|
299 | 299 | dest: /etc/grub.d/01_users |
300 | 300 | owner: root |
301 | 301 | group: root |
302 | | - mode: 0644 |
| 302 | + mode: 0755 |
303 | 303 | notify: confirm grub2 user cfg |
304 | 304 | when: |
305 | 305 | - rhel_08_010141 or |
|
558 | 558 | - name: "MEDIUM | RHEL-08-020025 | PATCH | 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file. | Set preauth" |
559 | 559 | lineinfile: |
560 | 560 | path: /etc/pam.d/system-auth |
561 | | - regexp: '^auth required pam_faillock.so preauth' |
562 | | - line: "auth required pam_faillock.so preauth dir={{ rhel8stig_pam_faillock.dir }} silent audit deny={{ rhel8stig_pam_faillock.attempts }}{{ (rhel8stig_pam_faillock.fail_for_root) | ternary(' even_deny_root ',' ') }}fail_interval={{ rhel8stig_pam_faillock.interval }} unlock_time={{ rhel8stig_pam_faillock.unlock_time }}" |
563 | | - insertafter: '^auth' |
| 561 | + regexp: '^auth.*required.*pam_faillock.so preauth' |
| 562 | + line: "auth required pam_faillock.so preauth dir={{ rhel8stig_pam_faillock.dir }} silent audit deny={{ rhel8stig_pam_faillock.attempts }}{{ (rhel8stig_pam_faillock.fail_for_root) | ternary(' even_deny_root ',' ') }}fail_interval={{ rhel8stig_pam_faillock.interval }} unlock_time={{ rhel8stig_pam_faillock.unlock_time }}" |
| 563 | + insertafter: '^auth\s+required\s+pam_env.so' |
564 | 564 | notify: restart sssd |
565 | 565 |
|
566 | 566 | - name: "MEDIUM | RHEL-08-020025 | PATCH | 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file. | Set authfail" |
567 | 567 | lineinfile: |
568 | 568 | path: /etc/pam.d/system-auth |
569 | | - regexp: '^auth required pam_faillock.so authfail' |
570 | | - line: 'auth required pam_faillock.so authfail dir={{ rhel8stig_pam_faillock.dir }} unlock_time={{ rhel8stig_pam_faillock.unlock_time }}' |
| 569 | + regexp: '^auth.*required.*pam_faillock.so authfail' |
| 570 | + line: 'auth required pam_faillock.so authfail dir={{ rhel8stig_pam_faillock.dir }} unlock_time={{ rhel8stig_pam_faillock.unlock_time }}' |
571 | 571 | insertafter: '^auth' |
572 | 572 | notify: restart sssd |
573 | 573 |
|
|
936 | 936 | "MEDIUM | RHEL-08-010350 | PATCH | RHEL 8 library files must be group-owned by root or a system account. | Get library files not group-owned by root" |
937 | 937 | file: |
938 | 938 | path: "{{ item }}" |
939 | | - owner: root |
940 | | - group: root |
941 | | - mode: "{{ rhel8stig_lib_file_perm }}" |
| 939 | + owner: "{{ rhel_08_010340 | ternary('root',omit) }}" |
| 940 | + group: "{{ rhel_08_010350 | ternary('root',omit) }}" |
| 941 | + mode: "{{ rhel_08_010330 | ternary(rhel8stig_lib_file_perm,omit) }}" |
942 | 942 | with_items: |
943 | 943 | - "{{ rhel_08_010330_library_files.stdout_lines }}" |
944 | 944 | when: |
|
6159 | 6159 | path: /tmp |
6160 | 6160 | state: mounted |
6161 | 6161 | src: "{{ tmp_mount.device }}" |
6162 | | - fstype: xfs |
| 6162 | + fstype: "{{ tmp_mount.fstype }}" |
6163 | 6163 | opts: "defaults{{ rhel_08_040123 | ternary (',nodev', '') }}{{ rhel_08_040124 | ternary (',nosuid', '') }}{{ rhel_08_040125 | ternary (',noexec', '') }}" |
6164 | 6164 | vars: |
6165 | 6165 | tmp_mount: "{{ ansible_mounts | json_query('[?mount == `/tmp`] | [0]') }}" |
|
6206 | 6206 | path: /var/log |
6207 | 6207 | state: mounted |
6208 | 6208 | src: "{{ var_log_mount.device }}" |
6209 | | - fstype: xfs |
| 6209 | + fstype: "{{ var_log_mount.fstype }}" |
6210 | 6210 | opts: "defaults{{ rhel_08_040126 | ternary (',nodev', '') }}{{ rhel_08_040127 | ternary (',nosuid', '') }}{{ rhel_08_040128 | ternary (',noexec', '') }}" |
6211 | 6211 | vars: |
6212 | 6212 | var_log_mount: "{{ ansible_mounts | json_query('[?mount == `/var/log`] | [0]') }}" |
|
6252 | 6252 | path: /var/log/audit |
6253 | 6253 | state: mounted |
6254 | 6254 | src: "{{ audit_mount.device }}" |
6255 | | - fstype: xfs |
| 6255 | + fstype: "{{ audit_mount.fstype }}" |
6256 | 6256 | opts: "defaults{{ rhel_08_040129 | ternary (',nodev', '') }}{{ rhel_08_040130 | ternary (',nosuid', '') }}{{ rhel_08_040131 | ternary (',noexec', '') }}" |
6257 | 6257 | vars: |
6258 | 6258 | audit_mount: "{{ ansible_mounts | json_query('[?mount == `/var/log/audit`] | [0]') }}" |
|
6298 | 6298 | path: /var/tmp |
6299 | 6299 | state: mounted |
6300 | 6300 | src: "{{ var_tmp_mount.device }}" |
6301 | | - fstype: xfs |
| 6301 | + fstype: "{{ var_tmp_mount.fstype }}" |
6302 | 6302 | opts: "defaults{{ rhel_08_040132 | ternary (',nodev', '') }}{{ rhel_08_040133 | ternary (',nosuid', '') }}{{ rhel_08_040134 | ternary (',noexec', '') }}" |
6303 | 6303 | vars: |
6304 | 6304 | var_tmp_mount: "{{ ansible_mounts | json_query('[?mount == `/var/tmp`] | [0]') }}" |
|
0 commit comments