6.1.1 Audit system file permissions

Information

The RPM package manager has a number of useful options. One of these, the -V option, can be used to verify that system packages are correctly installed. The V option can be used to verify a particular package or to verify all system packages. If no output is returned, the package is installed correctly. The following table describes the meaning of output from the verify option:

Code Meaning

S File size differs.

M File mode differs (includes permissions and file type).

5 The MD5 checksum differs.

D The major and minor version numbers differ on a device file.

L A mismatch occurs in a link.

U The file ownership differs.

G The file group owner differs.

T The file time (mtime) differs.

The rpm -qf command can be used to determine which package a particular file belongs to. For example the following commands determines which package the /etc/ssh/sshd_config file belongs to:

# rpm -qf /etc/ssh/sshd_config

openssh-server-7.4p1-21.el7.x86_64

To verify the settings for the package that controls the /bin/bash file, run the following:

# rpm -V openssh-server-7.4p1-21.el7.x86_64

S.5....T. c /etc/ssh/sshd_config

Note: You can feed the output of the rpm -qf command to the rpm -V command:

# rpm -V $(rpm -qf /etc/ssh/sshd_config)

S.5....T. c /etc/ssh/sshd_config




Notes:

Since packages and important files may change with new updates and releases, it is recommended to verify everything, not just a finite list of files. This can be a time consuming task and results may depend on site policy therefore it is not a scorable benchmark item, but is provided for those interested in additional security measures.

Some of the recommendations of this benchmark alter the state of files audited by this recommendation. The audit command will alert for all changes to a file permissions even if the new state is more secure than the default.

Rationale:

It is important to confirm that packaged system files and directories are maintained with the permissions they were intended to have from the OS distributor or in accordance with local site policy.

Solution

Investigate the results to ensure any discrepancies found are understood and support proper secure operation of the system.

See Also

https://workbench.cisecurity.org/files/2925

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CSCv7|14.6

Plugin: Unix

Control ID: b5a247a1ea9b59622aec8fffd99f8bc4d0db4be131b119b1cf647a36d25322b0