Information
The operating system must be configured so that the file integrity tool is configured to verify extended attributes.
Rationale:
Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Configure the file integrity tool to check file and directory extended attributes.
If AIDE is installed, ensure the xattrs rule is present on all uncommented file and directory selection lists.
Example: vim /etc/aide.conf
add rule that includes the xattrs example:
All= p+i+n+u+g+s+m+S+sha512+acl+xattrs+selinux
/bin All # apply the custom rule to the files in bin
/sbin All # apply the same custom rule to the files in sbin
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72071
Rule ID: SV-86695r3_rule
STIG ID: RHEL-07-021610
Severity: CAT III