1279"/>
      <ind:state state_ref="oval:ssg:ste:1280"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable Telnet Service" id="oval:ssg:tst:231" version="1">
      <ind:object object_ref="oval:ssg:obj:1281"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="rlogin disabled" id="oval:ssg:tst:234" version="1">
      <ind:object object_ref="oval:ssg:obj:1282"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="check for existence of gpgcheck=0 in /etc/yum.repos.d/ files" id="oval:ssg:tst:236" version="1">
      <ind:object object_ref="oval:ssg:obj:1283"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /root" id="oval:ssg:tst:238" version="1">
      <unix:object object_ref="oval:ssg:obj:1284"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="look for .rhosts or .shosts in /home" id="oval:ssg:tst:239" version="1">
      <unix:object object_ref="oval:ssg:obj:1285"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg:tst:240" version="1">
      <unix:object object_ref="oval:ssg:obj:1286"/>
    </unix:file_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.rp_filter set to 1" id="oval:ssg:tst:242" version="1">
      <unix:object object_ref="oval:ssg:obj:1287"/>
      <unix:state state_ref="oval:ssg:ste:1288"/>
    </unix:sysctl_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:244" version="1" comment="package dovecot is removed">
      <linux:object object_ref="oval:ssg:obj:1289"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/etc/shadow mode and ownership" id="oval:ssg:tst:246" version="1">
      <unix:object object_ref="oval:ssg:obj:1290"/>
      <unix:state state_ref="oval:ssg:ste:1291"/>
      <unix:state state_ref="oval:ssg:ste:1292"/>
      <unix:state state_ref="oval:ssg:ste:1293"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:248" version="1" comment="package policycoreutils is installed">
      <linux:object object_ref="oval:ssg:obj:1294"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:250" version="1">
      <ind:object object_ref="oval:ssg:obj:1295"/>
      <ind:state state_ref="oval:ssg:ste:1296"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:253" version="2">
      <unix:object object_ref="oval:ssg:obj:1297"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:254" version="2">
      <unix:object object_ref="oval:ssg:obj:1299"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:255" version="2">
      <unix:object object_ref="oval:ssg:obj:1300"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:256" version="2">
      <unix:object object_ref="oval:ssg:obj:1301"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:257" version="2">
      <unix:object object_ref="oval:ssg:obj:1302"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:258" version="2">
      <unix:object object_ref="oval:ssg:obj:1303"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:259" version="2">
      <unix:object object_ref="oval:ssg:obj:1304"/>
      <unix:state state_ref="oval:ssg:ste:1298"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="default runlevel is 3" id="oval:ssg:tst:261" version="1">
      <ind:object object_ref="oval:ssg:obj:1305"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" comment="files with no group owner" id="oval:ssg:tst:263" version="1">
      <notes>
        <note>This will enumerate all files on local
      partitions</note>
      </notes>
      <unix:object object_ref="oval:ssg:obj:1306"/>
      <unix:state state_ref="oval:ssg:ste:1307"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="serial ports /etc/securetty" id="oval:ssg:tst:265" version="1">
      <ind:object object_ref="oval:ssg:obj:1308"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="tests the value of Ciphers setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:267" version="1">
      <ind:object object_ref="oval:ssg:obj:1309"/>
    </ind:textfilecontent54_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter kernel.randomize_va_space set to 2" id="oval:ssg:tst:269" version="1">
      <unix:object object_ref="oval:ssg:obj:1310"/>
      <unix:state state_ref="oval:ssg:ste:1311"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ssl[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/dovecot.conf file" id="oval:ssg:tst:271" version="1">
      <ind:object object_ref="oval:ssg:obj:1312"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:273" version="1" comment="package xinetd is removed">
      <linux:object object_ref="oval:ssg:obj:1313"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg:tst:275" version="1">
      <unix:object object_ref="oval:ssg:obj:1314"/>
      <unix:state state_ref="oval:ssg:ste:1315"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:277" version="1" comment="package oddjob is removed">
      <linux:object object_ref="oval:ssg:obj:1316"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/etc/gshadow mode and ownership" id="oval:ssg:tst:279" version="1">
      <unix:object object_ref="oval:ssg:obj:1317"/>
      <unix:state state_ref="oval:ssg:ste:1318"/>
      <unix:state state_ref="oval:ssg:ste:1319"/>
      <unix:state state_ref="oval:ssg:ste:1320"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the ^[\s]*fs\.suid_dumpable[\s]*=([\s]*) expression in the /etc/sysctl.conf file" id="oval:ssg:tst:281" version="2">
      <ind:object object_ref="oval:ssg:obj:1321"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:282" version="1" comment="package libcgroup is removed">
      <linux:object object_ref="oval:ssg:obj:1322"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="look for argument 'nousb' in the kernel line in /etc/grub.conf" id="oval:ssg:tst:284" version="1">
      <ind:object object_ref="oval:ssg:obj:1323"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:286" version="1" comment="package pam_ldap is removed">
      <linux:object object_ref="oval:ssg:obj:1324"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="sshd uses protocol 2" id="oval:ssg:tst:289" version="1">
      <ind:object object_ref="oval:ssg:obj:1325"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:291" version="1">
      <ind:object object_ref="oval:ssg:obj:1326"/>
      <ind:state state_ref="oval:ssg:ste:1327"/>
    </ind:textfilecontent54_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.accept_redirects set to 0" id="oval:ssg:tst:293" version="1">
      <unix:object object_ref="oval:ssg:obj:1328"/>
      <unix:state state_ref="oval:ssg:ste:1329"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" comment="audit file delete" id="oval:ssg:tst:295" version="1">
      <ind:object object_ref="oval:ssg:obj:1330"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:298" version="2">
      <unix:object object_ref="oval:ssg:obj:1331"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:299" version="2">
      <unix:object object_ref="oval:ssg:obj:1333"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:300" version="2">
      <unix:object object_ref="oval:ssg:obj:1334"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:301" version="2">
      <unix:object object_ref="oval:ssg:obj:1335"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:302" version="2">
      <unix:object object_ref="oval:ssg:obj:1336"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:303" version="2">
      <unix:object object_ref="oval:ssg:obj:1337"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:304" version="2">
      <unix:object object_ref="oval:ssg:obj:1338"/>
      <unix:state state_ref="oval:ssg:ste:1332"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib directories go-w" id="oval:ssg:tst:306" version="1">
      <unix:object object_ref="oval:ssg:obj:1339"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib files go-w" id="oval:ssg:tst:311" version="1">
      <unix:object object_ref="oval:ssg:obj:1340"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib64 directories go-w" id="oval:ssg:tst:307" version="1">
      <unix:object object_ref="oval:ssg:obj:1341"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib64 files go-w" id="oval:ssg:tst:312" version="1">
      <unix:object object_ref="oval:ssg:obj:1342"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib directories go-w" id="oval:ssg:tst:308" version="1">
      <unix:object object_ref="oval:ssg:obj:1343"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib files go-w" id="oval:ssg:tst:313" version="1">
      <unix:object object_ref="oval:ssg:obj:1344"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib64 directories go-w" id="oval:ssg:tst:309" version="1">
      <unix:object object_ref="oval:ssg:obj:1345"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/usr/lib64 files go-w" id="oval:ssg:tst:314" version="1">
      <unix:object object_ref="oval:ssg:obj:1346"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib/modules directories go-w" id="oval:ssg:tst:310" version="1">
      <unix:object object_ref="oval:ssg:obj:1347"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/lib/modules files go-w" id="oval:ssg:tst:315" version="1">
      <unix:object object_ref="oval:ssg:obj:1348"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Define default gateways" id="oval:ssg:tst:317" version="1">
      <ind:object object_ref="oval:ssg:obj:1349"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="TODO::INSERT" id="oval:ssg:tst:319" version="1">
      <ind:object object_ref="oval:ssg:obj:1350"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:321" version="1">
      <ind:object object_ref="oval:ssg:obj:1351"/>
      <ind:state state_ref="oval:ssg:ste:1352"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:323" version="1" comment="package smartmontools is removed">
      <linux:object object_ref="oval:ssg:obj:1353"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the \*\.\*[\s]+@ setting in the /etc/syslog.conf file" id="oval:ssg:tst:325" version="1">
      <ind:object object_ref="oval:ssg:obj:1354"/>
    </ind:textfilecontent54_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.log_martians set to 1" id="oval:ssg:tst:327" version="1">
      <unix:object object_ref="oval:ssg:obj:1355"/>
      <unix:state state_ref="oval:ssg:ste:1356"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" comment="tftpd secure mode" id="oval:ssg:tst:329" version="1">
      <ind:object object_ref="oval:ssg:obj:1357"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:331" version="1" comment="package at is removed">
      <linux:object object_ref="oval:ssg:obj:1358"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fremovexattr x32" id="oval:ssg:tst:333" version="1">
      <ind:object object_ref="oval:ssg:obj:1359"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fremovexattr x64" id="oval:ssg:tst:335" version="1">
      <ind:object object_ref="oval:ssg:obj:1360"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="only one" check_existence="any_exist" id="oval:ssg:tst:337" version="1" comment="Red Hat release key package is installed">
      <linux:object object_ref="oval:ssg:obj:1361"/>
      <linux:state state_ref="oval:ssg:ste:1362"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="only one" check_existence="any_exist" id="oval:ssg:tst:338" version="1" comment="Red Hat auxiliary key package is installed">
      <linux:object object_ref="oval:ssg:obj:1361"/>
      <linux:state state_ref="oval:ssg:ste:1363"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:341" version="2">
      <unix:object object_ref="oval:ssg:obj:1364"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:342" version="2">
      <unix:object object_ref="oval:ssg:obj:1366"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:343" version="2">
      <unix:object object_ref="oval:ssg:obj:1367"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:344" version="2">
      <unix:object object_ref="oval:ssg:obj:1368"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:345" version="2">
      <unix:object object_ref="oval:ssg:obj:1369"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:346" version="2">
      <unix:object object_ref="oval:ssg:obj:1370"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:347" version="2">
      <unix:object object_ref="oval:ssg:obj:1371"/>
      <unix:state state_ref="oval:ssg:ste:1365"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchmodat x32" id="oval:ssg:tst:349" version="1">
      <ind:object object_ref="oval:ssg:obj:1372"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchmodat x64" id="oval:ssg:tst:350" version="1">
      <ind:object object_ref="oval:ssg:obj:1373"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:353" version="2">
      <unix:object object_ref="oval:ssg:obj:1374"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:354" version="2">
      <unix:object object_ref="oval:ssg:obj:1376"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:355" version="2">
      <unix:object object_ref="oval:ssg:obj:1377"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:356" version="2">
      <unix:object object_ref="oval:ssg:obj:1378"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:357" version="2">
      <unix:object object_ref="oval:ssg:obj:1379"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:358" version="2">
      <unix:object object_ref="oval:ssg:obj:1380"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:359" version="2">
      <unix:object object_ref="oval:ssg:obj:1381"/>
      <unix:state state_ref="oval:ssg:ste:1375"/>
    </unix:runlevel_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:361" version="1" comment="/var/log on own partition">
      <linux:object object_ref="oval:ssg:obj:1382"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT DROP [0:0]" id="oval:ssg:tst:363" version="1">
      <ind:object object_ref="oval:ssg:obj:1383"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check /etc/sysconfig/iptables for line :INPUT ACCEPT [0:0]" id="oval:ssg:tst:364" version="1">
      <ind:object object_ref="oval:ssg:obj:1384"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Enable privacy extensions on each interface" id="oval:ssg:tst:366" version="1">
      <ind:object object_ref="oval:ssg:obj:1385"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:368" version="1" comment="package dbus is removed">
      <linux:object object_ref="oval:ssg:obj:1386"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:369" version="1" comment="package rsh-server is removed">
      <linux:object object_ref="oval:ssg:obj:1387"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Check value of PermitUserEnvironment in /etc/ssh/sshd_config" id="oval:ssg:tst:372" version="1">
      <ind:object object_ref="oval:ssg:obj:1388"/>
    </ind:textfilecontent54_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.icmp_ignore_bogus_error_responses set to 1" id="oval:ssg:tst:374" version="1">
      <unix:object object_ref="oval:ssg:obj:1389"/>
      <unix:state state_ref="oval:ssg:ste:1390"/>
    </unix:sysctl_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg:tst:376" version="1">
      <unix:object object_ref="oval:ssg:obj:1391"/>
      <unix:state state_ref="oval:ssg:ste:1392"/>
    </unix:file_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.secure_redirects set to 0" id="oval:ssg:tst:378" version="1">
      <unix:object object_ref="oval:ssg:obj:1393"/>
      <unix:state state_ref="oval:ssg:ste:1394"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:380" version="1" check="all" comment="kernel module jffs2 disabled">
      <ind:object object_ref="oval:ssg:obj:1395"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/csh.cshrc file" id="oval:ssg:tst:382" version="1">
      <ind:object object_ref="oval:ssg:obj:1396"/>
      <ind:state state_ref="oval:ssg:ste:1397"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:383" version="1" comment="package postfix is installed">
      <linux:object object_ref="oval:ssg:obj:1398"/>
    </linux:rpminfo_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:385" version="1" comment="nodev on /tmp">
      <linux:object object_ref="oval:ssg:obj:1399"/>
      <linux:state state_ref="oval:ssg:ste:1400"/>
    </linux:partition_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:387" version="2">
      <unix:object object_ref="oval:ssg:obj:1401"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:388" version="2">
      <unix:object object_ref="oval:ssg:obj:1403"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:389" version="2">
      <unix:object object_ref="oval:ssg:obj:1404"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:390" version="2">
      <unix:object object_ref="oval:ssg:obj:1405"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:391" version="2">
      <unix:object object_ref="oval:ssg:obj:1406"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:392" version="2">
      <unix:object object_ref="oval:ssg:obj:1407"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:393" version="2">
      <unix:object object_ref="oval:ssg:obj:1408"/>
      <unix:state state_ref="oval:ssg:ste:1402"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:395" version="1" comment="package sysstat is removed">
      <linux:object object_ref="oval:ssg:obj:1409"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:397" version="1" comment="package nfs-utils is removed">
      <linux:object object_ref="oval:ssg:obj:1410"/>
    </linux:rpminfo_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.icmp_echo_ignore_broadcasts set to 1" id="oval:ssg:tst:399" version="1">
      <unix:object object_ref="oval:ssg:obj:1411"/>
      <unix:state state_ref="oval:ssg:ste:1412"/>
    </unix:sysctl_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:401" version="2">
      <unix:object object_ref="oval:ssg:obj:1413"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:402" version="2">
      <unix:object object_ref="oval:ssg:obj:1415"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:403" version="2">
      <unix:object object_ref="oval:ssg:obj:1416"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:404" version="2">
      <unix:object object_ref="oval:ssg:obj:1417"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:405" version="2">
      <unix:object object_ref="oval:ssg:obj:1418"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:406" version="2">
      <unix:object object_ref="oval:ssg:obj:1419"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:407" version="2">
      <unix:object object_ref="oval:ssg:obj:1420"/>
      <unix:state state_ref="oval:ssg:ste:1414"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:409" version="1" comment="package hal is removed">
      <linux:object object_ref="oval:ssg:obj:1421"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:412" version="2">
      <unix:object object_ref="oval:ssg:obj:1422"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:413" version="2">
      <unix:object object_ref="oval:ssg:obj:1424"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:414" version="2">
      <unix:object object_ref="oval:ssg:obj:1425"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:415" version="2">
      <unix:object object_ref="oval:ssg:obj:1426"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:416" version="2">
      <unix:object object_ref="oval:ssg:obj:1427"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:417" version="2">
      <unix:object object_ref="oval:ssg:obj:1428"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:418" version="2">
      <unix:object object_ref="oval:ssg:obj:1429"/>
      <unix:state state_ref="oval:ssg:ste:1423"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:420" version="1" comment="package squid is removed">
      <linux:object object_ref="oval:ssg:obj:1430"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="check for audit=1 in /etc/grub.conf" id="oval:ssg:tst:422" version="1">
      <ind:object object_ref="oval:ssg:obj:1431"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="rsh disabled" id="oval:ssg:tst:424" version="1">
      <ind:object object_ref="oval:ssg:obj:1432"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:427" version="2">
      <unix:object object_ref="oval:ssg:obj:1433"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:428" version="2">
      <unix:object object_ref="oval:ssg:obj:1435"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:429" version="2">
      <unix:object object_ref="oval:ssg:obj:1436"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:430" version="2">
      <unix:object object_ref="oval:ssg:obj:1437"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:431" version="2">
      <unix:object object_ref="oval:ssg:obj:1438"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:432" version="2">
      <unix:object object_ref="oval:ssg:obj:1439"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:433" version="2">
      <unix:object object_ref="oval:ssg:obj:1440"/>
      <unix:state state_ref="oval:ssg:ste:1434"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="audit mount" id="oval:ssg:tst:435" version="1">
      <ind:object object_ref="oval:ssg:obj:1441"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable the more general port directive" id="oval:ssg:tst:437" version="1">
      <ind:object object_ref="oval:ssg:obj:1442"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Listen only at the localhost level" id="oval:ssg:tst:438" version="1">
      <ind:object object_ref="oval:ssg:obj:1443"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*SELINUXTYPE[\s]*=[\s]*([^#]*) expression in the /etc/selinux/config file" id="oval:ssg:tst:440" version="1">
      <ind:object object_ref="oval:ssg:obj:1444"/>
      <ind:state state_ref="oval:ssg:ste:1445"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg:tst:442" version="1">
      <unix:object object_ref="oval:ssg:obj:1446"/>
      <unix:state state_ref="oval:ssg:ste:1447"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" comment="dac modification chmod x32" id="oval:ssg:tst:444" version="1">
      <ind:object object_ref="oval:ssg:obj:1448"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification chmod x64" id="oval:ssg:tst:445" version="1">
      <ind:object object_ref="oval:ssg:obj:1449"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:447" version="2">
      <unix:object object_ref="oval:ssg:obj:1450"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:448" version="2">
      <unix:object object_ref="oval:ssg:obj:1452"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:449" version="2">
      <unix:object object_ref="oval:ssg:obj:1453"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:450" version="2">
      <unix:object object_ref="oval:ssg:obj:1454"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:451" version="2">
      <unix:object object_ref="oval:ssg:obj:1455"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:452" version="2">
      <unix:object object_ref="oval:ssg:obj:1456"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:453" version="2">
      <unix:object object_ref="oval:ssg:obj:1457"/>
      <unix:state state_ref="oval:ssg:ste:1451"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:455" version="1" comment="package net-snmp is removed">
      <linux:object object_ref="oval:ssg:obj:1458"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="audit changes selinux" id="oval:ssg:tst:457" version="1">
      <ind:object object_ref="oval:ssg:obj:1459"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:459" version="2">
      <unix:object object_ref="oval:ssg:obj:1460"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:460" version="2">
      <unix:object object_ref="oval:ssg:obj:1462"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:461" version="2">
      <unix:object object_ref="oval:ssg:obj:1463"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:462" version="2">
      <unix:object object_ref="oval:ssg:obj:1464"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:463" version="2">
      <unix:object object_ref="oval:ssg:obj:1465"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:464" version="2">
      <unix:object object_ref="oval:ssg:obj:1466"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:465" version="2">
      <unix:object object_ref="oval:ssg:obj:1467"/>
      <unix:state state_ref="oval:ssg:ste:1461"/>
    </unix:runlevel_test>
    <unix:file_test check="all" comment="check for local directories that are world writable and have uid greater than or equal to 500" id="oval:ssg:tst:467" version="1">
      <unix:object object_ref="oval:ssg:obj:1468"/>
      <unix:state state_ref="oval:ssg:ste:1469"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing user ownership of /etc/shadow" id="oval:ssg:tst:469" version="1">
      <unix:object object_ref="oval:ssg:obj:1470"/>
      <unix:state state_ref="oval:ssg:ste:1471"/>
    </unix:file_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:471" version="1" comment="nosuid on /dev/shm">
      <linux:object object_ref="oval:ssg:obj:1472"/>
      <linux:state state_ref="oval:ssg:ste:1473"/>
    </linux:partition_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:473" version="2">
      <unix:object object_ref="oval:ssg:obj:1474"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:474" version="2">
      <unix:object object_ref="oval:ssg:obj:1476"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:475" version="2">
      <unix:object object_ref="oval:ssg:obj:1477"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:476" version="2">
      <unix:object object_ref="oval:ssg:obj:1478"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:477" version="2">
      <unix:object object_ref="oval:ssg:obj:1479"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:478" version="2">
      <unix:object object_ref="oval:ssg:obj:1480"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:479" version="2">
      <unix:object object_ref="oval:ssg:obj:1481"/>
      <unix:state state_ref="oval:ssg:ste:1475"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:481" version="1" check="all" comment="kernel module dccp disabled">
      <ind:object object_ref="oval:ssg:obj:1482"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="any_exist" comment="Check that write permission to group and other in root's path is denied" id="oval:ssg:tst:483" version="1">
      <unix:object object_ref="oval:ssg:obj:1483"/>
      <unix:state state_ref="oval:ssg:ste:1484"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="any_exist" comment="Check that write permission to group and other in root's path is denied" id="oval:ssg:tst:484" version="1">
      <unix:object object_ref="oval:ssg:obj:1483"/>
      <unix:state state_ref="oval:ssg:ste:1485"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:486" version="2">
      <unix:object object_ref="oval:ssg:obj:1486"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:487" version="2">
      <unix:object object_ref="oval:ssg:obj:1488"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:488" version="2">
      <unix:object object_ref="oval:ssg:obj:1489"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:489" version="2">
      <unix:object object_ref="oval:ssg:obj:1490"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:490" version="2">
      <unix:object object_ref="oval:ssg:obj:1491"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:491" version="2">
      <unix:object object_ref="oval:ssg:obj:1492"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:492" version="2">
      <unix:object object_ref="oval:ssg:obj:1493"/>
      <unix:state state_ref="oval:ssg:ste:1487"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:494" version="1" comment="package bind is removed">
      <linux:object object_ref="oval:ssg:obj:1494"/>
    </linux:rpminfo_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with : or ." id="oval:ssg:tst:496" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1496"/>
    </ind:environmentvariable58_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH contains : twice in a row" id="oval:ssg:tst:497" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1497"/>
    </ind:environmentvariable58_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH contains . twice in a row" id="oval:ssg:tst:498" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1498"/>
    </ind:environmentvariable58_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH ends with : or ." id="oval:ssg:tst:499" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1499"/>
    </ind:environmentvariable58_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH starts with an absolute path /" id="oval:ssg:tst:500" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1500"/>
    </ind:environmentvariable58_test>
    <ind:environmentvariable58_test check="none satisfy" comment="environment variable PATH contains relative paths" id="oval:ssg:tst:501" version="1">
      <ind:object object_ref="oval:ssg:obj:1495"/>
      <ind:state state_ref="oval:ssg:ste:1501"/>
    </ind:environmentvariable58_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:503" version="1" check="all" comment="kernel module hfs disabled">
      <ind:object object_ref="oval:ssg:obj:1502"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:505" version="1" comment="package cyrus-sasl is removed">
      <linux:object object_ref="oval:ssg:obj:1503"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:507" version="2">
      <unix:object object_ref="oval:ssg:obj:1504"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:508" version="2">
      <unix:object object_ref="oval:ssg:obj:1506"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:509" version="2">
      <unix:object object_ref="oval:ssg:obj:1507"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:510" version="2">
      <unix:object object_ref="oval:ssg:obj:1508"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:511" version="2">
      <unix:object object_ref="oval:ssg:obj:1509"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:512" version="2">
      <unix:object object_ref="oval:ssg:obj:1510"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:513" version="2">
      <unix:object object_ref="oval:ssg:obj:1511"/>
      <unix:state state_ref="oval:ssg:ste:1505"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:516" version="2">
      <unix:object object_ref="oval:ssg:obj:1512"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:517" version="2">
      <unix:object object_ref="oval:ssg:obj:1514"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:518" version="2">
      <unix:object object_ref="oval:ssg:obj:1515"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:519" version="2">
      <unix:object object_ref="oval:ssg:obj:1516"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:520" version="2">
      <unix:object object_ref="oval:ssg:obj:1517"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:521" version="2">
      <unix:object object_ref="oval:ssg:obj:1518"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:522" version="2">
      <unix:object object_ref="oval:ssg:obj:1519"/>
      <unix:state state_ref="oval:ssg:ste:1513"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:524" version="1" check="all" comment="kernel module freevxfs disabled">
      <ind:object object_ref="oval:ssg:obj:1520"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:526" version="1">
      <ind:object object_ref="oval:ssg:obj:1521"/>
      <ind:state state_ref="oval:ssg:ste:1522"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:527" version="1" comment="package irqbalance is installed">
      <linux:object object_ref="oval:ssg:obj:1523"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing /etc/group permissions" id="oval:ssg:tst:529" version="1">
      <unix:object object_ref="oval:ssg:obj:1524"/>
      <unix:state state_ref="oval:ssg:ste:1525"/>
    </unix:file_test>
    <ind:unknown_test check="all" comment="use extended content to evaluated this test" id="oval:ssg:tst:531" version="1"/>
    <ind:textfilecontent54_test check="all" comment="rexec disabled" id="oval:ssg:tst:533" version="1">
      <ind:object object_ref="oval:ssg:obj:1526"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:535" version="2">
      <unix:object object_ref="oval:ssg:obj:1527"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:536" version="2">
      <unix:object object_ref="oval:ssg:obj:1529"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:537" version="2">
      <unix:object object_ref="oval:ssg:obj:1530"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:538" version="2">
      <unix:object object_ref="oval:ssg:obj:1531"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:539" version="2">
      <unix:object object_ref="oval:ssg:obj:1532"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:540" version="2">
      <unix:object object_ref="oval:ssg:obj:1533"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:541" version="2">
      <unix:object object_ref="oval:ssg:obj:1534"/>
      <unix:state state_ref="oval:ssg:ste:1528"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/etc/skel files mode 0644" id="oval:ssg:tst:543" version="1">
      <unix:object object_ref="oval:ssg:obj:1535"/>
      <unix:state state_ref="oval:ssg:ste:1536"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:544" version="1" comment="package httpd is removed">
      <linux:object object_ref="oval:ssg:obj:1537"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:546" version="2">
      <unix:object object_ref="oval:ssg:obj:1538"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:547" version="2">
      <unix:object object_ref="oval:ssg:obj:1540"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:548" version="2">
      <unix:object object_ref="oval:ssg:obj:1541"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:549" version="2">
      <unix:object object_ref="oval:ssg:obj:1542"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:550" version="2">
      <unix:object object_ref="oval:ssg:obj:1543"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:551" version="2">
      <unix:object object_ref="oval:ssg:obj:1544"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:552" version="2">
      <unix:object object_ref="oval:ssg:obj:1545"/>
      <unix:state state_ref="oval:ssg:ste:1539"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:554" version="2">
      <unix:object object_ref="oval:ssg:obj:1546"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:555" version="2">
      <unix:object object_ref="oval:ssg:obj:1548"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:556" version="2">
      <unix:object object_ref="oval:ssg:obj:1549"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:557" version="2">
      <unix:object object_ref="oval:ssg:obj:1550"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:558" version="2">
      <unix:object object_ref="oval:ssg:obj:1551"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:559" version="2">
      <unix:object object_ref="oval:ssg:obj:1552"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:560" version="2">
      <unix:object object_ref="oval:ssg:obj:1553"/>
      <unix:state state_ref="oval:ssg:ste:1547"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:561" version="1" comment="package ntp is installed">
      <linux:object object_ref="oval:ssg:obj:1554"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:564" version="2">
      <unix:object object_ref="oval:ssg:obj:1555"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:565" version="2">
      <unix:object object_ref="oval:ssg:obj:1557"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:566" version="2">
      <unix:object object_ref="oval:ssg:obj:1558"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:567" version="2">
      <unix:object object_ref="oval:ssg:obj:1559"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:568" version="2">
      <unix:object object_ref="oval:ssg:obj:1560"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:569" version="2">
      <unix:object object_ref="oval:ssg:obj:1561"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:570" version="2">
      <unix:object object_ref="oval:ssg:obj:1562"/>
      <unix:state state_ref="oval:ssg:ste:1556"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Test SplitHosts" id="oval:ssg:tst:572" version="1">
      <ind:object object_ref="oval:ssg:obj:1563"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S settimeofday and key" id="oval:ssg:tst:575" version="1">
      <ind:object object_ref="oval:ssg:obj:1564"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S settimeofday and key" id="oval:ssg:tst:576" version="1">
      <ind:object object_ref="oval:ssg:obj:1565"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="the value maxlogins should be set appropriately in /etc/security/limits.conf" id="oval:ssg:tst:578" version="1">
      <ind:object object_ref="oval:ssg:obj:1566"/>
      <ind:state state_ref="oval:ssg:ste:1567"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:580" version="2">
      <unix:object object_ref="oval:ssg:obj:1568"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:581" version="2">
      <unix:object object_ref="oval:ssg:obj:1570"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:582" version="2">
      <unix:object object_ref="oval:ssg:obj:1571"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:583" version="2">
      <unix:object object_ref="oval:ssg:obj:1572"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:584" version="2">
      <unix:object object_ref="oval:ssg:obj:1573"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:585" version="2">
      <unix:object object_ref="oval:ssg:obj:1574"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:586" version="2">
      <unix:object object_ref="oval:ssg:obj:1575"/>
      <unix:state state_ref="oval:ssg:ste:1569"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:588" version="2">
      <unix:object object_ref="oval:ssg:obj:1576"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:589" version="2">
      <unix:object object_ref="oval:ssg:obj:1578"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:590" version="2">
      <unix:object object_ref="oval:ssg:obj:1579"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:591" version="2">
      <unix:object object_ref="oval:ssg:obj:1580"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:592" version="2">
      <unix:object object_ref="oval:ssg:obj:1581"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:593" version="2">
      <unix:object object_ref="oval:ssg:obj:1582"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:594" version="2">
      <unix:object object_ref="oval:ssg:obj:1583"/>
      <unix:state state_ref="oval:ssg:ste:1577"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="minlen set in /etc/pam.d/system-auth" id="oval:ssg:tst:596" version="1">
      <ind:object object_ref="oval:ssg:obj:1584"/>
      <ind:state state_ref="oval:ssg:ste:1585"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check PASS_MIN_LEN in /etc/login.defs" id="oval:ssg:tst:597" version="1">
      <ind:object object_ref="oval:ssg:obj:1586"/>
      <ind:state state_ref="oval:ssg:ste:1585"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:599" version="2">
      <unix:object object_ref="oval:ssg:obj:1587"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:600" version="2">
      <unix:object object_ref="oval:ssg:obj:1589"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:601" version="2">
      <unix:object object_ref="oval:ssg:obj:1590"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:602" version="2">
      <unix:object object_ref="oval:ssg:obj:1591"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:603" version="2">
      <unix:object object_ref="oval:ssg:obj:1592"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:604" version="2">
      <unix:object object_ref="oval:ssg:obj:1593"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:605" version="2">
      <unix:object object_ref="oval:ssg:obj:1594"/>
      <unix:state state_ref="oval:ssg:ste:1588"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="check value of gpgcheck in /etc/yum.conf" id="oval:ssg:tst:607" version="1">
      <ind:object object_ref="oval:ssg:obj:1595"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:609" version="2">
      <unix:object object_ref="oval:ssg:obj:1596"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:610" version="2">
      <unix:object object_ref="oval:ssg:obj:1598"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:611" version="2">
      <unix:object object_ref="oval:ssg:obj:1599"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:612" version="2">
      <unix:object object_ref="oval:ssg:obj:1600"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:613" version="2">
      <unix:object object_ref="oval:ssg:obj:1601"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:614" version="2">
      <unix:object object_ref="oval:ssg:obj:1602"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:615" version="2">
      <unix:object object_ref="oval:ssg:obj:1603"/>
      <unix:state state_ref="oval:ssg:ste:1597"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:617" version="1" comment="package vsftpd is removed">
      <linux:object object_ref="oval:ssg:obj:1604"/>
    </linux:rpminfo_test>
    <unix:password_test check="all" comment="password hashes are shadowed" id="oval:ssg:tst:619" version="1">
      <unix:object object_ref="oval:ssg:obj:1605"/>
      <unix:state state_ref="oval:ssg:ste:1606"/>
    </unix:password_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:621" version="1" comment="package cups is removed">
      <linux:object object_ref="oval:ssg:obj:1607"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="virtual consoles /etc/securetty" id="oval:ssg:tst:623" version="1">
      <ind:object object_ref="oval:ssg:obj:1608"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:625" version="2">
      <unix:object object_ref="oval:ssg:obj:1609"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:626" version="2">
      <unix:object object_ref="oval:ssg:obj:1611"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:627" version="2">
      <unix:object object_ref="oval:ssg:obj:1612"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:628" version="2">
      <unix:object object_ref="oval:ssg:obj:1613"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:629" version="2">
      <unix:object object_ref="oval:ssg:obj:1614"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:630" version="2">
      <unix:object object_ref="oval:ssg:obj:1615"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:631" version="2">
      <unix:object object_ref="oval:ssg:obj:1616"/>
      <unix:state state_ref="oval:ssg:ste:1610"/>
    </unix:runlevel_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.send_redirects set to 0" id="oval:ssg:tst:633" version="1">
      <unix:object object_ref="oval:ssg:obj:1617"/>
      <unix:state state_ref="oval:ssg:ste:1618"/>
    </unix:sysctl_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:635" version="1" comment="package telnet-server is removed">
      <linux:object object_ref="oval:ssg:obj:1619"/>
    </linux:rpminfo_test>
    <linux:rpmverifyfile_test check_existence="none_exist" id="oval:ssg:tst:637" version="1" check="all" comment="verify file md5 hashes">
      <linux:object object_ref="oval:ssg:obj:1620"/>
    </linux:rpmverifyfile_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:639" version="1" comment="/home on own partition">
      <linux:object object_ref="oval:ssg:obj:1621"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:641" version="1">
      <ind:object object_ref="oval:ssg:obj:1622"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:642" version="1" comment="package openssh-server is removed">
      <linux:object object_ref="oval:ssg:obj:1623"/>
    </linux:rpminfo_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:644" version="1" comment="nosuid on /tmp">
      <linux:object object_ref="oval:ssg:obj:1624"/>
      <linux:state state_ref="oval:ssg:ste:1625"/>
    </linux:partition_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:646" version="1" comment="package dhcpd is removed">
      <linux:object object_ref="oval:ssg:obj:1626"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:649" version="2">
      <unix:object object_ref="oval:ssg:obj:1627"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:650" version="2">
      <unix:object object_ref="oval:ssg:obj:1629"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:651" version="2">
      <unix:object object_ref="oval:ssg:obj:1630"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:652" version="2">
      <unix:object object_ref="oval:ssg:obj:1631"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:653" version="2">
      <unix:object object_ref="oval:ssg:obj:1632"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:654" version="2">
      <unix:object object_ref="oval:ssg:obj:1633"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:655" version="2">
      <unix:object object_ref="oval:ssg:obj:1634"/>
      <unix:state state_ref="oval:ssg:ste:1628"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:657" version="2">
      <unix:object object_ref="oval:ssg:obj:1635"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:658" version="2">
      <unix:object object_ref="oval:ssg:obj:1637"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:659" version="2">
      <unix:object object_ref="oval:ssg:obj:1638"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:660" version="2">
      <unix:object object_ref="oval:ssg:obj:1639"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:661" version="2">
      <unix:object object_ref="oval:ssg:obj:1640"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:662" version="2">
      <unix:object object_ref="oval:ssg:obj:1641"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:663" version="2">
      <unix:object object_ref="oval:ssg:obj:1642"/>
      <unix:state state_ref="oval:ssg:ste:1636"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:665" version="2">
      <unix:object object_ref="oval:ssg:obj:1643"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:666" version="2">
      <unix:object object_ref="oval:ssg:obj:1645"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:667" version="2">
      <unix:object object_ref="oval:ssg:obj:1646"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:668" version="2">
      <unix:object object_ref="oval:ssg:obj:1647"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:669" version="2">
      <unix:object object_ref="oval:ssg:obj:1648"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:670" version="2">
      <unix:object object_ref="oval:ssg:obj:1649"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:671" version="2">
      <unix:object object_ref="oval:ssg:obj:1650"/>
      <unix:state state_ref="oval:ssg:ste:1644"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lsetxattr x32" id="oval:ssg:tst:673" version="1">
      <ind:object object_ref="oval:ssg:obj:1651"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lsetxattr x64" id="oval:ssg:tst:674" version="1">
      <ind:object object_ref="oval:ssg:obj:1652"/>
    </ind:textfilecontent54_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:676" version="1" comment="nosuid on removable partition">
      <linux:object object_ref="oval:ssg:obj:1653"/>
      <linux:state state_ref="oval:ssg:ste:1654"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="at least one" comment="removable partition /etc/fstab" id="oval:ssg:tst:677" version="1">
      <ind:object object_ref="oval:ssg:obj:1655"/>
      <ind:state state_ref="oval:ssg:ste:1656"/>
    </ind:textfilecontent54_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:679" version="1" comment="/tmp on own partition">
      <linux:object object_ref="oval:ssg:obj:1657"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg:tst:681" version="1">
      <ind:object object_ref="oval:ssg:obj:1658"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="timeout is configured" id="oval:ssg:tst:683" version="1">
      <ind:object object_ref="oval:ssg:obj:1659"/>
      <ind:state state_ref="oval:ssg:ste:1660"/>
    </ind:textfilecontent54_test>
    <ind:xmlfilecontent_test check="all" comment="test screensaver timeout period" id="oval:ssg:tst:685" version="1">
      <ind:object object_ref="oval:ssg:obj:1661"/>
      <ind:state state_ref="oval:ssg:ste:1662"/>
    </ind:xmlfilecontent_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter kernel.exec-shield set to 1" id="oval:ssg:tst:687" version="1">
      <unix:object object_ref="oval:ssg:obj:1663"/>
      <unix:state state_ref="oval:ssg:ste:1664"/>
    </unix:sysctl_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:689" version="2">
      <unix:object object_ref="oval:ssg:obj:1665"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:690" version="2">
      <unix:object object_ref="oval:ssg:obj:1667"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:691" version="2">
      <unix:object object_ref="oval:ssg:obj:1668"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:692" version="2">
      <unix:object object_ref="oval:ssg:obj:1669"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:693" version="2">
      <unix:object object_ref="oval:ssg:obj:1670"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:694" version="2">
      <unix:object object_ref="oval:ssg:obj:1671"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:695" version="2">
      <unix:object object_ref="oval:ssg:obj:1672"/>
      <unix:state state_ref="oval:ssg:ste:1666"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:696" version="1" comment="package ntpdate is removed">
      <linux:object object_ref="oval:ssg:obj:1673"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the ssl start_tls setting in the /etc/pam_ldap.conf file" id="oval:ssg:tst:699" version="1">
      <ind:object object_ref="oval:ssg:obj:1674"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="none_exist" comment="world writable files" id="oval:ssg:tst:701" version="1">
      <unix:object object_ref="oval:ssg:obj:1675"/>
      <unix:state state_ref="oval:ssg:ste:1676"/>
    </unix:file_test>
    <ind:xmlfilecontent_test check="all" comment="screensaver lock is enabled" id="oval:ssg:tst:703" version="1">
      <ind:object object_ref="oval:ssg:obj:1677"/>
      <ind:state state_ref="oval:ssg:ste:1678"/>
    </ind:xmlfilecontent_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S stime and key" id="oval:ssg:tst:705" version="1">
      <ind:object object_ref="oval:ssg:obj:1679"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the disable_plaintext_auth[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/dovecot.conf file" id="oval:ssg:tst:707" version="1">
      <ind:object object_ref="oval:ssg:obj:1680"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing file permissions" id="oval:ssg:tst:709" version="1">
      <unix:object object_ref="oval:ssg:obj:1681"/>
      <unix:state state_ref="oval:ssg:ste:1682"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:712" version="2">
      <unix:object object_ref="oval:ssg:obj:1683"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:713" version="2">
      <unix:object object_ref="oval:ssg:obj:1685"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:714" version="2">
      <unix:object object_ref="oval:ssg:obj:1686"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:715" version="2">
      <unix:object object_ref="oval:ssg:obj:1687"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:716" version="2">
      <unix:object object_ref="oval:ssg:obj:1688"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:717" version="2">
      <unix:object object_ref="oval:ssg:obj:1689"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:718" version="2">
      <unix:object object_ref="oval:ssg:obj:1690"/>
      <unix:state state_ref="oval:ssg:ste:1684"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S adjtime and key" id="oval:ssg:tst:720" version="1">
      <ind:object object_ref="oval:ssg:obj:1691"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S adjtime and key" id="oval:ssg:tst:721" version="1">
      <ind:object object_ref="oval:ssg:obj:1692"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:723" version="1" check="all" comment="kernel module udf disabled">
      <ind:object object_ref="oval:ssg:obj:1693"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/etc/passwd mode and ownership" id="oval:ssg:tst:725" version="1">
      <unix:object object_ref="oval:ssg:obj:1694"/>
      <unix:state state_ref="oval:ssg:ste:1695"/>
      <unix:state state_ref="oval:ssg:ste:1696"/>
      <unix:state state_ref="oval:ssg:ste:1697"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:727" version="2">
      <unix:object object_ref="oval:ssg:obj:1698"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:728" version="2">
      <unix:object object_ref="oval:ssg:obj:1700"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:729" version="2">
      <unix:object object_ref="oval:ssg:obj:1701"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:730" version="2">
      <unix:object object_ref="oval:ssg:obj:1702"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:731" version="2">
      <unix:object object_ref="oval:ssg:obj:1703"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:732" version="2">
      <unix:object object_ref="oval:ssg:obj:1704"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:733" version="2">
      <unix:object object_ref="oval:ssg:obj:1705"/>
      <unix:state state_ref="oval:ssg:ste:1699"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="do it" id="oval:ssg:tst:735" version="1">
      <ind:object object_ref="oval:ssg:obj:1706"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="/selinux/enforce is 1" id="oval:ssg:tst:737" version="1">
      <ind:object object_ref="oval:ssg:obj:1707"/>
      <ind:state state_ref="oval:ssg:ste:1708"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit sudoers" id="oval:ssg:tst:739" version="1">
      <ind:object object_ref="oval:ssg:obj:1709"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="space left action" id="oval:ssg:tst:741" version="1">
      <ind:object object_ref="oval:ssg:obj:1710"/>
      <ind:state state_ref="oval:ssg:ste:1711"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:743" version="2">
      <unix:object object_ref="oval:ssg:obj:1712"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:744" version="2">
      <unix:object object_ref="oval:ssg:obj:1714"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:745" version="2">
      <unix:object object_ref="oval:ssg:obj:1715"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:746" version="2">
      <unix:object object_ref="oval:ssg:obj:1716"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:747" version="2">
      <unix:object object_ref="oval:ssg:obj:1717"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:748" version="2">
      <unix:object object_ref="oval:ssg:obj:1718"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:749" version="2">
      <unix:object object_ref="oval:ssg:obj:1719"/>
      <unix:state state_ref="oval:ssg:ste:1713"/>
    </unix:runlevel_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:751" version="1" comment="/var on own partition">
      <linux:object object_ref="oval:ssg:obj:1720"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="make sure a password is defined in /etc/grub.conf" id="oval:ssg:tst:753" version="1">
      <ind:object object_ref="oval:ssg:obj:1721"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing user ownership" id="oval:ssg:tst:755" version="1">
      <unix:object object_ref="oval:ssg:obj:1722"/>
      <unix:state state_ref="oval:ssg:ste:1723"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="all_exist" comment="ssh private host keys" id="oval:ssg:tst:757" version="1">
      <unix:object object_ref="oval:ssg:obj:1724"/>
      <unix:state state_ref="oval:ssg:ste:1725"/>
      <unix:state state_ref="oval:ssg:ste:1726"/>
      <unix:state state_ref="oval:ssg:ste:1727"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" comment="dac modification removexattr x32" id="oval:ssg:tst:759" version="1">
      <ind:object object_ref="oval:ssg:obj:1728"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification removexattr x64" id="oval:ssg:tst:760" version="1">
      <ind:object object_ref="oval:ssg:obj:1729"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Ensure that the /etc/rsyslog.conf does not contain $InputTCPServerRun | $InputUDPServerRun | $InputRELPServerRun" id="oval:ssg:tst:762" version="1">
      <ind:object object_ref="oval:ssg:obj:1730"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="none_exist" comment="/etc/skel files mode 0644" id="oval:ssg:tst:764" version="1">
      <unix:object object_ref="oval:ssg:obj:1731"/>
      <unix:state state_ref="oval:ssg:ste:1732"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:766" version="2">
      <unix:object object_ref="oval:ssg:obj:1733"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:767" version="2">
      <unix:object object_ref="oval:ssg:obj:1735"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:768" version="2">
      <unix:object object_ref="oval:ssg:obj:1736"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:769" version="2">
      <unix:object object_ref="oval:ssg:obj:1737"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:770" version="2">
      <unix:object object_ref="oval:ssg:obj:1738"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:771" version="2">
      <unix:object object_ref="oval:ssg:obj:1739"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:772" version="2">
      <unix:object object_ref="oval:ssg:obj:1740"/>
      <unix:state state_ref="oval:ssg:ste:1734"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitRootLogin[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:774" version="1">
      <ind:object object_ref="oval:ssg:obj:1741"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:776" version="1" comment="package ypbind is removed">
      <linux:object object_ref="oval:ssg:obj:1742"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchown x32" id="oval:ssg:tst:778" version="1">
      <ind:object object_ref="oval:ssg:obj:1743"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchown x64" id="oval:ssg:tst:779" version="1">
      <ind:object object_ref="oval:ssg:obj:1744"/>
    </ind:textfilecontent54_test>
    <unix:uname_test check="all" comment="32 bit architecture" id="oval:ssg:tst:780" version="1">
      <unix:object object_ref="oval:ssg:obj:1745"/>
      <unix:state state_ref="oval:ssg:ste:1746"/>
    </unix:uname_test>
    <ind:textfilecontent54_test check="all" comment="dac modification setxattr x32" id="oval:ssg:tst:782" version="1">
      <ind:object object_ref="oval:ssg:obj:1747"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification setxattr x64" id="oval:ssg:tst:783" version="1">
      <ind:object object_ref="oval:ssg:obj:1748"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:785" version="2">
      <unix:object object_ref="oval:ssg:obj:1749"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:786" version="2">
      <unix:object object_ref="oval:ssg:obj:1751"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:787" version="2">
      <unix:object object_ref="oval:ssg:obj:1752"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:788" version="2">
      <unix:object object_ref="oval:ssg:obj:1753"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:789" version="2">
      <unix:object object_ref="oval:ssg:obj:1754"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:790" version="2">
      <unix:object object_ref="oval:ssg:obj:1755"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:791" version="2">
      <unix:object object_ref="oval:ssg:obj:1756"/>
      <unix:state state_ref="oval:ssg:ste:1750"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*BOOTPROTO[\s]*=[\s]*([^#]*) expression in the /etc/sysconfig/network-scripts/ifcfg-.* file" id="oval:ssg:tst:793" version="1">
      <ind:object object_ref="oval:ssg:obj:1757"/>
      <ind:state state_ref="oval:ssg:ste:1758"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="make sure nullok is not used in /etc/pam.d/system-auth" id="oval:ssg:tst:795" version="1">
      <ind:object object_ref="oval:ssg:obj:1759"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="the value INACTIVE parameter should be set appropriately in /etc/default/useradd" id="oval:ssg:tst:797" version="1">
      <ind:object object_ref="oval:ssg:obj:1760"/>
      <ind:state state_ref="oval:ssg:ste:1761"/>
      <ind:state state_ref="oval:ssg:ste:1762"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="Tests the value of the ^[\s]*\*[\s]+hard[\s]+core[\s]+([\d]+) setting in the /etc/security/limits.conf file" id="oval:ssg:tst:799" version="1">
      <ind:object object_ref="oval:ssg:obj:1763"/>
      <ind:state state_ref="oval:ssg:ste:1764"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="Tests the value of PASS_MIN_DAYS in /etc/login.defs" id="oval:ssg:tst:801" version="1">
      <ind:object object_ref="oval:ssg:obj:1765"/>
      <ind:state state_ref="oval:ssg:ste:1766"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:803" version="1" comment="package psacct is installed">
      <linux:object object_ref="oval:ssg:obj:1767"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="query /proc/net/wireless" id="oval:ssg:tst:805" version="1">
      <ind:object object_ref="oval:ssg:obj:1768"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Disable thumbnailers in GNOME" id="oval:ssg:tst:807" version="1">
      <ind:object object_ref="oval:ssg:obj:1769"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit insmod" id="oval:ssg:tst:809" version="1">
      <ind:object object_ref="oval:ssg:obj:1770"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit rmmod" id="oval:ssg:tst:810" version="1">
      <ind:object object_ref="oval:ssg:obj:1771"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit modprobe" id="oval:ssg:tst:811" version="1">
      <ind:object object_ref="oval:ssg:obj:1772"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit module syscalls" id="oval:ssg:tst:812" version="1">
      <ind:object object_ref="oval:ssg:obj:1773"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:814" version="1" comment="package rhnsd is removed">
      <linux:object object_ref="oval:ssg:obj:1774"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:815" version="1" comment="package abrt is removed">
      <linux:object object_ref="oval:ssg:obj:1775"/>
    </linux:rpminfo_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:817" version="1" comment="nodev on /dev/shm">
      <linux:object object_ref="oval:ssg:obj:1776"/>
      <linux:state state_ref="oval:ssg:ste:1777"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" comment="space left action" id="oval:ssg:tst:819" version="1">
      <ind:object object_ref="oval:ssg:obj:1778"/>
      <ind:state state_ref="oval:ssg:ste:1779"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for client signing = mandatory in /etc/samba/smb.conf" id="oval:ssg:tst:822" version="1">
      <ind:object object_ref="oval:ssg:obj:1780"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="max log file size" id="oval:ssg:tst:824" version="1">
      <ind:object object_ref="oval:ssg:obj:1781"/>
      <ind:state state_ref="oval:ssg:ste:1782"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit file eacces" id="oval:ssg:tst:826" version="1">
      <ind:object object_ref="oval:ssg:obj:1783"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit file eperm" id="oval:ssg:tst:827" version="1">
      <ind:object object_ref="oval:ssg:obj:1784"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing gshadow ownership" id="oval:ssg:tst:829" version="1">
      <unix:object object_ref="oval:ssg:obj:1785"/>
      <unix:state state_ref="oval:ssg:ste:1786"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:831" version="2">
      <unix:object object_ref="oval:ssg:obj:1787"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:832" version="2">
      <unix:object object_ref="oval:ssg:obj:1789"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:833" version="2">
      <unix:object object_ref="oval:ssg:obj:1790"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:834" version="2">
      <unix:object object_ref="oval:ssg:obj:1791"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:835" version="2">
      <unix:object object_ref="oval:ssg:obj:1792"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:836" version="2">
      <unix:object object_ref="oval:ssg:obj:1793"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:837" version="2">
      <unix:object object_ref="oval:ssg:obj:1794"/>
      <unix:state state_ref="oval:ssg:ste:1788"/>
    </unix:runlevel_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv6.conf.default.accept_ra set" id="oval:ssg:tst:839" version="1">
      <unix:object object_ref="oval:ssg:obj:1795"/>
      <unix:state state_ref="oval:ssg:ste:1796"/>
    </unix:sysctl_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:842" version="2">
      <unix:object object_ref="oval:ssg:obj:1797"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:843" version="2">
      <unix:object object_ref="oval:ssg:obj:1799"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:844" version="2">
      <unix:object object_ref="oval:ssg:obj:1800"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:845" version="2">
      <unix:object object_ref="oval:ssg:obj:1801"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:846" version="2">
      <unix:object object_ref="oval:ssg:obj:1802"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:847" version="2">
      <unix:object object_ref="oval:ssg:obj:1803"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:848" version="2">
      <unix:object object_ref="oval:ssg:obj:1804"/>
      <unix:state state_ref="oval:ssg:ste:1798"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing directory permissions" id="oval:ssg:tst:850" version="1">
      <unix:object object_ref="oval:ssg:obj:1805"/>
      <unix:state state_ref="oval:ssg:ste:1806"/>
    </unix:file_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg:tst:852" version="1">
      <unix:object object_ref="oval:ssg:obj:1807"/>
      <unix:state state_ref="oval:ssg:ste:1808"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:854" version="2">
      <unix:object object_ref="oval:ssg:obj:1809"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:855" version="2">
      <unix:object object_ref="oval:ssg:obj:1811"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:856" version="2">
      <unix:object object_ref="oval:ssg:obj:1812"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:857" version="2">
      <unix:object object_ref="oval:ssg:obj:1813"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:858" version="2">
      <unix:object object_ref="oval:ssg:obj:1814"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:859" version="2">
      <unix:object object_ref="oval:ssg:obj:1815"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:860" version="2">
      <unix:object object_ref="oval:ssg:obj:1816"/>
      <unix:state state_ref="oval:ssg:ste:1810"/>
    </unix:runlevel_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:862" version="1" comment="nodev on local filesystems">
      <linux:object object_ref="oval:ssg:obj:1817"/>
      <linux:state state_ref="oval:ssg:ste:1818"/>
    </linux:partition_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:864" version="1" comment="package vsftpd is installed">
      <linux:object object_ref="oval:ssg:obj:1819"/>
    </linux:rpminfo_test>
    <ind:family_test check="all" check_existence="at_least_one_exists" comment="installed OS part of unix family" id="oval:ssg:tst:101" version="1">
      <ind:object object_ref="oval:ssg:obj:104"/>
      <ind:state state_ref="oval:ssg:ste:105"/>
    </ind:family_test>
    <linux:rpminfo_test check="all" check_existence="any_exist" comment="redhat-release-workstation is version 6" id="oval:ssg:tst:102" version="1">
      <linux:object object_ref="oval:ssg:obj:106"/>
      <linux:state state_ref="oval:ssg:ste:107"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="any_exist" comment="redhat-release-server is version 6" id="oval:ssg:tst:103" version="1">
      <linux:object object_ref="oval:ssg:obj:108"/>
      <linux:state state_ref="oval:ssg:ste:109"/>
    </linux:rpminfo_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.send_redirects set to 0" id="oval:ssg:tst:866" version="1">
      <unix:object object_ref="oval:ssg:obj:1820"/>
      <unix:state state_ref="oval:ssg:ste:1821"/>
    </unix:sysctl_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:868" version="2">
      <unix:object object_ref="oval:ssg:obj:1822"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:869" version="2">
      <unix:object object_ref="oval:ssg:obj:1824"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:870" version="2">
      <unix:object object_ref="oval:ssg:obj:1825"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:871" version="2">
      <unix:object object_ref="oval:ssg:obj:1826"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:872" version="2">
      <unix:object object_ref="oval:ssg:obj:1827"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:873" version="2">
      <unix:object object_ref="oval:ssg:obj:1828"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:874" version="2">
      <unix:object object_ref="oval:ssg:obj:1829"/>
      <unix:state state_ref="oval:ssg:ste:1823"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:876" version="2">
      <unix:object object_ref="oval:ssg:obj:1830"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:877" version="2">
      <unix:object object_ref="oval:ssg:obj:1832"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:878" version="2">
      <unix:object object_ref="oval:ssg:obj:1833"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:879" version="2">
      <unix:object object_ref="oval:ssg:obj:1834"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:880" version="2">
      <unix:object object_ref="oval:ssg:obj:1835"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:881" version="2">
      <unix:object object_ref="oval:ssg:obj:1836"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:882" version="2">
      <unix:object object_ref="oval:ssg:obj:1837"/>
      <unix:state state_ref="oval:ssg:ste:1831"/>
    </unix:runlevel_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.rp_filter set to 1" id="oval:ssg:tst:884" version="1">
      <unix:object object_ref="oval:ssg:obj:1838"/>
      <unix:state state_ref="oval:ssg:ste:1839"/>
    </unix:sysctl_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:886" version="1" comment="package xorg-x11-server-common is removed">
      <linux:object object_ref="oval:ssg:obj:1840"/>
    </linux:rpminfo_test>
    <unix:file_test check="all" check_existence="all_exist" comment="ssh public host keys" id="oval:ssg:tst:888" version="1">
      <unix:object object_ref="oval:ssg:obj:1841"/>
      <unix:state state_ref="oval:ssg:ste:1842"/>
      <unix:state state_ref="oval:ssg:ste:1843"/>
      <unix:state state_ref="oval:ssg:ste:1844"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable automount in GNOME" id="oval:ssg:tst:890" version="1">
      <ind:object object_ref="oval:ssg:obj:1845"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable autorun in GNOME" id="oval:ssg:tst:891" version="1">
      <ind:object object_ref="oval:ssg:obj:1846"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:893" version="2">
      <unix:object object_ref="oval:ssg:obj:1847"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:894" version="2">
      <unix:object object_ref="oval:ssg:obj:1849"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:895" version="2">
      <unix:object object_ref="oval:ssg:obj:1850"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:896" version="2">
      <unix:object object_ref="oval:ssg:obj:1851"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:897" version="2">
      <unix:object object_ref="oval:ssg:obj:1852"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:898" version="2">
      <unix:object object_ref="oval:ssg:obj:1853"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:899" version="2">
      <unix:object object_ref="oval:ssg:obj:1854"/>
      <unix:state state_ref="oval:ssg:ste:1848"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:901" version="1" comment="package screen is installed">
      <linux:object object_ref="oval:ssg:obj:1855"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:904" version="2">
      <unix:object object_ref="oval:ssg:obj:1856"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:905" version="2">
      <unix:object object_ref="oval:ssg:obj:1858"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:906" version="2">
      <unix:object object_ref="oval:ssg:obj:1859"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:907" version="2">
      <unix:object object_ref="oval:ssg:obj:1860"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:908" version="2">
      <unix:object object_ref="oval:ssg:obj:1861"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:909" version="2">
      <unix:object object_ref="oval:ssg:obj:1862"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:910" version="2">
      <unix:object object_ref="oval:ssg:obj:1863"/>
      <unix:state state_ref="oval:ssg:ste:1857"/>
    </unix:runlevel_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:912" version="1" comment="noexec on /dev/shm">
      <linux:object object_ref="oval:ssg:obj:1864"/>
      <linux:state state_ref="oval:ssg:ste:1865"/>
    </linux:partition_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:913" version="1" comment="package quota is removed">
      <linux:object object_ref="oval:ssg:obj:1866"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Test HostLimit" id="oval:ssg:tst:915" version="1">
      <ind:object object_ref="oval:ssg:obj:1867"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/etc/httpd/conf/* permissions" id="oval:ssg:tst:917" version="1">
      <unix:object object_ref="oval:ssg:obj:1868"/>
      <unix:state state_ref="oval:ssg:ste:1869"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:919" version="2">
      <unix:object object_ref="oval:ssg:obj:1870"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:920" version="2">
      <unix:object object_ref="oval:ssg:obj:1872"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:921" version="2">
      <unix:object object_ref="oval:ssg:obj:1873"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:922" version="2">
      <unix:object object_ref="oval:ssg:obj:1874"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:923" version="2">
      <unix:object object_ref="oval:ssg:obj:1875"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:924" version="2">
      <unix:object object_ref="oval:ssg:obj:1876"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:925" version="2">
      <unix:object object_ref="oval:ssg:obj:1877"/>
      <unix:state state_ref="oval:ssg:ste:1871"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="look for .netrc in /home" id="oval:ssg:tst:927" version="1">
      <unix:object object_ref="oval:ssg:obj:1878"/>
    </unix:file_test>
    <ind:unknown_test check="all" comment="use extended content to evaluated this test" id="oval:ssg:tst:929" version="1"/>
    <unix:interface_test check="all" check_existence="at_least_one_exists" id="oval:ssg:tst:931" version="1" comment="random">
      <unix:object object_ref="oval:ssg:obj:1879"/>
      <unix:state state_ref="oval:ssg:ste:1880"/>
    </unix:interface_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:933" version="2">
      <unix:object object_ref="oval:ssg:obj:1881"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:934" version="2">
      <unix:object object_ref="oval:ssg:obj:1883"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:935" version="2">
      <unix:object object_ref="oval:ssg:obj:1884"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:936" version="2">
      <unix:object object_ref="oval:ssg:obj:1885"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:937" version="2">
      <unix:object object_ref="oval:ssg:obj:1886"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:938" version="2">
      <unix:object object_ref="oval:ssg:obj:1887"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:939" version="2">
      <unix:object object_ref="oval:ssg:obj:1888"/>
      <unix:state state_ref="oval:ssg:ste:1882"/>
    </unix:runlevel_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:940" version="1" comment="package portreserve is removed">
      <linux:object object_ref="oval:ssg:obj:1889"/>
    </linux:rpminfo_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.all.accept_source_route set to 0" id="oval:ssg:tst:942" version="1">
      <unix:object object_ref="oval:ssg:obj:1890"/>
      <unix:state state_ref="oval:ssg:ste:1891"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ClientAliveCountMax setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:944" version="1">
      <ind:object object_ref="oval:ssg:obj:1892"/>
      <ind:state state_ref="oval:ssg:ste:1893"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="network modification syscall" id="oval:ssg:tst:946" version="1">
      <ind:object object_ref="oval:ssg:obj:1894"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="/etc/issue modification" id="oval:ssg:tst:947" version="1">
      <ind:object object_ref="oval:ssg:obj:1895"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="/etc/issue.net modification" id="oval:ssg:tst:948" version="1">
      <ind:object object_ref="oval:ssg:obj:1896"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="/etc/hosts modification" id="oval:ssg:tst:949" version="1">
      <ind:object object_ref="oval:ssg:obj:1897"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="/etc/sysconfig/network modification" id="oval:ssg:tst:950" version="1">
      <ind:object object_ref="oval:ssg:obj:1898"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:952" version="1">
      <ind:object object_ref="oval:ssg:obj:1899"/>
      <ind:state state_ref="oval:ssg:ste:1900"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="sshd HostbasedAuthentication" id="oval:ssg:tst:954" version="1">
      <ind:object object_ref="oval:ssg:obj:1901"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="immutable" id="oval:ssg:tst:956" version="1">
      <ind:object object_ref="oval:ssg:obj:1902"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification chown x32" id="oval:ssg:tst:958" version="1">
      <ind:object object_ref="oval:ssg:obj:1903"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification chown x64" id="oval:ssg:tst:959" version="1">
      <ind:object object_ref="oval:ssg:obj:1904"/>
    </ind:textfilecontent54_test>
    <ind:xmlfilecontent_test check="all" comment="stuff" id="oval:ssg:tst:961" version="1">
      <ind:object object_ref="oval:ssg:obj:1905"/>
    </ind:xmlfilecontent_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:963" version="1" comment="package openldap-servers is removed">
      <linux:object object_ref="oval:ssg:obj:1906"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchownat x32" id="oval:ssg:tst:965" version="1">
      <ind:object object_ref="oval:ssg:obj:1907"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchownat x64" id="oval:ssg:tst:966" version="1">
      <ind:object object_ref="oval:ssg:obj:1908"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:967" version="1" comment="package subscription-manager is removed">
      <linux:object object_ref="oval:ssg:obj:1909"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for udp6 based rpc services" id="oval:ssg:tst:969" version="1">
      <ind:object object_ref="oval:ssg:obj:1910"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Test for tcp6 based rpc services" id="oval:ssg:tst:970" version="1">
      <ind:object object_ref="oval:ssg:obj:1911"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:971" version="1" comment="package iptables is installed">
      <linux:object object_ref="oval:ssg:obj:1912"/>
    </linux:rpminfo_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.ip_forward set to 0" id="oval:ssg:tst:973" version="1">
      <unix:object object_ref="oval:ssg:obj:1913"/>
      <unix:state state_ref="oval:ssg:ste:1914"/>
    </unix:sysctl_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.accept_redirects set to 0" id="oval:ssg:tst:975" version="1">
      <unix:object object_ref="oval:ssg:obj:1915"/>
      <unix:state state_ref="oval:ssg:ste:1916"/>
    </unix:sysctl_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:977" version="2">
      <unix:object object_ref="oval:ssg:obj:1917"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:978" version="2">
      <unix:object object_ref="oval:ssg:obj:1919"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:979" version="2">
      <unix:object object_ref="oval:ssg:obj:1920"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:980" version="2">
      <unix:object object_ref="oval:ssg:obj:1921"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:981" version="2">
      <unix:object object_ref="oval:ssg:obj:1922"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:982" version="2">
      <unix:object object_ref="oval:ssg:obj:1923"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:983" version="2">
      <unix:object object_ref="oval:ssg:obj:1924"/>
      <unix:state state_ref="oval:ssg:ste:1918"/>
    </unix:runlevel_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:985" version="1" comment="check for /var/log/audit partition">
      <linux:object object_ref="oval:ssg:obj:1925"/>
    </linux:partition_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:987" version="2">
      <unix:object object_ref="oval:ssg:obj:1926"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:988" version="2">
      <unix:object object_ref="oval:ssg:obj:1928"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:989" version="2">
      <unix:object object_ref="oval:ssg:obj:1929"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:990" version="2">
      <unix:object object_ref="oval:ssg:obj:1930"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:991" version="2">
      <unix:object object_ref="oval:ssg:obj:1931"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:992" version="2">
      <unix:object object_ref="oval:ssg:obj:1932"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:993" version="2">
      <unix:object object_ref="oval:ssg:obj:1933"/>
      <unix:state state_ref="oval:ssg:ste:1927"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:995" version="1" check="all" comment="kernel module tipc disabled">
      <ind:object object_ref="oval:ssg:obj:1934"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/bashrc file" id="oval:ssg:tst:997" version="1">
      <ind:object object_ref="oval:ssg:obj:1935"/>
      <ind:state state_ref="oval:ssg:ste:1936"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nodev" id="oval:ssg:tst:1000" version="1">
      <ind:object object_ref="oval:ssg:obj:1937"/>
      <ind:state state_ref="oval:ssg:ste:1938"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg:tst:999" version="1">
      <!-- this test returns 'true' if /etc/fstab does not contain nfs/nfs4 mounts -->
      <ind:object object_ref="oval:ssg:obj:1939"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the ^[\s]*umask[\s]+([^#]*) expression in the /etc/login.defs file" id="oval:ssg:tst:1002" version="1">
      <ind:object object_ref="oval:ssg:obj:1940"/>
      <ind:state state_ref="oval:ssg:ste:1941"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:1004" version="1" check="all" comment="kernel module usb-storage disabled">
      <ind:object object_ref="oval:ssg:obj:1942"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1006" version="2">
      <unix:object object_ref="oval:ssg:obj:1943"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1007" version="2">
      <unix:object object_ref="oval:ssg:obj:1945"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1008" version="2">
      <unix:object object_ref="oval:ssg:obj:1946"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1009" version="2">
      <unix:object object_ref="oval:ssg:obj:1947"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1010" version="2">
      <unix:object object_ref="oval:ssg:obj:1948"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1011" version="2">
      <unix:object object_ref="oval:ssg:obj:1949"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1012" version="2">
      <unix:object object_ref="oval:ssg:obj:1950"/>
      <unix:state state_ref="oval:ssg:ste:1944"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum failed login attempts allowed in /etc/pam.d/system-auth" id="oval:ssg:tst:1014" version="1">
      <ind:object object_ref="oval:ssg:obj:1951"/>
      <ind:state state_ref="oval:ssg:ste:1952"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="check maximum failed login attempts allowed in /etc/pam.d/password-auth" id="oval:ssg:tst:1015" version="1">
      <ind:object object_ref="oval:ssg:obj:1953"/>
      <ind:state state_ref="oval:ssg:ste:1954"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lchown x32" id="oval:ssg:tst:1017" version="1">
      <ind:object object_ref="oval:ssg:obj:1955"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lchown x64" id="oval:ssg:tst:1018" version="1">
      <ind:object object_ref="oval:ssg:obj:1956"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="/var/log/audit files mode 0640" id="oval:ssg:tst:1020" version="1">
      <unix:object object_ref="oval:ssg:obj:1957"/>
      <unix:state state_ref="oval:ssg:ste:1958"/>
    </unix:file_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1023" version="2">
      <unix:object object_ref="oval:ssg:obj:1959"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1024" version="2">
      <unix:object object_ref="oval:ssg:obj:1961"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1025" version="2">
      <unix:object object_ref="oval:ssg:obj:1962"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1026" version="2">
      <unix:object object_ref="oval:ssg:obj:1963"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1027" version="2">
      <unix:object object_ref="oval:ssg:obj:1964"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1028" version="2">
      <unix:object object_ref="oval:ssg:obj:1965"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1029" version="2">
      <unix:object object_ref="oval:ssg:obj:1966"/>
      <unix:state state_ref="oval:ssg:ste:1960"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg:tst:1031" version="1">
      <ind:object object_ref="oval:ssg:obj:1967"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1033" version="2">
      <unix:object object_ref="oval:ssg:obj:1968"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1034" version="2">
      <unix:object object_ref="oval:ssg:obj:1970"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1035" version="2">
      <unix:object object_ref="oval:ssg:obj:1971"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1036" version="2">
      <unix:object object_ref="oval:ssg:obj:1972"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1037" version="2">
      <unix:object object_ref="oval:ssg:obj:1973"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1038" version="2">
      <unix:object object_ref="oval:ssg:obj:1974"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1039" version="2">
      <unix:object object_ref="oval:ssg:obj:1975"/>
      <unix:state state_ref="oval:ssg:ste:1969"/>
    </unix:runlevel_test>
    <ind:xmlfilecontent_test check="all" comment="gnome screensaver set to blank screen" id="oval:ssg:tst:1041" version="1">
      <ind:object object_ref="oval:ssg:obj:1976"/>
      <ind:state state_ref="oval:ssg:ste:1977"/>
    </ind:xmlfilecontent_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:1042" version="1" comment="package rsyslog is installed">
      <linux:object object_ref="oval:ssg:obj:1978"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="TODO::INSERT" id="oval:ssg:tst:1044" version="1">
      <ind:object object_ref="oval:ssg:obj:1979"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:1046" version="1" check="all" comment="kernel module sctp disabled">
      <ind:object object_ref="oval:ssg:obj:1980"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the SINGLE variable in the /etc/sysconfig/init file, to ensure that a password must be entered to access single user mode it should be set as 'SINGLE=/sbin/sulogin'.  The init file provides further documentation on the configuration of this setting." id="oval:ssg:tst:1048" version="1">
      <ind:object object_ref="oval:ssg:obj:1981"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence etc localtime file in the rules file" id="oval:ssg:tst:1050" version="1">
      <ind:object object_ref="oval:ssg:obj:1982"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="utmp" id="oval:ssg:tst:1052" version="1">
      <ind:object object_ref="oval:ssg:obj:1983"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="btmp" id="oval:ssg:tst:1053" version="1">
      <ind:object object_ref="oval:ssg:obj:1984"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="wtmp" id="oval:ssg:tst:1054" version="1">
      <ind:object object_ref="oval:ssg:obj:1985"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/fstab" id="oval:ssg:tst:1056" version="1">
      <ind:object object_ref="oval:ssg:obj:1986"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/fstab" id="oval:ssg:tst:1057" version="1">
      <ind:object object_ref="oval:ssg:obj:1986"/>
      <ind:state state_ref="oval:ssg:ste:1987"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="check for no cifs in /etc/mtab" id="oval:ssg:tst:1058" version="1">
      <ind:object object_ref="oval:ssg:obj:1988"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="check for sec=krb5i or sec=ntlmv2i in /etc/mtab" id="oval:ssg:tst:1059" version="1">
      <ind:object object_ref="oval:ssg:obj:1988"/>
      <ind:state state_ref="oval:ssg:ste:1987"/>
    </ind:textfilecontent54_test>
    <linux:rpmverifyfile_test check_existence="none_exist" id="oval:ssg:tst:1061" version="1" check="all" comment="user ownership of all files matches local rpm database">
      <linux:object object_ref="oval:ssg:obj:1989"/>
    </linux:rpmverifyfile_test>
    <linux:rpmverifyfile_test check_existence="none_exist" id="oval:ssg:tst:1062" version="1" check="all" comment="group ownership of all files matches local rpm database">
      <linux:object object_ref="oval:ssg:obj:1990"/>
    </linux:rpmverifyfile_test>
    <linux:rpmverifyfile_test check_existence="none_exist" id="oval:ssg:tst:1063" version="1" check="all" comment="mode of all files matches local rpm database">
      <linux:object object_ref="oval:ssg:obj:1991"/>
    </linux:rpmverifyfile_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:1065" version="1" check="all" comment="kernel module cramfs disabled">
      <ind:object object_ref="oval:ssg:obj:1992"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1067" version="2">
      <unix:object object_ref="oval:ssg:obj:1993"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1068" version="2">
      <unix:object object_ref="oval:ssg:obj:1995"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1069" version="2">
      <unix:object object_ref="oval:ssg:obj:1996"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1070" version="2">
      <unix:object object_ref="oval:ssg:obj:1997"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1071" version="2">
      <unix:object object_ref="oval:ssg:obj:1998"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1072" version="2">
      <unix:object object_ref="oval:ssg:obj:1999"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1073" version="2">
      <unix:object object_ref="oval:ssg:obj:2000"/>
      <unix:state state_ref="oval:ssg:ste:1994"/>
    </unix:runlevel_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.tcp_syncookies set to 1" id="oval:ssg:tst:1075" version="1">
      <unix:object object_ref="oval:ssg:obj:2001"/>
      <unix:state state_ref="oval:ssg:ste:2002"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" comment="faillog" id="oval:ssg:tst:1077" version="1">
      <ind:object object_ref="oval:ssg:obj:2003"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="lastlog" id="oval:ssg:tst:1078" version="1">
      <ind:object object_ref="oval:ssg:obj:2004"/>
    </ind:textfilecontent54_test>
    <unix:sysctl_test check="all" check_existence="all_exist" comment="kernel runtime parameter net.ipv4.conf.default.accept_source_route set to 0" id="oval:ssg:tst:1080" version="1">
      <unix:object object_ref="oval:ssg:obj:2005"/>
      <unix:state state_ref="oval:ssg:ste:2006"/>
    </unix:sysctl_test>
    <ind:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg:tst:1082" version="1">
      <ind:object object_ref="oval:ssg:obj:2007"/>
      <ind:state state_ref="oval:ssg:ste:2008"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="correct banner in /etc/issue" id="oval:ssg:tst:1084" version="1">
      <ind:object object_ref="oval:ssg:obj:2009"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="check the configuration of /etc/pam.d/system-auth" id="oval:ssg:tst:1086" version="1">
      <ind:object object_ref="oval:ssg:obj:2010"/>
      <ind:state state_ref="oval:ssg:ste:2011"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1087" version="1" comment="package kexec-tools is removed">
      <linux:object object_ref="oval:ssg:obj:2012"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:1089" version="1" check="all" comment="kernel module hfsplus disabled">
      <ind:object object_ref="oval:ssg:obj:2013"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1090" version="1" comment="package samba-common is removed">
      <linux:object object_ref="oval:ssg:obj:2014"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="all_exist" id="oval:ssg:tst:1092" version="1" comment="package aide is installed">
      <linux:object object_ref="oval:ssg:obj:2015"/>
    </linux:rpminfo_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1093" version="2">
      <unix:object object_ref="oval:ssg:obj:2016"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1094" version="2">
      <unix:object object_ref="oval:ssg:obj:2018"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1095" version="2">
      <unix:object object_ref="oval:ssg:obj:2019"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1096" version="2">
      <unix:object object_ref="oval:ssg:obj:2020"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1097" version="2">
      <unix:object object_ref="oval:ssg:obj:2021"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1098" version="2">
      <unix:object object_ref="oval:ssg:obj:2022"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1099" version="2">
      <unix:object object_ref="oval:ssg:obj:2023"/>
      <unix:state state_ref="oval:ssg:ste:2017"/>
    </unix:runlevel_test>
    <unix:file_test check="all" check_existence="at_least_one_exists" comment="home directories" id="oval:ssg:tst:1101" version="1">
      <unix:object object_ref="oval:ssg:obj:2024"/>
      <unix:state state_ref="oval:ssg:ste:2025"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Tests the value of the Banner[\s]+/etc/issue setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:1103" version="1">
      <ind:object object_ref="oval:ssg:obj:2026"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1105" version="2">
      <unix:object object_ref="oval:ssg:obj:2027"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1106" version="2">
      <unix:object object_ref="oval:ssg:obj:2029"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1107" version="2">
      <unix:object object_ref="oval:ssg:obj:2030"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1108" version="2">
      <unix:object object_ref="oval:ssg:obj:2031"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1109" version="2">
      <unix:object object_ref="oval:ssg:obj:2032"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1110" version="2">
      <unix:object object_ref="oval:ssg:obj:2033"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1111" version="2">
      <unix:object object_ref="oval:ssg:obj:2034"/>
      <unix:state state_ref="oval:ssg:ste:2028"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fsetxattr x32" id="oval:ssg:tst:1113" version="1">
      <ind:object object_ref="oval:ssg:obj:2035"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fsetxattr x64" id="oval:ssg:tst:1114" version="1">
      <ind:object object_ref="oval:ssg:obj:2036"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 32bit -S clock_settime and key" id="oval:ssg:tst:1116" version="1">
      <ind:object object_ref="oval:ssg:obj:2037"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the for presence of 64bit -S clock_settime and key" id="oval:ssg:tst:1117" version="1">
      <ind:object object_ref="oval:ssg:obj:2038"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="tests for reg exp ^[^r][^o][^o][^t].*:0 in /etc/passwd file" id="oval:ssg:tst:1119" version="1">
      <ind:object object_ref="oval:ssg:obj:2039"/>
    </ind:textfilecontent54_test>
    <linux:selinuxsecuritycontext_test check="none exist" check_existence="all_exist" comment="unlabeled_t in /dev" id="oval:ssg:tst:1121" version="1">
      <linux:object object_ref="oval:ssg:obj:2040"/>
      <linux:state state_ref="oval:ssg:ste:2041"/>
    </linux:selinuxsecuritycontext_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the PermitEmptyPasswords[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:1123" version="1">
      <ind:object object_ref="oval:ssg:obj:2042"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="Tests the value of PASS_WARN_AGE in /etc/login.defs" id="oval:ssg:tst:1125" version="1">
      <ind:object object_ref="oval:ssg:obj:2043"/>
      <ind:state state_ref="oval:ssg:ste:2044"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="the value PASS_MAX_DAYS should be set appropriately in /etc/login.defs" id="oval:ssg:tst:1127" version="1">
      <ind:object object_ref="oval:ssg:obj:2045"/>
      <ind:state state_ref="oval:ssg:ste:2046"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing group ownership /etc/shadow" id="oval:ssg:tst:1129" version="1">
      <unix:object object_ref="oval:ssg:obj:2047"/>
      <unix:state state_ref="oval:ssg:ste:2048"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lremovexattr x32" id="oval:ssg:tst:1131" version="1">
      <ind:object object_ref="oval:ssg:obj:2049"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification lremovexattr x64" id="oval:ssg:tst:1132" version="1">
      <ind:object object_ref="oval:ssg:obj:2050"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="Tests the value of the IgnoreRhosts[\s]*(&lt;:nocomment:&gt;*) setting in the /etc/ssh/sshd_config file" id="oval:ssg:tst:1134" version="1">
      <ind:object object_ref="oval:ssg:obj:2051"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1136" version="1" comment="package ypserv is removed">
      <linux:object object_ref="oval:ssg:obj:2052"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Check if pam_ldap.so is uncommented in a file in pam.d" id="oval:ssg:tst:1137" version="1">
      <ind:object object_ref="oval:ssg:obj:2053"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit /etc/group" id="oval:ssg:tst:1139" version="1">
      <ind:object object_ref="oval:ssg:obj:2054"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit /etc/passwd" id="oval:ssg:tst:1140" version="1">
      <ind:object object_ref="oval:ssg:obj:2055"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit /etc/gshadow" id="oval:ssg:tst:1141" version="1">
      <ind:object object_ref="oval:ssg:obj:2056"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit /etc/shadow" id="oval:ssg:tst:1142" version="1">
      <ind:object object_ref="oval:ssg:obj:2057"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="audit /etc/security/opasswd" id="oval:ssg:tst:1143" version="1">
      <ind:object object_ref="oval:ssg:obj:2058"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1145" version="2">
      <unix:object object_ref="oval:ssg:obj:2059"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1146" version="2">
      <unix:object object_ref="oval:ssg:obj:2061"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1147" version="2">
      <unix:object object_ref="oval:ssg:obj:2062"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1148" version="2">
      <unix:object object_ref="oval:ssg:obj:2063"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1149" version="2">
      <unix:object object_ref="oval:ssg:obj:2064"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1150" version="2">
      <unix:object object_ref="oval:ssg:obj:2065"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1151" version="2">
      <unix:object object_ref="oval:ssg:obj:2066"/>
      <unix:state state_ref="oval:ssg:ste:2060"/>
    </unix:runlevel_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Disable Browsing" id="oval:ssg:tst:1153" version="1">
      <ind:object object_ref="oval:ssg:obj:2067"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="Do not allow for browsing" id="oval:ssg:tst:1154" version="1">
      <ind:object object_ref="oval:ssg:obj:2068"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" comment="files with no user owner" id="oval:ssg:tst:1156" version="1">
      <notes>
        <note>This will enumerate all files on local
      partitions</note>
      </notes>
      <unix:object object_ref="oval:ssg:obj:2069"/>
      <unix:state state_ref="oval:ssg:ste:2070"/>
    </unix:file_test>
    <ind:textfilecontent54_test check="all" comment="admin space left action " id="oval:ssg:tst:1158" version="1">
      <ind:object object_ref="oval:ssg:obj:2071"/>
      <ind:state state_ref="oval:ssg:ste:2072"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertdir setting in the /etc/pam_ldap.conf file" id="oval:ssg:tst:1160" version="1">
      <ind:object object_ref="oval:ssg:obj:2073"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="at_least_one_exists" comment="Tests the value of the tls_cacertfile setting in the /etc/pam_ldap.conf file" id="oval:ssg:tst:1161" version="1">
      <ind:object object_ref="oval:ssg:obj:2074"/>
    </ind:textfilecontent54_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1162" version="1" comment="package qpid-cpp-server is removed">
      <linux:object object_ref="oval:ssg:obj:2075"/>
    </linux:rpminfo_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1163" version="1" comment="package cpuspeed is removed">
      <linux:object object_ref="oval:ssg:obj:2076"/>
    </linux:rpminfo_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchmod x32" id="oval:ssg:tst:1165" version="1">
      <ind:object object_ref="oval:ssg:obj:2077"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" comment="dac modification fchmod x64" id="oval:ssg:tst:1166" version="1">
      <ind:object object_ref="oval:ssg:obj:2078"/>
    </ind:textfilecontent54_test>
    <unix:file_test check="all" check_existence="all_exist" comment="/boot/grub/grub.conf owned by root" id="oval:ssg:tst:1168" version="1">
      <unix:object object_ref="oval:ssg:obj:2079"/>
      <unix:state state_ref="oval:ssg:ste:2080"/>
    </unix:file_test>
    <ind:textfilecontent54_test id="oval:ssg:tst:1169" version="1" check="all" comment="ipv6 disabled any modprobe conf file">
      <ind:object object_ref="oval:ssg:obj:2081"/>
    </ind:textfilecontent54_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1171" version="2">
      <unix:object object_ref="oval:ssg:obj:2082"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1172" version="2">
      <unix:object object_ref="oval:ssg:obj:2084"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1173" version="2">
      <unix:object object_ref="oval:ssg:obj:2085"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1174" version="2">
      <unix:object object_ref="oval:ssg:obj:2086"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1175" version="2">
      <unix:object object_ref="oval:ssg:obj:2087"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1176" version="2">
      <unix:object object_ref="oval:ssg:obj:2088"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:runlevel_test check="all" check_existence="any_exist" comment="Runlevel test" id="oval:ssg:tst:1177" version="2">
      <unix:object object_ref="oval:ssg:obj:2089"/>
      <unix:state state_ref="oval:ssg:ste:2083"/>
    </unix:runlevel_test>
    <unix:uname_test check="all" comment="64 bit architecture" id="oval:ssg:tst:1178" version="1">
      <unix:object object_ref="oval:ssg:obj:2090"/>
      <unix:state state_ref="oval:ssg:ste:2091"/>
    </unix:uname_test>
    <unix:file_test check="all" check_existence="all_exist" comment="Testing group ownership" id="oval:ssg:tst:1180" version="1">
      <unix:object object_ref="oval:ssg:obj:2092"/>
      <unix:state state_ref="oval:ssg:ste:2093"/>
    </unix:file_test>
    <linux:rpminfo_test check="all" check_existence="none_exist" id="oval:ssg:tst:1181" version="1" comment="package mdadm is removed">
      <linux:object object_ref="oval:ssg:obj:2094"/>
    </linux:rpminfo_test>
    <linux:partition_test check="all" check_existence="all_exist" id="oval:ssg:tst:1183" version="1" comment="noexec on /tmp">
      <linux:object object_ref="oval:ssg:obj:2095"/>
      <linux:state state_ref="oval:ssg:ste:2096"/>
    </linux:partition_test>
    <ind:textfilecontent54_test check="all" check_existence="all_exist" comment="all nfs has nosuid" id="oval:ssg:tst:1186" version="1">
      <ind:object object_ref="oval:ssg:obj:2097"/>
      <ind:state state_ref="oval:ssg:ste:2098"/>
    </ind:textfilecontent54_test>
    <ind:textfilecontent54_test check="all" check_existence="none_exist" comment="no nfs" id="oval:ssg:tst:1185" version="1">
      <!-- this test returns 'true' if /etc/fstab does not contain nfs/nfs4 mounts -->
      <ind:object object_ref="oval:ssg:obj:2099"/>
    </ind:textfilecontent54_test>
  </tests>
  <objects>
    <unix:sysctl_object id="oval:ssg:obj:1187" version="1">
      <unix:name>net.ipv6.conf.default.accept_redirects</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object comment="Test for port 22 access over ipv4" id="oval:ssg:obj:1189" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>iptables</ind:filename>
      <ind:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="Test for port 22 access over ipv6" id="oval:ssg:obj:1190" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>ip6tables</ind:filename>
      <ind:pattern operation="pattern match">^-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1191" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1193" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1194" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1195" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1196" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1197" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1198" version="1">
      <unix:service_name>irqbalance</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1199" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1201" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1202" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1203" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1204" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1205" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1206" version="1">
      <unix:service_name>httpd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:sysctl_object id="oval:ssg:obj:1207" version="1">
      <unix:name>net.ipv4.conf.default.secure_redirects</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1209" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^\s*password\s+(?:(?:sufficient)|(?:required))\s+pam_unix\.so.*remember=([0-9]*).*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:xmlfilecontent_object id="oval:ssg:obj:1211" version="1">
      <ind:filepath>/etc/gconf/gconf.xml.defaults/%gconf-tree.xml</ind:filepath>
      <ind:xpath>/gconf/dir[@name='schemas']/dir[@name='apps']/dir[@name='gnome-screensaver']/entry[@name='idle_activation_enabled']/local_schema[1]/default[1]/@value</ind:xpath>
    </ind:xmlfilecontent_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1213" version="1" comment="kernel module rds disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+rds\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="look for the partition mount point in /etc/fstab" id="oval:ssg:obj:1214" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>fstab</ind:filename>
      <ind:pattern operation="pattern match">^\s*/tmp\s+/var/tmp\s.*bind.*$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1215" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1217" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1218" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1219" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1220" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1221" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1222" version="1">
      <unix:service_name>avahi-daemon</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1223" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>network</ind:filename>
      <ind:pattern operation="pattern match">^\s*NOZEROCONF=yes</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1226" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*([/\w]*)\s+.*,?noexec,?.*$</ind:pattern>
      <!-- the "not equal" operation essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <linux:partition_object id="oval:ssg:obj:1224" version="1">
      <linux:mount_point var_ref="oval:ssg:var:2100"/>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1228" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^\-a\salways,exit\s-F\spath=/bin/ping\s-F perm=x\s\-F\sauid&gt;=500\s\-F\sauid!=4294967295\s\-k\sprivileged</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>

    <linux:rpminfo_object id="oval:ssg:obj:10101" version="1" comment="Collect all rpms and exclude those signed by Red Hat and exclude those from scap and openscap.">
       <linux:name operation="pattern match">.*</linux:name>
          <filter action="exclude">oval:ssg:ste:10101</filter>
<!-->
          <filter action="exclude">oval:ssg:ste:10102</filter>
          <filter action="exclude">oval:ssg:ste:10103</filter>
<-->
    </linux:rpminfo_object>

    <linux:rpminfo_object id="oval:ssg:obj:1229" version="1">
      <linux:name>iputils</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/lib directories" id="oval:ssg:obj:1230" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/lib files" id="oval:ssg:obj:1231" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/lib64 directories" id="oval:ssg:obj:1232" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib64</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/lib64 files" id="oval:ssg:obj:1233" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib64</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib directories" id="oval:ssg:obj:1234" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib files" id="oval:ssg:obj:1235" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib64 directories" id="oval:ssg:obj:1236" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib64</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib64 files" id="oval:ssg:obj:1237" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib64</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/lib/modules directories" id="oval:ssg:obj:1238" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib/modules</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <unix:file_object comment="/lib/modules files" id="oval:ssg:obj:1239" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib/modules</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2101</filter>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1240" version="1" comment="kernel module bluetooth disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+bluetooth\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1241" version="1" comment="kernel module net-pf-31 disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+net-pf-31\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1242" version="1">
      <linux:name>tftp-server</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:1243" version="1">
      <linux:name>sendmail</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1244" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>profile</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*umask[\s]+([^#\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1246" version="1">
      <linux:name>iptables-ipv6</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="only local directories" id="oval:ssg:obj:1247" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:1248</filter>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1249" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^action_mail_acct\s*=\s*(\S+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1251" version="1">
      <ind:path>/etc/postfix</ind:path>
      <ind:filename>main.cf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*smtpd_banner[\s]*=[\s]*(.+)[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="Set static IPv6 address on each interface" id="oval:ssg:obj:1252" version="1">
      <ind:path>/etc/sysconfig/network-scripts</ind:path>
      <ind:filename operation="pattern match">ifcfg-.*</ind:filename>
      <ind:pattern operation="pattern match">^IPV6ADDR=.+$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1253" version="1" comment="kernel module squashfs disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+squashfs\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1254" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>init</ind:filename>
      <ind:pattern operation="pattern match">PROMPT[\s]*=[\s]*no\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/var/log/audit directories" id="oval:ssg:obj:1255" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/var/log/audit</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:1256</filter>
    </unix:file_object>
    <unix:file_object comment="/var/log/audit files" id="oval:ssg:obj:1257" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/var/log/audit</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:1256</filter>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:1258" version="1">
      <linux:name>openswan</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:1259" version="1">
      <linux:name>dhcp</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object comment="check ENCRYPT_METHOD in /etc/login.defs" id="oval:ssg:obj:1260" version="1">
      <ind:filepath>/etc/login.defs</ind:filepath>
      <ind:pattern operation="pattern match">^\s*ENCRYPT_METHOD\s+SHA512\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1261" version="1">
      <linux:name>cronie</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/etc/passwd" id="oval:ssg:obj:1262" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>passwd</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1266" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*([/\w]*)\s+.*,?nodev,?.*$</ind:pattern>
      <!-- the "not equal" operation essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <linux:partition_object id="oval:ssg:obj:1264" version="1">
      <linux:mount_point var_ref="oval:ssg:var:2102"/>
    </linux:partition_object>
    <unix:runlevel_object id="oval:ssg:obj:1268" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1270" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1271" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1272" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1273" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1274" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1275" version="1">
      <unix:service_name>postfix</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="/boot/grub/grub.conf" id="oval:ssg:obj:1276" version="1">
      <unix:path>/boot/grub</unix:path>
      <unix:filename>grub.conf</unix:filename>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:1278" version="1">
      <linux:name>audit</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1279" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>init</ind:filename>
      <ind:pattern operation="pattern match">umask[\s]+(.*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="Disable Telnet Service" id="oval:ssg:obj:1281" version="1">
      <ind:path>/etc/xinetd.d</ind:path>
      <ind:filename>telnet</ind:filename>
      <ind:pattern operation="pattern match">disable\s=\syes</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1282" version="1">
      <!-- the rpm package rsh-server installs a xinetd config file in /etc/xinetd.d which controls rlogin -->
      <!-- in this case /sbin/chkconfig edits /etc/xinetd.d/rlogin to enable/disable this service which is why we check it this way -->
      <ind:filepath>/etc/xinetd.d/rlogin</ind:filepath>
      <ind:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1283" version="1">
      <ind:path>/etc/yum.repos.d</ind:path>
      <ind:filename operation="pattern match">.*</ind:filename>
      <ind:pattern operation="pattern match">^\s*gpgcheck\s*=\s*0\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="look for .rhosts or .shosts in /root" id="oval:ssg:obj:1284" version="1">
      <unix:path operation="equals">/root</unix:path>
      <unix:filename operation="pattern match">^\.(r|s)hosts$</unix:filename>
    </unix:file_object>
    <unix:file_object comment="look for .rhosts or .shosts in /home" id="oval:ssg:obj:1285" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="1" recurse_file_system="all"/>
      <unix:path operation="equals">/home</unix:path>
      <unix:filename operation="pattern match">^\.(r|s)hosts$</unix:filename>
    </unix:file_object>
    <unix:file_object comment="look for /etc/hosts.equiv or /etc/shosts.equiv" id="oval:ssg:obj:1286" version="1">
      <unix:path operation="equals">/etc</unix:path>
      <unix:filename operation="pattern match">^s?hosts.equiv$</unix:filename>
    </unix:file_object>
    <unix:sysctl_object id="oval:ssg:obj:1287" version="1">
      <unix:name>net.ipv4.conf.all.rp_filter</unix:name>
    </unix:sysctl_object>
    <linux:rpminfo_object id="oval:ssg:obj:1289" version="1">
      <linux:name>dovecot</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/etc/shadow" id="oval:ssg:obj:1290" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>shadow</unix:filename>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:1294" version="1">
      <linux:name>policycoreutils</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1295" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]ucredit=(-?\d+)(?:[\s]|$)</ind:pattern>
      <ind:instance datatype="int" operation="less than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1297" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1299" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1300" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1301" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1302" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1303" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1304" version="1">
      <unix:service_name>cgconfig</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1305" version="1">
      <ind:filepath>/etc/inittab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*id:3:initdefault:\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="all local files" id="oval:ssg:obj:1306" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_file_system="local"/>
      <unix:path>/</unix:path>
      <unix:filename operation="pattern match">.*</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object comment="serial ports /etc/securetty" id="oval:ssg:obj:1308" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>securetty</ind:filename>
      <ind:pattern operation="pattern match">^ttyS[0-9]+$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1309" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^\s*Ciphers\s*aes128-ctr,aes192-ctr,aes256-ctr\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:sysctl_object id="oval:ssg:obj:1310" version="1">
      <unix:name>kernel.randomize_va_space</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1312" version="1">
      <ind:path>/etc/dovecot/conf.d</ind:path>
      <ind:filename>10-ssl.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*ssl[\s]*=[\s]*yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1313" version="1">
      <linux:name>xinetd</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/etc/group" id="oval:ssg:obj:1314" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>group</unix:filename>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:1316" version="1">
      <linux:name>oddjob</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/etc/gshadow" id="oval:ssg:obj:1317" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>gshadow</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1321" version="1">
      <ind:path>/etc/security</ind:path>
      <ind:filename>limits.conf</ind:filename>
      <ind:pattern operation="pattern match">^fs.suid_dumpable\s+=\s+1$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1322" version="1">
      <linux:name>libcgroup</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1323" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>grub.conf</ind:filename>
      <ind:pattern operation="pattern match">^\s*kernel\s/vmlinuz.*nousb.*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1324" version="1">
      <linux:name>pam_ldap</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1325" version="2">
      <ind:filepath>/etc/ssh/sshd_config</ind:filepath>
      <ind:pattern operation="pattern match">^\s*Protocol\s+2\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1326" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*retry=([0-9]*).*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:sysctl_object id="oval:ssg:obj:1328" version="1">
      <unix:name>net.ipv4.conf.all.accept_redirects</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1330" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+unlink\s+\-S\s+unlinkat\s+\-S\s+rename\s+\-S\s+renameat\s+\-F\s+auid&gt;=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1331" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1333" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1334" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1335" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1336" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1337" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1338" version="1">
      <unix:service_name>quota_nld</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="/lib directories" id="oval:ssg:obj:1339" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/lib files" id="oval:ssg:obj:1340" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/lib64 directories" id="oval:ssg:obj:1341" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib64</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/lib64 files" id="oval:ssg:obj:1342" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib64</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib directories" id="oval:ssg:obj:1343" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib files" id="oval:ssg:obj:1344" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib64 directories" id="oval:ssg:obj:1345" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib64</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/usr/lib64 files" id="oval:ssg:obj:1346" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/usr/lib64</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/lib/modules directories" id="oval:ssg:obj:1347" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib/modules</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <unix:file_object comment="/lib/modules files" id="oval:ssg:obj:1348" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_direction="down" max_depth="-1" recurse_file_system="all"/>
      <unix:path operation="equals">/lib/modules</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:2103</filter>
      <filter action="exclude">oval:ssg:ste:2104</filter>
    </unix:file_object>
    <ind:textfilecontent54_object comment="Define default gateways" id="oval:ssg:obj:1349" version="1">
      <ind:path>/etc/sysconfig/network-scripts</ind:path>
      <ind:filename operation="pattern match">ifcfg-.*</ind:filename>
      <ind:pattern operation="pattern match">^IPV6_DEFAULTGW=.+$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="TODO::INSERT" id="oval:ssg:obj:1350" version="1">
      <ind:path>/etc/postfix</ind:path>
      <ind:filename>main.cf</ind:filename>
      <ind:pattern operation="pattern match">^inet_interfaces = localhost$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1351" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]difok=(-?\d+)(?:[\s]|$)</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1353" version="1">
      <linux:name>smartmontools</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1354" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>rsyslog.conf</ind:filename>
      <ind:pattern operation="pattern match">^\*\.\*[\s]+@</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:sysctl_object id="oval:ssg:obj:1355" version="1">
      <unix:name>net.ipv4.conf.all.log_martians</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1357" version="1">
      <ind:filepath>/etc/xinetd.d/tftp</ind:filepath>
      <ind:pattern operation="pattern match">^\s*server_args\s+=\s+\-s\s+.+$$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1358" version="1">
      <linux:name>at</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1359" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fremovexattr syscall.  
         Assume user id's start above 500 and watch for any fremovexattr by them
         Watch for fremovexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1360" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fremovexattr syscall.  
         Assume user id's start above 500 and watch for any fremovexattr by them
         Watch for fremovexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fremovexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fremovexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1361" version="1">
      <linux:name>gpg-pubkey</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1364" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1366" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1367" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1368" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1369" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1370" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1371" version="1">
      <unix:service_name>ntpd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1372" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fchmodat syscall.  
         Assume user id's start above 500 and watch for fchmodats by them
         Watch for fchmodats by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1373" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fchmodat syscall.  
         Assume user id's start above 500 and watch for fchmodats by them
         Watch for fchmodats by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fchmodat -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmodat[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1374" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1376" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1377" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1378" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1379" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1380" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1381" version="1">
      <unix:service_name>ntpdate</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:partition_object id="oval:ssg:obj:1382" version="1">
      <linux:mount_point>/var/log</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1383" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>iptables</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*:INPUT\sDROP\s\[0:0\]</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1384" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>iptables</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*:INPUT\ACCEPT\s\[0:0\]</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="Enable privacy extensions on each interface" id="oval:ssg:obj:1385" version="1">
      <ind:path>/etc/sysconfig/network-scripts</ind:path>
      <ind:filename operation="pattern match">ifcfg-.*</ind:filename>
      <ind:pattern operation="pattern match">^IPV6_PRIVACY=rfc3041$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1386" version="1">
      <linux:name>dbus</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:1387" version="1">
      <linux:name>rsh-server</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1388" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[Pp][Ee][Rr][Mm][Ii][Tt][Uu][Ss][Ee][Rr][Ee][Nn][Vv][Ii][Rr][Oo][Nn][Mm][Ee][Nn][Tt][\s]+[Nn][Oo]\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:sysctl_object id="oval:ssg:obj:1389" version="1">
      <unix:name>net.ipv4.icmp_ignore_bogus_error_responses</unix:name>
    </unix:sysctl_object>
    <unix:file_object comment="/var/log/httpd/" id="oval:ssg:obj:1391" version="1">
      <unix:path>/var/log/httpd</unix:path>
      <unix:filename xsi:nil="true"/>
    </unix:file_object>
    <unix:sysctl_object id="oval:ssg:obj:1393" version="1">
      <unix:name>net.ipv4.conf.all.secure_redirects</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1395" version="1" comment="kernel module jffs2 disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+jffs2\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1396" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>csh.cshrc</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*umask[\s]+([^#\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1398" version="1">
      <linux:name>postfix</linux:name>
    </linux:rpminfo_object>
    <linux:partition_object id="oval:ssg:obj:1399" version="1">
      <linux:mount_point>/tmp</linux:mount_point>
    </linux:partition_object>
    <unix:runlevel_object id="oval:ssg:obj:1401" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1403" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1404" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1405" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1406" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1407" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1408" version="1">
      <unix:service_name>ip6tables</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1409" version="1">
      <linux:name>sysstat</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:1410" version="1">
      <linux:name>nfs-utils</linux:name>
    </linux:rpminfo_object>
    <unix:sysctl_object id="oval:ssg:obj:1411" version="1">
      <unix:name>net.ipv4.icmp_echo_ignore_broadcasts</unix:name>
    </unix:sysctl_object>
    <unix:runlevel_object id="oval:ssg:obj:1413" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1415" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1416" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1417" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1418" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1419" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1420" version="1">
      <unix:service_name>acpid</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1421" version="1">
      <linux:name>hal</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1422" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1424" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1425" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1426" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1427" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1428" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1429" version="1">
      <unix:service_name>abrtd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1430" version="1">
      <linux:name>squid</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1431" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>grub.conf</ind:filename>
      <ind:pattern operation="pattern match">^\s*kernel\s/vmlinuz.*audit=1.*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1432" version="1">
      <!-- the rpm package rsh-server installs a xinetd config file in /etc/xinetd.d which controls rsh -->
      <!-- in this case /sbin/chkconfig edits /etc/xinetd.d/rsh to enable/disable this service which is why we check it this way -->
      <ind:filepath>/etc/xinetd.d/rsh</ind:filepath>
      <ind:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1433" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1435" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1436" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1437" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1438" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1439" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1440" version="1">
      <unix:service_name>iptables</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1441" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+mount\s+\-F\s+auid&gt;=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1442" version="1">
      <ind:path>/etc/cups</ind:path>
      <ind:filename>cupsd.conf</ind:filename>
      <ind:pattern operation="pattern match">^Port 631$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1443" version="1">
      <ind:path>/etc/cups</ind:path>
      <ind:filename>cupsd.conf</ind:filename>
      <ind:pattern operation="pattern match">^Listen localhost:631$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1444" version="1">
      <ind:path>/etc/selinux</ind:path>
      <ind:filename>config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*SELINUXTYPE[\s]*=[\s]*([^#\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/gshadow" id="oval:ssg:obj:1446" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>gshadow</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1448" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the chmod syscall.  
         Assume user id's start above 500 and watch for any chmod by them
         Watch for chmods by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S chmod -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1449" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the chmod syscall.  
         Assume user id's start above 500 and watch for any chmod by them
         Watch for chmods by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S chmod -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chmod[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1450" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1452" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1453" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1454" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1455" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1456" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1457" version="1">
      <unix:service_name>nfs</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1458" version="1">
      <linux:name>net-snmp</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1459" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/selinux/\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1460" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1462" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1463" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1464" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1465" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1466" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1467" version="1">
      <unix:service_name>dovecot</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="all local directories" id="oval:ssg:obj:1468" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:1469</filter>
    </unix:file_object>
    <unix:file_object comment="/etc/shadow" id="oval:ssg:obj:1470" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>shadow</unix:filename>
    </unix:file_object>
    <linux:partition_object id="oval:ssg:obj:1472" version="1">
      <linux:mount_point>/dev/shm</linux:mount_point>
    </linux:partition_object>
    <unix:runlevel_object id="oval:ssg:obj:1474" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1476" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1477" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1478" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1479" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1480" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1481" version="1">
      <unix:service_name>certmonger</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1482" version="1" comment="kernel module dccp disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+dccp\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="root's PATH" id="oval:ssg:obj:1483" version="1">
      <unix:path var_ref="oval:ssg:var:2105"/>
      <unix:filename xsi:nil="true"/>
    </unix:file_object>
    <ind:environmentvariable_object id="oval:ssg:obj:2106" version="1">
      <ind:name>PATH</ind:name>
    </ind:environmentvariable_object>
    <unix:runlevel_object id="oval:ssg:obj:1486" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1488" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1489" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1490" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1491" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1492" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1493" version="1">
      <unix:service_name>oddjobd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1494" version="1">
      <linux:name>bind</linux:name>
    </linux:rpminfo_object>
    <ind:environmentvariable58_object id="oval:ssg:obj:1495" version="1">
      <ind:pid xsi:nil="true" datatype="int"/>
      <ind:name>PATH</ind:name>
    </ind:environmentvariable58_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1502" version="1" comment="kernel module hfs disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+hfs\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1503" version="1">
      <linux:name>cyrus-sasl</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1504" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1506" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1507" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1508" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1509" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1510" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1511" version="1">
      <unix:service_name>restorecond</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1512" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1514" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1515" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1516" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1517" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1518" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1519" version="1">
      <unix:service_name>mdmonitor</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1520" version="1" comment="kernel module freevxfs disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+freevxfs\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1521" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]ocredit=(-?\d+)(?:[\s]|$)</ind:pattern>
      <ind:instance datatype="int" operation="less than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1523" version="1">
      <linux:name>irqbalance</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="/etc/group" id="oval:ssg:obj:1524" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>group</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1526" version="1">
      <!-- the rpm package rsh-server installs a xinetd config file in /etc/xinetd.d which controls rexec -->
      <!-- in this case /sbin/chkconfig edits /etc/xinetd.d/rexec to enable/disable this service which is why we check it this way -->
      <ind:filepath>/etc/xinetd.d/rexec</ind:filepath>
      <ind:pattern operation="pattern match">^\s*disable\s+=\s+yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1527" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1529" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1530" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1531" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1532" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1533" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1534" version="1">
      <unix:service_name>crond</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="files with sgid set" id="oval:ssg:obj:1535" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:1536</filter>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:1537" version="1">
      <linux:name>httpd</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1538" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1540" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1541" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1542" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1543" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1544" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1545" version="1">
      <unix:service_name>haldaemon</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1546" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1548" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1549" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1550" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1551" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1552" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1553" version="1">
      <unix:service_name>rdisc</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1554" version="1">
      <linux:name>ntp</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1555" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1557" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1558" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1559" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1560" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1561" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1562" version="1">
      <unix:service_name>portreserve</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1563" version="1">
      <ind:path>/etc/logwatch/conf</ind:path>
      <ind:filename>logwatch.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]SplitHosts[\s]*=[\s]*[\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1564" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b32.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1565" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b64.*-S[\s]+settimeofday[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1566" version="1">
      <ind:filepath>/etc/security/limits.conf</ind:filepath>
      <ind:pattern operation="pattern match">^[\s]*\*[\s]+hard[\s]+maxlogins[\s]+(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1568" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1570" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1571" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1572" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1573" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1574" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1575" version="1">
      <unix:service_name>bluetooth</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1576" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1578" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1579" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1580" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1581" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1582" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1583" version="1">
      <unix:service_name>squid</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1584" version="1">
      <ind:filepath>/etc/pam.d/system-auth</ind:filepath>
      <ind:pattern operation="pattern match">^\s*password\s+(?:(?:required)|(?:requisite))\s+pam_cracklib\.so.*minlen=(\d+).*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1586" version="1">
      <ind:filepath>/etc/login.defs</ind:filepath>
      <ind:pattern operation="pattern match">^PASS_MIN_LEN\s+(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1587" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1589" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1590" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1591" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1592" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1593" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1594" version="1">
      <unix:service_name>saslauthd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1595" comment="gpgcheck set in /etc/yum.conf" version="1">
      <ind:filepath>/etc/yum.conf</ind:filepath>
      <ind:pattern operation="pattern match">^\s*gpgcheck\s*=\s*1\s*$</ind:pattern>
      <ind:instance datatype="int" operation="equals">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1596" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1598" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1599" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1600" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1601" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1602" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1603" version="1">
      <unix:service_name>autofs</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1604" version="1">
      <linux:name>vsftpd</linux:name>
    </linux:rpminfo_object>
    <unix:password_object id="oval:ssg:obj:1605" version="1">
      <unix:username operation="pattern match">.*</unix:username>
    </unix:password_object>
    <linux:rpminfo_object id="oval:ssg:obj:1607" version="1">
      <linux:name>cups</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object comment="virtual consoles /etc/securetty" id="oval:ssg:obj:1608" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>securetty</ind:filename>
      <ind:pattern operation="pattern match">^vc/[0-9]+$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1609" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1611" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1612" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1613" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1614" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1615" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1616" version="1">
      <unix:service_name>cups</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:sysctl_object id="oval:ssg:obj:1617" version="1">
      <unix:name>net.ipv4.conf.default.send_redirects</unix:name>
    </unix:sysctl_object>
    <linux:rpminfo_object id="oval:ssg:obj:1619" version="1">
      <linux:name>telnet-server</linux:name>
    </linux:rpminfo_object>
    <linux:rpmverifyfile_object id="oval:ssg:obj:1620" version="1" comment="rpm verify of all files">
      <linux:behaviors nomd5="false"/>
      <linux:name operation="pattern match">.*</linux:name>
      <linux:filepath operation="pattern match">^.*bin/.*$</linux:filepath>
      <filter action="include">oval:ssg:ste:2107</filter>
    </linux:rpmverifyfile_object>
    <linux:partition_object id="oval:ssg:obj:1621" version="1">
      <linux:mount_point>/home</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1622" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^\s*session\s+(required|requisite)?\s+pam_lastlog.so[\s\w\d\=]+showfailed</ind:pattern>
      <ind:instance datatype="int" operation="equals">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1623" version="1">
      <linux:name>openssh-server</linux:name>
    </linux:rpminfo_object>
    <linux:partition_object id="oval:ssg:obj:1624" version="1">
      <linux:mount_point>/tmp</linux:mount_point>
    </linux:partition_object>
    <linux:rpminfo_object id="oval:ssg:obj:1626" version="1">
      <linux:name>dhcpd</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1627" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1629" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1630" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1631" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1632" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1633" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1634" version="1">
      <unix:service_name>cpuspeed</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1635" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1637" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1638" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1639" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1640" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1641" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1642" version="1">
      <unix:service_name>netconsole</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1643" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1645" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1646" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1647" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1648" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1649" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1650" version="1">
      <unix:service_name>rpcidmapd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1651" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the lsetxattr syscall.  
         Assume user id's start above 500 and watch for lsetxattr by them
         Watch for lsetxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1652" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the lsetxattr syscall.  
         Assume user id's start above 500 and watch for lsetxattr by them
         Watch for lsetxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S lsetxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lsetxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1655" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*([/\w]*)\s+.*,?nosuid,?.*$</ind:pattern>
      <!-- the "not equal" operation essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <linux:partition_object id="oval:ssg:obj:1653" version="1">
      <linux:mount_point var_ref="oval:ssg:var:2108"/>
    </linux:partition_object>
    <linux:partition_object id="oval:ssg:obj:1657" version="1">
      <linux:mount_point>/tmp</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object comment="check /etc/pam.d/system-auth for correct settings" id="oval:ssg:obj:1658" version="1">
      <ind:filepath>/etc/pam.d/system-auth</ind:filepath>
      <ind:pattern operation="pattern match">^\s*password\s+sufficient\s+pam_unix.so\s+sha512.*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1659" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^\s*ClientAliveInterval\s+(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:xmlfilecontent_object id="oval:ssg:obj:1661" version="1">
      <ind:filepath>/etc/gconf/gconf.xml.defaults/%gconf-tree.xml</ind:filepath>
      <ind:xpath datatype="string" operation="equals">/gconf/dir[@name='schemas']/dir[@name='apps']/dir[@name='gnome-screensaver']/entry[@name='idle_delay']/local_schema[1]/default[1]/@value</ind:xpath>
    </ind:xmlfilecontent_object>
    <unix:sysctl_object id="oval:ssg:obj:1663" version="1">
      <unix:name>kernel.exec-shield</unix:name>
    </unix:sysctl_object>
    <unix:runlevel_object id="oval:ssg:obj:1665" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1667" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1668" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1669" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1670" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1671" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1672" version="1">
      <unix:service_name>xinetd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1673" version="1">
      <linux:name>ntpdate</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1674" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>pam_ldap.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*ssl[\s]+start_tls[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="world writable" id="oval:ssg:obj:1675" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:1676</filter>
    </unix:file_object>
    <ind:xmlfilecontent_object id="oval:ssg:obj:1677" version="1">
      <ind:filepath>/etc/gconf/gconf.xml.defaults/%gconf-tree.xml</ind:filepath>
      <ind:xpath>/gconf/dir[@name='schemas']/dir[@name='apps']/dir[@name='gnome-screensaver']/entry[@name='lock_enabled']/local_schema[1]/default[1]/@value</ind:xpath>
    </ind:xmlfilecontent_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1679" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b32.*-S[\s]+stime[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1680" version="1">
      <ind:path>/etc/dovecot/conf.d</ind:path>
      <ind:filename>10-auth.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*disable_plaintext_auth[\s]*=[\s]*yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/boot/grub/grub.conf" id="oval:ssg:obj:1681" version="1">
      <unix:path>/boot/grub</unix:path>
      <unix:filename>grub.conf</unix:filename>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1683" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1685" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1686" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1687" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1688" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1689" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1690" version="1">
      <unix:service_name>rsyslog</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1691" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b32.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1692" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b64.*-S[\s]+adjtimex[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1693" version="1" comment="kernel module udf disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+udf\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/passwd" id="oval:ssg:obj:1694" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>passwd</unix:filename>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1698" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1700" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1701" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1702" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1703" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1704" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1705" version="1">
      <unix:service_name>cgred</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1706" version="1">
      <ind:filepath>/boot/grub/grub.conf</ind:filepath>
      <ind:pattern operation="pattern match">^\s*kernel\s+.*(selinux|enforcing)=0.*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1707" version="1">
      <ind:path>/etc/selinux</ind:path>
      <ind:filename>config</ind:filename>
      <ind:pattern operation="pattern match">^SELINUX=(.*)$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1709" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/sudoers\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1710" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^space_left_action\s*=\s*(\S+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1712" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1714" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1715" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1716" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1717" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1718" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1719" version="1">
      <unix:service_name>auditd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:partition_object id="oval:ssg:obj:1720" version="1">
      <linux:mount_point>/var</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1721" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>grub.conf</ind:filename>
      <ind:pattern operation="pattern match">password[\s]+--encrypted[\s]+.*</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/passwd" id="oval:ssg:obj:1722" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>passwd</unix:filename>
    </unix:file_object>
    <unix:file_object comment="ssh private host keys" id="oval:ssg:obj:1724" version="1">
      <unix:path var_ref="oval:ssg:var:2109"/>
      <unix:filename operation="pattern match">^.*_key$</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1728" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the removexattr syscall.  
         Assume user id's start above 500 and watch for any removexattr by them
         Watch for removexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S removexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1729" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the removexattr syscall.  
         Assume user id's start above 500 and watch for any removexattr by them
         Watch for removexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S removexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+removexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1730" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>rsyslog.conf</ind:filename>
      <ind:pattern operation="pattern match">^\$Input(?:(TCP)|(UDP)|(RELP))ServerRun\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="files with suid set" id="oval:ssg:obj:1731" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:1732</filter>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1733" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1735" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1736" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1737" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1738" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1739" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1740" version="1">
      <unix:service_name>atd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1741" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[Pp][Ee][Rr][Mm][Ii][Tt][Rr][Oo][Oo][Tt][Ll][Oo][Gg][Ii][Nn][\s]*yes</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1742" version="1">
      <linux:name>ypbind</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1743" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fchown syscall.  
         Assume user id's start above 500 and watch for fchowns by them
         Watch for fchowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fchown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1744" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fchown syscall.  
         Assume user id's start above 500 and watch for fchowns by them
         Watch for fchowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fchown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:uname_object comment="32 bit architecture" id="oval:ssg:obj:1745" version="1">
  </unix:uname_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1747" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the setxattr syscall.  
         Assume user id's start above 500 and watch for setxattrs by them
         Watch for setxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S setxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1748" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the setxattr syscall.  
         Assume user id's start above 500 and watch for setxattrs by them
         Watch for setxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S setxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+setxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1749" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1751" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1752" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1753" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1754" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1755" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1756" version="1">
      <unix:service_name>rpcgssd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1757" version="1">
      <ind:path>/etc/sysconfig/network-scripts</ind:path>
      <ind:filename operation="pattern match">ifcfg-.*</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*BOOTPROTO[\s]*=[\s"]*([^#"\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1759" version="1">
      <ind:path>/etc/pam.d/</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">\s*nullok\s*</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1760" version="1">
      <ind:filepath>/etc/default/useradd</ind:filepath>
      <ind:pattern operation="pattern match">^\s*INACTIVE\s*=\s*(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1763" version="1">
      <ind:path>/etc/security</ind:path>
      <ind:filename>limits.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*\*[\s]+hard[\s]+core[\s]+([\d]+)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1765" version="1">
      <ind:filepath>/etc/login.defs</ind:filepath>
      <ind:pattern operation="pattern match">^[\s]*PASS_MIN_DAYS[\s]+(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1767" version="1">
      <linux:name>psacct</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1768" version="1">
      <ind:filepath>/proc/net/wireless</ind:filepath>
      <ind:pattern operation="pattern match">^\s*[-\w]+:</ind:pattern>
      <ind:instance datatype="int" operation="equals">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1769" version="1">
      <ind:path>/etc/gconf/gconf.xml.mandatory/desktop/gnome/thumbnailers</ind:path>
      <ind:filename>%gconf.xml</ind:filename>
      <ind:pattern operation="pattern match">^\s*.entry\s+name="disable_all"\s+mtime="\d+"\s+type="bool"\s+value="true"\/.$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1770" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/sbin/insmod\s+\-p\s+x\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1771" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/sbin/rmmod\s+\-p\s+x\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1772" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/sbin/modprobe\s+\-p\s+x\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1773" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+init_module\s+\-S\s+delete_module\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1774" version="1">
      <linux:name>rhnsd</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:1775" version="1">
      <linux:name>abrt</linux:name>
    </linux:rpminfo_object>
    <linux:partition_object id="oval:ssg:obj:1776" version="1">
      <linux:mount_point>/dev/shm</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1778" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^admin_space_left_action\s*=\s*(\S+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1780" version="1">
      <ind:path>/etc/samba</ind:path>
      <ind:filename>smb.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*client[\s]+signing[\s]*=[\s]mandatory</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1781" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^max_log_file\s*=\s*(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1783" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EACCES\s+\-F\s+auid&gt;=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1784" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+always,exit\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+creat\s+\-S\s+open\s+\-S\s+openat\s+\-S\s+truncate\s+\-S\s+ftruncate\s+\-F\s+exit=\-EPERM\s+\-F\s+auid&gt;=500\s+\-F\s+auid!=4294967295\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/gshadow" id="oval:ssg:obj:1785" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>gshadow</unix:filename>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1787" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1789" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1790" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1791" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1792" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1793" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1794" version="1">
      <unix:service_name>smb</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:sysctl_object id="oval:ssg:obj:1795" version="1">
      <unix:name>net.ipv6.conf.default.accept_ra</unix:name>
    </unix:sysctl_object>
    <unix:runlevel_object id="oval:ssg:obj:1797" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1799" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1800" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1801" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1802" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1803" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1804" version="1">
      <unix:service_name>qpidd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="/etc/httpd/conf/" id="oval:ssg:obj:1805" version="1">
      <unix:path>/etc/httpd/conf</unix:path>
      <unix:filename xsi:nil="true"/>
    </unix:file_object>
    <unix:file_object comment="/boot/grub/grub.conf" id="oval:ssg:obj:1807" version="1">
      <unix:path>/var/log</unix:path>
      <unix:filename operation="pattern match">.*log</unix:filename>
      <!-- <filter action="exclude">state_rsyslog_files_ownership</filter> -->
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1809" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1811" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1812" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1813" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1814" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1815" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1816" version="1">
      <unix:service_name>tftp</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:partition_object id="oval:ssg:obj:1817" version="1">
      <!-- look at all partitions except root -->
      <linux:mount_point operation="pattern match">^/\w.*$</linux:mount_point>
      <filter action="include">oval:ssg:ste:1818</filter>
    </linux:partition_object>
    <linux:rpminfo_object id="oval:ssg:obj:1819" version="1">
      <linux:name>vsftpd</linux:name>
    </linux:rpminfo_object>
    <ind:family_object id="oval:ssg:obj:104" version="1"/>
    <linux:rpminfo_object id="oval:ssg:obj:106" version="1">
      <linux:name>redhat-release-workstation</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:108" version="1">
      <linux:name>redhat-release-server</linux:name>
    </linux:rpminfo_object>
    <unix:sysctl_object id="oval:ssg:obj:1820" version="1">
      <unix:name>net.ipv4.conf.all.send_redirects</unix:name>
    </unix:sysctl_object>
    <unix:runlevel_object id="oval:ssg:obj:1822" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1824" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1825" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1826" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1827" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1828" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1829" version="1">
      <unix:service_name>smartd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1830" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1832" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1833" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1834" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1835" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1836" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1837" version="1">
      <unix:service_name>snmpd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:sysctl_object id="oval:ssg:obj:1838" version="1">
      <unix:name>net.ipv4.conf.default.rp_filter</unix:name>
    </unix:sysctl_object>
    <linux:rpminfo_object id="oval:ssg:obj:1840" version="1">
      <linux:name>xorg-x11-server-common</linux:name>
    </linux:rpminfo_object>
    <unix:file_object comment="ssh public host keys" id="oval:ssg:obj:1841" version="1">
      <unix:path var_ref="oval:ssg:var:2110"/>
      <unix:filename operation="pattern match">^.*_key\.pub$</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1845" version="1">
      <ind:path>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences</ind:path>
      <ind:filename>%gconf.xml</ind:filename>
      <ind:pattern operation="pattern match">^\s*.entry\s+name="media_automount"\s+mtime="\d+"\s+type="bool"\s+value="false"\/.$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1846" version="1">
      <ind:path>/etc/gconf/gconf.xml.mandatory/apps/nautilus/preferences</ind:path>
      <ind:filename>%gconf.xml</ind:filename>
      <ind:pattern operation="pattern match">^\s*.entry\s+name="media_autorun_never"\s+mtime="\d+"\s+type="bool"\s+value="true"\/.$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1847" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1849" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1850" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1851" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1852" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1853" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1854" version="1">
      <unix:service_name>vsftpd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1855" version="1">
      <linux:name>screen</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:1856" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1858" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1859" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1860" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1861" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1862" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1863" version="1">
      <unix:service_name>rhsmcertd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:partition_object id="oval:ssg:obj:1864" version="1">
      <linux:mount_point>/dev/shm</linux:mount_point>
    </linux:partition_object>
    <linux:rpminfo_object id="oval:ssg:obj:1866" version="1">
      <linux:name>quota</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1867" version="1">
      <ind:path>/etc/logwatch/conf</ind:path>
      <ind:filename>logwatch.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]HostLimit[\s]*=[\s]*[\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/httpd/conf/* permissions" id="oval:ssg:obj:1868" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/etc/httpd/conf</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1870" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1872" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1873" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1874" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1875" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1876" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1877" version="1">
      <unix:service_name>ypbind</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="look for .netrc in /home" id="oval:ssg:obj:1878" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="1" recurse_file_system="all"/>
      <unix:path operation="equals">/home</unix:path>
      <unix:filename operation="pattern match">^\.netrc$</unix:filename>
    </unix:file_object>
    <unix:interface_object id="oval:ssg:obj:1879" version="1">
      <unix:name operation="pattern match">^.*$</unix:name>
      <filter action="include">oval:ssg:ste:1880</filter>
    </unix:interface_object>
    <unix:runlevel_object id="oval:ssg:obj:1881" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1883" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1884" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1885" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1886" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1887" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1888" version="1">
      <unix:service_name>messagebus</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:rpminfo_object id="oval:ssg:obj:1889" version="1">
      <linux:name>portreserve</linux:name>
    </linux:rpminfo_object>
    <unix:sysctl_object id="oval:ssg:obj:1890" version="1">
      <unix:name>net.ipv4.conf.all.accept_source_route</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1892" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*ClientAliveCountMax[\s]*([\d]+)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1894" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-a\s+exit,always\s+(\-F\s+arch=(b64|b32)\s+)?\-S\s+sethostname\s+\-S\s+setdomainname\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1895" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/issue\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1896" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/issue\.net\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1897" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/hosts\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1898" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/sysconfig/network\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1899" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]dcredit=(-?\d+)(?:[\s]|$)</ind:pattern>
      <ind:instance datatype="int" operation="less than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1901" version="1">
      <ind:filepath>/etc/ssh/sshd_config</ind:filepath>
      <ind:pattern operation="pattern match">^\s*HostbasedAuthentication\s+yes\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1902" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-e\s+2\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1903" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the chown syscall.  
         Assume user id's start above 500 and watch for chowns by them
         Watch for chowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S chown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1904" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the chown syscall.  
         Assume user id's start above 500 and watch for chowns by them
         Watch for chowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S chown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+chown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:xmlfilecontent_object id="oval:ssg:obj:1905" version="1">
      <ind:path>/etc/gconf/gconf.xml.defaults</ind:path>
      <ind:filename>%gconf-tree.xml</ind:filename>
      <ind:xpath>/gconf/dir[@name='apps']/dir[@name='gdm']/dir[@name='simple-greeter']/entry[@name='banner_message_enable']/local_schema[1]/default[1]/@value</ind:xpath>
    </ind:xmlfilecontent_object>
    <linux:rpminfo_object id="oval:ssg:obj:1906" version="1">
      <linux:name>openldap-servers</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1907" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fchownat syscall.  
         Assume user id's start above 500 and watch for fchownats by them
         Watch for fchownats by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fchownat -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1908" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fchownat syscall.  
         Assume user id's start above 500 and watch for fchownats by them
         Watch for fchownats by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fchownat -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchownat[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1909" version="1">
      <linux:name>subscription-manager</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object comment="Test for udp6 based rpc services" id="oval:ssg:obj:1910" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>netconfig</ind:filename>
      <ind:pattern operation="pattern match">^udp6\s+tpi_clts\s+v\s+inet6\s+udp\s+-\s+-$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object comment="Test for tcp6 based rpc services" id="oval:ssg:obj:1911" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>netconfig</ind:filename>
      <ind:pattern operation="pattern match">^tcp6\s+tpi_cots_ord\s+v\s+inet6\s+tcp\s+-\s+-$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:1912" version="1">
      <linux:name>iptables</linux:name>
    </linux:rpminfo_object>
    <unix:sysctl_object id="oval:ssg:obj:1913" version="1">
      <unix:name>net.ipv4.ip_forward</unix:name>
    </unix:sysctl_object>
    <unix:sysctl_object id="oval:ssg:obj:1915" version="1">
      <unix:name>net.ipv4.conf.default.accept_redirects</unix:name>
    </unix:sysctl_object>
    <unix:runlevel_object id="oval:ssg:obj:1917" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1919" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1920" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1921" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1922" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1923" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1924" version="1">
      <unix:service_name>netfs</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <linux:partition_object id="oval:ssg:obj:1925" version="1">
      <linux:mount_point>/var/log/audit</linux:mount_point>
    </linux:partition_object>
    <unix:runlevel_object id="oval:ssg:obj:1926" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1928" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1929" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1930" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1931" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1932" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1933" version="1">
      <unix:service_name>psacct</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1934" version="1" comment="kernel module tipc disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+tipc\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1935" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>bashrc</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*umask[\s]+([^#\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1937" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+(.*)$</ind:pattern>
      <!-- the "not equal" operation essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1939" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+.*$</ind:pattern>
      <!-- the "not equal" operation below essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1940" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>login.defs</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*UMASK[\s]+([^#\s]*)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1942" version="1" comment="kernel module usb-storage disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+usb-storage\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1943" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1945" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1946" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1947" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1948" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1949" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1950" version="1">
      <unix:service_name>named</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1951" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1953" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>password-auth</ind:filename>
      <ind:pattern operation="pattern match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1955" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the lchown syscall.  
         Assume user id's start above 500 and watch for lchowns by them
         Watch for lchowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S lchown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1956" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the lchown syscall.  
         Assume user id's start above 500 and watch for lchowns by them
         Watch for lchowns by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S lchown -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lchown[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/var/log/audit files" id="oval:ssg:obj:1957" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="-1" recurse_file_system="local"/>
      <unix:path operation="equals">/var/log/audit</unix:path>
      <unix:filename operation="pattern match">^.*$</unix:filename>
      <filter action="include">oval:ssg:ste:1958</filter>
    </unix:file_object>
    <unix:runlevel_object id="oval:ssg:obj:1959" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1961" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1962" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1963" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1964" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1965" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1966" version="1">
      <unix:service_name>kdump</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object comment="The password hashing algorithm should be set correctly in /etc/libuser.conf" id="oval:ssg:obj:1967" version="1">
      <ind:filepath>/etc/libuser.conf</ind:filepath>
      <ind:pattern operation="pattern match">^\s*crypt_style\s=\ssha512\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1968" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1970" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1971" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1972" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1973" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1974" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1975" version="1">
      <unix:service_name>nfslock</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:xmlfilecontent_object id="oval:ssg:obj:1976" version="1">
      <ind:filepath>/etc/gconf/gconf.xml.defaults/%gconf-tree.xml</ind:filepath>
      <ind:xpath>/gconf/dir[@name='schemas']/dir[@name='apps']/dir[@name='gnome-screensaver']/entry[@name='mode']/local_schema[1]/default[1]/stringvalue[1]/text()</ind:xpath>
    </ind:xmlfilecontent_object>
    <linux:rpminfo_object id="oval:ssg:obj:1978" version="1">
      <linux:name>rsyslog</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object comment="TODO::INSERT" id="oval:ssg:obj:1979" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>ntp.conf</ind:filename>
      <ind:pattern operation="pattern match">^server\s+.+$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1980" version="1" comment="kernel module sctp disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+sctp\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1981" version="1">
      <ind:path>/etc/sysconfig</ind:path>
      <ind:filename>init</ind:filename>
      <ind:pattern operation="pattern match">^SINGLE=/sbin/sulogin[\s#]*</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1982" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-w[\s]+\/etc\/localtime[\s]+-p[\s]+\b([rx]*w[rx]*a[rx]*|[rx]*a[rx]*w[rx]*)\b.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1983" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/var/run/utmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1984" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/var/log/btmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1985" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/var/log/wtmp\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1986" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>fstab</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1988" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>mtab</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[\S]+[\s]+[\S]+[\s]+cifs[\s]+([\S]+)</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpmverifyfile_object id="oval:ssg:obj:1989" version="1" comment="rpm verify of all files">
      <linux:behaviors nomd5="true"/>
      <linux:name operation="pattern match">.*</linux:name>
      <linux:filepath operation="pattern match">.*</linux:filepath>
      <filter action="include">oval:ssg:ste:2111</filter>
    </linux:rpmverifyfile_object>
    <linux:rpmverifyfile_object id="oval:ssg:obj:1990" version="1" comment="rpm verify of all files">
      <linux:behaviors nomd5="true"/>
      <linux:name operation="pattern match">.*</linux:name>
      <linux:filepath operation="pattern match">.*</linux:filepath>
      <filter action="include">oval:ssg:ste:2112</filter>
    </linux:rpmverifyfile_object>
    <linux:rpmverifyfile_object id="oval:ssg:obj:1991" version="1" comment="rpm verify of all files">
      <linux:behaviors nomd5="true"/>
      <linux:name operation="pattern match">.*</linux:name>
      <linux:filepath operation="pattern match">.*</linux:filepath>
      <filter action="include">oval:ssg:ste:2113</filter>
    </linux:rpmverifyfile_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:1992" version="1" comment="kernel module cramfs disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+cramfs\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:1993" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1995" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1996" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1997" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1998" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:1999" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2000" version="1">
      <unix:service_name>dhcpd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:sysctl_object id="oval:ssg:obj:2001" version="1">
      <unix:name>net.ipv4.tcp_syncookies</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2003" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/var/log/faillog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2004" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/var/log/lastlog\s+\-p\s+wa\s+\-k\s+[-\w]+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:sysctl_object id="oval:ssg:obj:2005" version="1">
      <unix:name>net.ipv4.conf.default.accept_source_route</unix:name>
    </unix:sysctl_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2007" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^max_log_file_action\s*=\s*(\S+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2009" version="1">
      <ind:filepath>/etc/issue</ind:filepath>
      <ind:pattern var_ref="oval:ssg:var:2114" operation="pattern match">^.*(.+).*$</ind:pattern>
      <ind:instance datatype="int" operation="greater than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2010" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename>system-auth</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*password[\s]+(?:(?:required)|(?:requisite))[\s]+[\w_\.\-=\s]+[\s]lcredit=(-?\d+)(?:[\s]|$)</ind:pattern>
      <ind:instance datatype="int" operation="less than or equal">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:2012" version="1">
      <linux:name>kexec-tools</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2013" version="1" comment="kernel module hfsplus disabled">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*install\s+hfsplus\s+/bin/false$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:2014" version="1">
      <linux:name>samba-common</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:2015" version="1">
      <linux:name>aide</linux:name>
    </linux:rpminfo_object>
    <unix:runlevel_object id="oval:ssg:obj:2016" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2018" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2019" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2020" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2021" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2022" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2023" version="1">
      <unix:service_name>sshd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:file_object comment="home directories" id="oval:ssg:obj:2024" version="1">
      <unix:behaviors recurse="directories" recurse_direction="down" max_depth="1" recurse_file_system="all"/>
      <unix:path operation="equals">/home</unix:path>
      <unix:filename xsi:nil="true"/>
      <filter action="include">oval:ssg:ste:2025</filter>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2026" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*Banner[\s]+/etc/issue$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:2027" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2029" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2030" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2031" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2032" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2033" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2034" version="1">
      <unix:service_name>rhnsd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2035" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fsetxattr syscall.  
         Assume user id's start above 500 and watch for any fsetxattr by them
         Watch for fsetxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2036" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fsetxattr syscall.  
         Assume user id's start above 500 and watch for any fsetxattr by them
         Watch for fsetxattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fsetxattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fsetxattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2037" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b32.*-S[\s]+clock_settime[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2038" version="1">
      <ind:path>/etc/audit</ind:path>
      <ind:filename>audit.rules</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+-F[\s]+arch=b64.*-S[\s]+clock_settime[\s]+.*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2039" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>passwd</ind:filename>
      <ind:pattern operation="pattern match">^(?!root:)[^:]*:[^:]:0</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:selinuxsecuritycontext_object comment="unlabeled_t in /dev" id="oval:ssg:obj:2040" version="1">
      <linux:behaviors recurse_direction="down"/>
      <linux:path>/dev</linux:path>
      <linux:filename operation="pattern match">^.*$</linux:filename>
      <filter action="include">oval:ssg:ste:2041</filter>
    </linux:selinuxsecuritycontext_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2042" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[Pp][Ee][Rr][Mm][Ii][Tt][Ee][Mm][Pp][Tt][Yy][Pp][Aa][Ss][Ss][Ww][Oo][Rr][Dd][Ss][\s]+[Nn][Oo]\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2043" version="1">
      <ind:filepath>/etc/login.defs</ind:filepath>
      <ind:pattern operation="pattern match">^[\s]*PASS_WARN_AGE[\s]*(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2045" version="1">
      <ind:filepath>/etc/login.defs</ind:filepath>
      <ind:pattern operation="pattern match">^[\s]*PASS_MAX_DAYS[\s]+(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/etc/shadow" id="oval:ssg:obj:2047" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>shadow</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2049" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the lremovexattr syscall.  
         Assume user id's start above 500 and watch for any lremovexattr by them
         Watch for lremovexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2050" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the lremovexattr syscall.  
         Assume user id's start above 500 and watch for any lremovexattr by them
         Watch for lremovexattrs by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S lremovexattr -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+lremovexattr[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2051" version="1">
      <ind:path>/etc/ssh</ind:path>
      <ind:filename>sshd_config</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*[Ii][Gg][Nn][Oo][Rr][Ee][Rr][Hh][Oo][Ss][Tt][Ss][\s]*no\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:2052" version="1">
      <linux:name>ypserv</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2053" version="1">
      <ind:path>/etc/pam.d</ind:path>
      <ind:filename operation="pattern match">.*</ind:filename>
      <ind:pattern operation="pattern match">^[^#].*pam_ldap.so[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2054" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/group\s+\-p\s+wa\s+\-k\s+\w+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2055" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/passwd\s+\-p\s+wa\s+\-k\s+\w+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2056" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/gshadow\s+\-p\s+wa\s+\-k\s+\w+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2057" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/shadow\s+\-p\s+wa\s+\-k\s+\w+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2058" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <ind:pattern operation="pattern match">^\-w\s+/etc/security/opasswd\s+\-p\s+wa\s+\-k\s+\w+\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:2059" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2061" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2062" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2063" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2064" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2065" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2066" version="1">
      <unix:service_name>rpcsvcgssd</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2067" version="1">
      <ind:path>/etc/cups</ind:path>
      <ind:filename>cupsd.conf</ind:filename>
      <ind:pattern operation="pattern match">Browsing Off</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2068" version="1">
      <ind:path>/etc/cups</ind:path>
      <ind:filename>cupsd.conf</ind:filename>
      <ind:pattern operation="pattern match">BrowseAllow none</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="all local files" id="oval:ssg:obj:2069" version="1">
      <unix:behaviors recurse="symlinks and directories" recurse_file_system="local"/>
      <unix:path>/</unix:path>
      <unix:filename operation="pattern match">.*</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2071" version="1">
      <ind:filepath>/etc/audit/auditd.conf</ind:filepath>
      <ind:pattern operation="pattern match">^num_logs\s*=\s*(\d+)\s*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2073" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>pam_ldap.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*tls_cacertdir[\s]+.*[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2074" version="1">
      <ind:path>/etc</ind:path>
      <ind:filename>pam_ldap.conf</ind:filename>
      <ind:pattern operation="pattern match">^[\s]*tls_cacertfile[\s]+.*[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <linux:rpminfo_object id="oval:ssg:obj:2075" version="1">
      <linux:name>qpid-cpp-server</linux:name>
    </linux:rpminfo_object>
    <linux:rpminfo_object id="oval:ssg:obj:2076" version="1">
      <linux:name>cpuspeed</linux:name>
    </linux:rpminfo_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2077" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch.  Remember that we can still have x32 libs on x64
         Watch for the fchmod syscall.  
         Assume user id's start above 500 and watch for fchmods by them
         Watch for fchmods by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b32 -S fchmod -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b32[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2078" version="1">
      <ind:filepath>/etc/audit/audit.rules</ind:filepath>
      <!-- What's going on here?
         Ensure we have both exit and always in the action list
         Syscall numbers between x64/x32 dont always line up so split them by 
           arch. Remember that we can still have x32 libs on x64 
         Watch for the fchmod syscall.  
         Assume user id's start above 500 and watch for fchmods by them
         Watch for fchmods by users without a set loginuid (4294967295/-1)
         Ensure that a key is defined for it but we aren't especially concerned 
           with what it is
         Some regex foo to account for various ways this could be defined.

         A typical pattern would be: 
         -a always,exit -F arch=b64 -S fchmod -F auid>=500 -F auid!=4294967295 -k perms
    -->
      <ind:pattern operation="pattern match">^[\s]*-a[\s]+(always,exit|exit,always)[\s]+(?:.*-F[\s]+arch=b64[\s]+)(?:.*-S[\s]+fchmod[\s]+)(?:.*-F\s+auid&gt;=500[\s]+)(?:.*-F\s+auid!=4294967295[\s]+).*-k[\s]+[\S]+[\s]*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:file_object comment="/boot/grub/grub.conf" id="oval:ssg:obj:2079" version="1">
      <unix:path>/boot/grub</unix:path>
      <unix:filename>grub.conf</unix:filename>
    </unix:file_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2081" version="1" comment="ipv6 disabled any modprobe conf file">
      <ind:path>/etc/modprobe.d</ind:path>
      <ind:filename operation="pattern match">^.*\.conf$</ind:filename>
      <ind:pattern operation="pattern match">^\s*options\s+ipv6\s+.*disable=1.*$</ind:pattern>
      <ind:instance datatype="int">1</ind:instance>
    </ind:textfilecontent54_object>
    <unix:runlevel_object id="oval:ssg:obj:2082" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">0</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2084" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">1</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2085" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">2</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2086" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">3</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2087" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">4</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2088" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">5</unix:runlevel>
    </unix:runlevel_object>
    <unix:runlevel_object id="oval:ssg:obj:2089" version="1">
      <unix:service_name>sysstat</unix:service_name>
      <unix:runlevel operation="equals">6</unix:runlevel>
    </unix:runlevel_object>
    <unix:uname_object comment="64 bit architecture" id="oval:ssg:obj:2090" version="1">
  </unix:uname_object>
    <unix:file_object comment="/etc/group" id="oval:ssg:obj:2092" version="1">
      <unix:path>/etc</unix:path>
      <unix:filename>group</unix:filename>
    </unix:file_object>
    <linux:rpminfo_object id="oval:ssg:obj:2094" version="1">
      <linux:name>mdadm</linux:name>
    </linux:rpminfo_object>
    <linux:partition_object id="oval:ssg:obj:2095" version="1">
      <linux:mount_point>/tmp</linux:mount_point>
    </linux:partition_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2097" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+(.*)$</ind:pattern>
      <!-- the "not equal" operation essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
    <ind:textfilecontent54_object id="oval:ssg:obj:2099" version="1">
      <ind:filepath>/etc/fstab</ind:filepath>
      <ind:pattern operation="pattern match">^\s*[\.\w]+:[/\w]+\s+[/\w]+\s+nfs[4]?\s+.*$</ind:pattern>
      <!-- the "not equal" operation below essentially means all instances of the regexp -->
      <ind:instance datatype="int" operation="not equal">0</ind:instance>
    </ind:textfilecontent54_object>
  </objects>
  <states>
    <unix:sysctl_state id="oval:ssg:ste:1188" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1192" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1200" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1208" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1210" version="1">
      <ind:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg:var:2115"/>
    </ind:textfilecontent54_state>
    <ind:xmlfilecontent_state id="oval:ssg:ste:1212" version="1">
      <ind:value_of datatype="string">true</ind:value_of>
    </ind:xmlfilecontent_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1216" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1227" version="1">
      <ind:subexpression datatype="string" var_ref="oval:ssg:var:2100"/>
    </ind:textfilecontent54_state>
    <linux:partition_state id="oval:ssg:ste:1225" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</linux:mount_options>
    </linux:partition_state>
    <unix:file_state id="oval:ssg:ste:2101" version="1" operator="OR">
      <!--    <unix:group_id datatype="int" operation="not equal">0</unix:group_id> -->
      <unix:user_id datatype="int" operation="not equal">0</unix:user_id>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1245" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2116"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1248" version="1">
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:owrite datatype="boolean">true</unix:owrite>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1250" version="1">
      <ind:subexpression operation="equals" var_ref="oval:ssg:var:2117"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2118" version="1">
      <ind:subexpression operation="equals">$myhostname ESMTP</ind:subexpression>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1256" version="1" operator="OR">
      <unix:group_id datatype="int" operation="not equal">0</unix:group_id>
      <unix:user_id datatype="int" operation="not equal">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1263" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1267" version="1">
      <ind:subexpression datatype="string" var_ref="oval:ssg:var:2102"/>
    </ind:textfilecontent54_state>
    <linux:partition_state id="oval:ssg:ste:1265" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</linux:mount_options>
    </linux:partition_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1269" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1277" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1280" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2119"/>
    </ind:textfilecontent54_state>
    <unix:sysctl_state id="oval:ssg:ste:1288" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:file_state id="oval:ssg:ste:1291" version="1">
      <unix:user_id datatype="int" operation="equals">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1292" version="1">
      <unix:group_id datatype="int" operation="equals">0</unix:group_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1293" version="1">
      <unix:suid datatype="boolean">false</unix:suid>
      <unix:sgid datatype="boolean">false</unix:sgid>
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:uread datatype="boolean">false</unix:uread>
      <unix:uwrite datatype="boolean">false</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">false</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1296" version="1">
      <ind:instance datatype="int">1</ind:instance>
      <ind:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg:var:2120"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1298" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state comment="Executables with suid set" id="oval:ssg:ste:1307" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <unix:sysctl_state id="oval:ssg:ste:1311" version="1">
      <unix:value datatype="int" operation="equals">2</unix:value>
    </unix:sysctl_state>
    <unix:file_state id="oval:ssg:ste:1315" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1318" version="1">
      <unix:user_id datatype="int" operation="equals">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1319" version="1">
      <unix:group_id datatype="int" operation="equals">0</unix:group_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1320" version="1">
      <unix:suid datatype="boolean">false</unix:suid>
      <unix:sgid datatype="boolean">false</unix:sgid>
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:uread datatype="boolean">false</unix:uread>
      <unix:uwrite datatype="boolean">false</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">false</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1327" version="1">
      <ind:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg:var:2121"/>
    </ind:textfilecontent54_state>
    <unix:sysctl_state id="oval:ssg:ste:1329" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1332" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:2104" version="1">
      <unix:type operation="equals">symbolic link</unix:type>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:2103" version="1" operator="OR">
      <unix:gwrite datatype="boolean">true</unix:gwrite>
      <unix:owrite datatype="boolean">true</unix:owrite>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1352" version="1">
      <ind:instance datatype="int">1</ind:instance>
      <ind:subexpression datatype="int" operation="greater than or equal" var_ref="oval:ssg:var:2122"/>
    </ind:textfilecontent54_state>
    <unix:sysctl_state id="oval:ssg:ste:1356" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>

    <linux:rpminfo_state id="oval:ssg:ste:10101" version="1" comment="This state matches any rpminfo_items that are signed by Red Hat.">
       <linux:signature_keyid operation="equals" var_ref="oval:ssg:var:10101" var_check="at least one"/>
    </linux:rpminfo_state>
    <linux:rpminfo_state id="oval:ssg:ste:10102" version="1" comment="This state matches any rpminfo_items that are named openscap-.*">
       <linux:name operation="pattern match">openscap-.*</linux:name>
    </linux:rpminfo_state>
    <linux:rpminfo_state id="oval:ssg:ste:10103" version="1" comment="This state matches any rpminfo_items that are named scap-.*">
       <linux:name operation="pattern match">scap-.*</linux:name>
    </linux:rpminfo_state>

    <linux:rpminfo_state id="oval:ssg:ste:1362" version="1">
      <linux:release>4ae0493b</linux:release>
      <linux:version>fd431d51</linux:version>
    </linux:rpminfo_state>
    <linux:rpminfo_state id="oval:ssg:ste:1363" version="1">
      <linux:release>45700c69</linux:release>
      <linux:version>2fa658e0</linux:version>
    </linux:rpminfo_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1365" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1375" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1390" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:file_state id="oval:ssg:ste:1392" version="1">
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">true</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">true</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:sysctl_state id="oval:ssg:ste:1394" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1397" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2116"/>
    </ind:textfilecontent54_state>
    <linux:partition_state id="oval:ssg:ste:1400" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</linux:mount_options>
    </linux:partition_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1402" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1412" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1414" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1423" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1434" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1445" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2123"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1447" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1451" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1461" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state comment="uid greater than or equal to 500 and world writable" id="oval:ssg:ste:1469" version="1">
      <unix:user_id datatype="int" operation="greater than or equal">500</unix:user_id>
      <unix:owrite datatype="boolean">true</unix:owrite>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1471" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <linux:partition_state id="oval:ssg:ste:1473" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</linux:mount_options>
    </linux:partition_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1475" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state comment="Group has write privilege" id="oval:ssg:ste:1484" version="1">
      <unix:gwrite datatype="boolean">1</unix:gwrite>
    </unix:file_state>
    <unix:file_state comment="Other has write privilege" id="oval:ssg:ste:1485" version="1">
      <unix:owrite datatype="boolean">1</unix:owrite>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1487" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:environmentvariable58_state comment="starts with colon or period" id="oval:ssg:ste:1496" version="1">
      <ind:value operation="pattern match">^[:\.]</ind:value>
    </ind:environmentvariable58_state>
    <ind:environmentvariable58_state comment="colon twice in a row" id="oval:ssg:ste:1497" version="1">
      <ind:value operation="pattern match">::</ind:value>
    </ind:environmentvariable58_state>
    <ind:environmentvariable58_state comment="period twice in a row" id="oval:ssg:ste:1498" version="1">
      <ind:value operation="pattern match">\.\.</ind:value>
    </ind:environmentvariable58_state>
    <ind:environmentvariable58_state comment="ends with colon or period" id="oval:ssg:ste:1499" version="1">
      <ind:value operation="pattern match">[:\.]$</ind:value>
    </ind:environmentvariable58_state>
    <ind:environmentvariable58_state comment="begins with a slash" id="oval:ssg:ste:1500" version="1">
      <ind:value operation="pattern match">^[^/]</ind:value>
    </ind:environmentvariable58_state>
    <ind:environmentvariable58_state comment="elements begin with a slash" id="oval:ssg:ste:1501" version="1">
      <ind:value operation="pattern match">[^\\]:[^/]</ind:value>
    </ind:environmentvariable58_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1505" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1513" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1522" version="1">
      <ind:instance datatype="int">1</ind:instance>
      <ind:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg:var:2124"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1525" version="1">
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">true</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1528" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1536" version="1">
      <unix:sgid datatype="boolean">true</unix:sgid>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1539" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1547" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1556" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2125" version="1">
      <ind:subexpression operation="equals">yes</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1567" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2126" datatype="int"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1569" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1577" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1585" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2127" datatype="int"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1588" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1597" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:password_state id="oval:ssg:ste:1606" version="1">
      <unix:password>x</unix:password>
    </unix:password_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1610" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1618" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <linux:rpmverifyfile_state id="oval:ssg:ste:2107" version="1" operator="AND">
      <linux:md5_differs>fail</linux:md5_differs>
      <!-- <linux:configuration_file datatype="boolean">false</linux:configuration_file> -->
      <!-- <linux:documentation_file datatype="boolean">false</linux:documentation_file> -->
      <!-- <linux:ghost_file datatype="boolean">false</linux:ghost_file> -->
      <!-- <linux:license_file datatype="boolean">false</linux:license_file> -->
      <!-- <linux:readme_file datatype="boolean">false</linux:readme_file> -->
    </linux:rpmverifyfile_state>
    <linux:partition_state id="oval:ssg:ste:1625" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</linux:mount_options>
    </linux:partition_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1628" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1636" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1644" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1656" version="1">
      <ind:subexpression datatype="string" var_ref="oval:ssg:var:2108"/>
    </ind:textfilecontent54_state>
    <linux:partition_state id="oval:ssg:ste:1654" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nosuid</linux:mount_options>
    </linux:partition_state>
    <ind:textfilecontent54_state comment="ClientAliveInterval in seconds" id="oval:ssg:ste:1660" version="1">
      <ind:subexpression datatype="int" operation="equals" var_check="all" var_ref="oval:ssg:var:2128"/>
    </ind:textfilecontent54_state>
    <ind:xmlfilecontent_state comment="idle timeout" id="oval:ssg:ste:1662" version="1">
      <ind:value_of datatype="string" operation="equals" var_check="all" var_ref="oval:ssg:var:2129"/>
    </ind:xmlfilecontent_state>
    <unix:sysctl_state id="oval:ssg:ste:1664" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1666" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1676" version="1">
      <unix:type operation="equals">regular</unix:type>
      <unix:owrite datatype="boolean">true</unix:owrite>
    </unix:file_state>
    <ind:xmlfilecontent_state id="oval:ssg:ste:1678" version="1">
      <ind:value_of datatype="string">true</ind:value_of>
    </ind:xmlfilecontent_state>
    <unix:file_state id="oval:ssg:ste:1682" version="1">
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">false</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1684" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1695" version="1">
      <unix:user_id datatype="int" operation="equals">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1696" version="1">
      <unix:group_id datatype="int" operation="equals">0</unix:group_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1697" version="1">
      <unix:suid datatype="boolean">false</unix:suid>
      <unix:sgid datatype="boolean">false</unix:sgid>
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">true</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1699" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1708" version="1">
      <ind:subexpression datatype="string" operation="equals" var_check="all" var_ref="oval:ssg:var:2130"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1711" version="1">
      <ind:subexpression operation="case insensitive equals" var_ref="oval:ssg:var:2131"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1713" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1723" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1725" version="1">
      <unix:user_id datatype="int" operation="equals">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1726" version="1">
      <unix:group_id datatype="int" operation="equals">0</unix:group_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1727" version="1">
      <unix:suid datatype="boolean">false</unix:suid>
      <unix:sgid datatype="boolean">false</unix:sgid>
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">false</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1732" version="1">
      <unix:suid datatype="boolean">true</unix:suid>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1734" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:uname_state comment="32 bit architecture" id="oval:ssg:ste:1746" version="1">
      <unix:processor_type operation="equals">i686</unix:processor_type>
    </unix:uname_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1750" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1758" version="1">
      <ind:subexpression operation="equals">static</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1761" version="1">
      <ind:subexpression operation="less than or equal" var_ref="oval:ssg:var:2132" datatype="int"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1762" version="1">
      <ind:subexpression operation="greater than" datatype="int">-1</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1764" version="1">
      <ind:subexpression operation="equals">0</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1766" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2133" datatype="int"/>
    </ind:textfilecontent54_state>
    <linux:partition_state id="oval:ssg:ste:1777" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</linux:mount_options>
    </linux:partition_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1779" version="1">
      <ind:subexpression operation="case insensitive equals" var_ref="oval:ssg:var:2134"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1782" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2135" datatype="int"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1786" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1788" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1796" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1798" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:1806" version="1">
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">true</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">true</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1808" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1810" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <linux:partition_state id="oval:ssg:ste:1818" version="1">
      <!-- this check defines a local partition as one which has a device node in /dev -->
      <linux:device operation="pattern match">^/dev/.*$</linux:device>
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">nodev</linux:mount_options>
    </linux:partition_state>
    <ind:family_state id="oval:ssg:ste:105" version="1">
      <ind:family>unix</ind:family>
    </ind:family_state>
    <linux:rpminfo_state id="oval:ssg:ste:107" version="1">
      <linux:version operation="pattern match">^6Workstation$</linux:version>
    </linux:rpminfo_state>
    <linux:rpminfo_state id="oval:ssg:ste:109" version="1">
      <linux:version operation="pattern match">^6Server$</linux:version>
    </linux:rpminfo_state>
    <unix:sysctl_state id="oval:ssg:ste:1821" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1823" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1831" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1839" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:file_state id="oval:ssg:ste:1842" version="1">
      <unix:user_id datatype="int" operation="equals">0</unix:user_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1843" version="1">
      <unix:group_id datatype="int" operation="equals">0</unix:group_id>
    </unix:file_state>
    <unix:file_state id="oval:ssg:ste:1844" version="1">
      <unix:suid datatype="boolean">false</unix:suid>
      <unix:sgid datatype="boolean">false</unix:sgid>
      <unix:sticky datatype="boolean">false</unix:sticky>
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">true</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1848" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1857" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <linux:partition_state id="oval:ssg:ste:1865" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</linux:mount_options>
    </linux:partition_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2136" version="1">
      <ind:subexpression operation="equals">no</ind:subexpression>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1869" version="1">
      <unix:uread datatype="boolean">true</unix:uread>
      <unix:uwrite datatype="boolean">true</unix:uwrite>
      <unix:uexec datatype="boolean">false</unix:uexec>
      <unix:gread datatype="boolean">true</unix:gread>
      <unix:gwrite datatype="boolean">false</unix:gwrite>
      <unix:gexec datatype="boolean">false</unix:gexec>
      <unix:oread datatype="boolean">false</unix:oread>
      <unix:owrite datatype="boolean">false</unix:owrite>
      <unix:oexec datatype="boolean">false</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1871" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:interface_state id="oval:ssg:ste:1880" version="1">
      <unix:flag datatype="string" entity_check="at least one" operation="equals">PROMISC</unix:flag>
    </unix:interface_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1882" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:1891" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1893" version="1">
      <ind:subexpression datatype="int" operation="equals">
    0</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1900" version="1">
      <ind:instance datatype="int">1</ind:instance>
      <ind:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg:var:2137"/>
    </ind:textfilecontent54_state>
    <unix:sysctl_state id="oval:ssg:ste:1914" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <unix:sysctl_state id="oval:ssg:ste:1916" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1918" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="configured to start" id="oval:ssg:ste:1927" version="1">
      <unix:start datatype="boolean">true</unix:start>
      <unix:kill datatype="boolean">false</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1936" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2116"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1938" version="1">
      <ind:subexpression operation="pattern match">^.*nodev.*$</ind:subexpression>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1941" version="1">
      <ind:subexpression operation="equals" var_check="all" var_ref="oval:ssg:var:2116"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1944" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1952" version="1">
      <ind:subexpression datatype="int" operation="equals" var_ref="oval:ssg:var:2138"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1954" version="1">
      <ind:subexpression datatype="int" operation="equals" var_ref="oval:ssg:var:2138"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:1958" version="1" operator="OR">
      <!-- if any one of these is true then mode is NOT 0640 (hence the OR operator) -->
      <unix:suid datatype="boolean">true</unix:suid>
      <unix:sgid datatype="boolean">true</unix:sgid>
      <unix:sticky datatype="boolean">true</unix:sticky>
      <unix:uexec datatype="boolean">true</unix:uexec>
      <unix:gwrite datatype="boolean">true</unix:gwrite>
      <unix:gexec datatype="boolean">true</unix:gexec>
      <unix:oread datatype="boolean">true</unix:oread>
      <unix:owrite datatype="boolean">true</unix:owrite>
      <unix:oexec datatype="boolean">true</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1960" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1969" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <ind:xmlfilecontent_state id="oval:ssg:ste:1977" version="1">
      <ind:value_of datatype="string">blank-only</ind:value_of>
    </ind:xmlfilecontent_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:1987" version="1">
      <ind:instance datatype="int">2</ind:instance>
      <ind:subexpression operation="pattern match">sec=(krb5i|ntlmv2i)</ind:subexpression>
    </ind:textfilecontent54_state>
    <linux:rpmverifyfile_state id="oval:ssg:ste:2111" version="1">
      <linux:ownership_differs>fail</linux:ownership_differs>
    </linux:rpmverifyfile_state>
    <linux:rpmverifyfile_state id="oval:ssg:ste:2112" version="1">
      <linux:group_differs>fail</linux:group_differs>
    </linux:rpmverifyfile_state>
    <linux:rpmverifyfile_state id="oval:ssg:ste:2113" version="1">
      <linux:mode_differs>fail</linux:mode_differs>
    </linux:rpmverifyfile_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:1994" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:sysctl_state id="oval:ssg:ste:2002" version="1">
      <unix:value datatype="int" operation="equals">1</unix:value>
    </unix:sysctl_state>
    <unix:sysctl_state id="oval:ssg:ste:2006" version="1">
      <unix:value datatype="int" operation="equals">0</unix:value>
    </unix:sysctl_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2008" version="1">
      <ind:subexpression operation="case insensitive equals" var_ref="oval:ssg:var:2139"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2011" version="1">
      <ind:instance datatype="int">1</ind:instance>
      <ind:subexpression datatype="int" operation="less than or equal" var_ref="oval:ssg:var:2140"/>
    </ind:textfilecontent54_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:2017" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state id="oval:ssg:ste:2025" version="1" operator="OR">
      <unix:suid datatype="boolean">true</unix:suid>
      <unix:sgid datatype="boolean">true</unix:sgid>
      <unix:sticky datatype="boolean">true</unix:sticky>
      <unix:gwrite datatype="boolean">true</unix:gwrite>
      <unix:oread datatype="boolean">true</unix:oread>
      <unix:owrite datatype="boolean">true</unix:owrite>
      <unix:oexec datatype="boolean">true</unix:oexec>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:2028" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <linux:selinuxsecuritycontext_state comment="do it" id="oval:ssg:ste:2041" version="1">
      <linux:type datatype="string" operation="equals">unlabeled_t</linux:type>
    </linux:selinuxsecuritycontext_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2044" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2141" datatype="int"/>
    </ind:textfilecontent54_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2046" version="1">
      <ind:subexpression operation="less than or equal" var_ref="oval:ssg:var:2142" datatype="int"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:2048" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:2060" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:file_state comment="Executables with suid set" id="oval:ssg:ste:2070" version="1">
      <unix:user_id datatype="int">0</unix:user_id>
    </unix:file_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2072" version="1">
      <ind:subexpression operation="greater than or equal" var_ref="oval:ssg:var:2143" datatype="int"/>
    </ind:textfilecontent54_state>
    <unix:file_state id="oval:ssg:ste:2080" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <unix:runlevel_state comment="not configured to start" id="oval:ssg:ste:2083" version="1">
      <unix:start datatype="boolean">false</unix:start>
      <unix:kill datatype="boolean">true</unix:kill>
    </unix:runlevel_state>
    <unix:uname_state comment="64 bit architecture" id="oval:ssg:ste:2091" version="1">
      <unix:processor_type operation="equals">x86_64</unix:processor_type>
    </unix:uname_state>
    <unix:file_state id="oval:ssg:ste:2093" version="1">
      <unix:group_id datatype="int">0</unix:group_id>
    </unix:file_state>
    <linux:partition_state id="oval:ssg:ste:2096" version="1">
      <linux:mount_options datatype="string" entity_check="at least one" operation="equals">noexec</linux:mount_options>
    </linux:partition_state>
    <ind:textfilecontent54_state id="oval:ssg:ste:2098" version="1">
      <ind:subexpression operation="pattern match">^.*nosuid.*$</ind:subexpression>
    </ind:textfilecontent54_state>
  </states>
  <variables>

    <constant_variable comment="This variable holds all of the Red Hat signature key IDs." datatype="string" id="oval:ssg:var:10101" version="1" >
       <!-->RHEL 5 Signature ID<-->
       <value>5326810137017186</value>
       <!--RHEL 6: 199e2f91fd431d51<-->
    </constant_variable>

    <external_variable comment="number of passwords that should be remembered" datatype="int" id="oval:ssg:var:2115" version="1"/>
    <external_variable comment="removable partition" datatype="string" id="oval:ssg:var:2100" version="1"/>
    <external_variable comment="user umask" datatype="string" id="oval:ssg:var:2116" version="1"/>
    <external_variable comment="audit action_mail_acct setting" datatype="string" id="oval:ssg:var:2117" version="1"/>
    <external_variable comment="removable partition" datatype="string" id="oval:ssg:var:2102" version="1"/>
    <external_variable comment="external variable for daemon umask" datatype="string" id="oval:ssg:var:2119" version="1"/>
    <external_variable comment="External variable for pam_cracklib ucredit" datatype="int" id="oval:ssg:var:2120" version="1"/>
    <external_variable comment="External variable for pam_cracklib retry" datatype="int" id="oval:ssg:var:2121" version="1"/>
    <external_variable comment="External variable for pam_cracklib difok" datatype="int" id="oval:ssg:var:2122" version="1"/>
    <external_variable comment="External variable: name of selinux policy in /etc/selinux/config" datatype="string" id="oval:ssg:var:2123" version="1"/>
    <local_variable comment="Split the PATH on the : delimiter" datatype="string" id="oval:ssg:var:2105" version="1">
      <split delimiter=":">
        <object_component item_field="value" object_ref="oval:ssg:obj:2106"/>
      </split>
    </local_variable>
    <external_variable comment="External variable for pam_cracklib ocredit" datatype="int" id="oval:ssg:var:2124" version="1"/>
    <external_variable comment="maximum password age" datatype="int" id="oval:ssg:var:2126" version="1"/>
    <external_variable comment="password minimum length" datatype="int" id="oval:ssg:var:2127" version="1"/>
    <external_variable comment="removable partition" datatype="string" id="oval:ssg:var:2108" version="1"/>
    <external_variable comment="timeout value" datatype="int" id="oval:ssg:var:2128" version="1"/>
    <external_variable comment="inactivity timeout variable" datatype="string" id="oval:ssg:var:2129" version="1"/>
    <external_variable comment="external variable for selinux state" datatype="string" id="oval:ssg:var:2130" version="1"/>
    <external_variable comment="audit space_left_action setting" datatype="string" id="oval:ssg:var:2131" version="1"/>
    <external_variable comment="ssh configuration directory" datatype="string" id="oval:ssg:var:2109" version="1"/>
    <external_variable comment="inactive days expiration" datatype="int" id="oval:ssg:var:2132" version="1"/>
    <external_variable comment="minimum password age in days" datatype="int" id="oval:ssg:var:2133" version="1"/>
    <external_variable comment="audit admin_space_left_action setting" datatype="string" id="oval:ssg:var:2134" version="1"/>
    <external_variable comment="audit max_log_file settting" datatype="int" id="oval:ssg:var:2135" version="1"/>
    <external_variable comment="ssh configuration directory" datatype="string" id="oval:ssg:var:2110" version="1"/>
    <external_variable comment="External variable for pam_cracklib dcredit" datatype="int" id="oval:ssg:var:2137" version="1"/>
    <external_variable comment="number of failed login attempts allowed" datatype="int" id="oval:ssg:var:2138" version="1"/>
    <external_variable comment="audit max_log_file_action setting" datatype="string" id="oval:ssg:var:2139" version="1"/>
    <external_variable comment="warning banner text variable" datatype="string" id="oval:ssg:var:2114" version="1"/>
    <external_variable comment="External variable for pam_cracklib lcredit" datatype="int" id="oval:ssg:var:2140" version="1"/>
    <external_variable comment="password expiration warning age in days" datatype="int" id="oval:ssg:var:2141" version="1"/>
    <external_variable comment="maximum password age" datatype="int" id="oval:ssg:var:2142" version="1"/>
    <external_variable comment="audit num_logs settting" datatype="int" id="oval:ssg:var:2143" version="1"/>
  </variables>
</oval_definitions>
