Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

auditd 5.2.3.12 logins should refer to /var/run/faillock #114

Merged

Conversation

kdebisschop
Copy link
Contributor

@kdebisschop kdebisschop commented Nov 16, 2023

Overall Review of Changes:

In templates/audit/ubtu20cis_5_2_3_12_logins.rules.j2, auditd 5.2.3.12 logins should refer to /var/run/faillock and not /var/log/faillock.

From CIS:

Verify the output matches:

-w /var/log/lastlog -p wa -k logins
-w /var/run/faillock -p wa -k logins

From man pam_faillock

FILES
/var/run/faillock/*
the files logging the authentication failures for users

Issue Fixes:
Fixes #115

Enhancements:
None

How has this been tested?:
This has been tested by cross-checking the configuration created by this ansible role with the CIS Security Configuration Assessment for Ubuntu 20 in Wazuh SIEM (which is based on Ubuntu 20.04 CIS v2.0.0)

@kdebisschop kdebisschop force-pushed the audit_5_2_3_12_logins_rules_typo branch from d144ed9 to 5690f1d Compare November 16, 2023 14:25
Copy link
Member

@uk-bolly uk-bolly left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great catch

@uk-bolly uk-bolly merged commit c36172b into ansible-lockdown:devel Nov 21, 2023
3 checks passed
@uk-bolly uk-bolly mentioned this pull request Dec 12, 2023
@kdebisschop kdebisschop deleted the audit_5_2_3_12_logins_rules_typo branch January 28, 2024 20:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

auditd 5.2.3.12 logins should refer to /var/run/faillock
2 participants