Skip to content

Enhancement: Add a new task for configuring fapolicyd rules #132

Open
@merillr

Description

@merillr

Since the installation only supports tgz, systems running fapolicyd (such as DISA STIG-compliant RHEL8+ servers) block splunk from executing. Below is a snippet of the rules preventing execution after running fapolicyd --debug-deny:

rule=11 dec=deny_audit perm=open auid=-1 pid=29811 exe=/opt/splunk/bin/python3.7m : path=/opt/splunk/lib/python3.7/encodings/__pycache__/__init__.cpython-37.pyc ftype=application/x-bytecode.python trust=0
rule=8 dec=deny_audit perm=open auid=-1 pid=29812 exe=/opt/splunk/bin/python3.7m : path=/opt/splunk/lib/libdlwrapper.so.1.0.0 ftype=application/x-sharedlib trust=0
rule=13 dec=deny_audit perm=execute auid=-1 pid=29813 exe=/usr/bin/bash : path=/opt/splunk/bin/python3.7m ftype=application/x-executable trust=0

Some options are:

  1. Add a task to create the fapolicyd rules.d files and update the fapolicyd database.
  2. Add a task to create the fapolicd trusted.d files to whitelist specific directories (only works if directories don't change because of SHA-256 hashing).
  3. Support RPM-based installation (Enhancement: Install/upgrade from RPM/deb OS packages when compatible with target OS #7), since applications registered in the system RPM database are automatically trusted.

References:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/assembly_blocking-and-allowing-applications-using-fapolicyd_security-hardening
https://www.stigviewer.com/stig/red_hat_enterprise_linux_8/2020-11-25/finding/V-230523

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions