Skip to content

Commit 013cbbe

Browse files
committed
Remove chrony_set_nts from STIG profiles
Network Time Security (NTS) is not compatible with systems running in FIPS mode. Enabling NTS on a system in FIPS mode causes chronyd service to abort with a fatal error. This is because NTS uses algorithms (specifically SIV cipher) that are not approved by NIST and are not compliant with FIPS. This is in direct conflict with STIG requiring FIPS mode: https://www.stigaview.com/products/rhel9/v2r7/RHEL-09-671010/ https://www.stigaview.com/products/rhel10/v1r1/RHEL-10-000500/ and therefore rule `chrony_set_nts` should be removed from STIG profiles. For more details see: * https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/configuring_basic_system_settings/configuring-time-synchronization_configuring-basic-system-settings#assembly_overview-of-network-time-security-in-chrony_configuring-time-synchronization * https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/configuring_time_synchronization/overview-of-network-time-security-nts-in-chrony * https://access.redhat.com/solutions/7053784 Resolves #14563
1 parent 0bb5f8a commit 013cbbe

5 files changed

Lines changed: 8 additions & 3 deletions

File tree

controls/srg_gpos/SRG-OS-000480-GPOS-00227.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -245,7 +245,6 @@ controls:
245245
- display_login_attempts
246246
- installed_OS_is_vendor_supported
247247
- selinux_all_devicefiles_labeled
248-
- chrony_set_nts
249248
- tftp_uses_secure_mode_systemd
250249
- grub2_pti_argument
251250
- chronyd_client_only

linux_os/guide/services/ntp/chrony_set_nts/rule.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,3 +25,10 @@ severity: medium
2525

2626
platforms:
2727
- package[chrony]
28+
29+
warnings:
30+
- general: |-
31+
Network Time Security (NTS) is not compatible with systems running in FIPS mode.
32+
Enabling NTS on a system in FIPS mode causes chronyd service to abort with a fatal
33+
error. This is because NTS uses algorithms (specifically SIV cipher) that are not
34+
approved by NIST and are not compliant with FIPS.

products/rhel10/profiles/default.profile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,3 +46,4 @@ selections:
4646
- sshd_use_strong_macs
4747
- configure_ssh_crypto_policy
4848
- package_dnsmasq_removed
49+
- chrony_set_nts

tests/data/profile_stability/rhel10/stig.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,6 @@ auditd_overflow_action
147147
auditd_write_logs
148148
banner_etc_issue
149149
bios_enable_execution_restrictions
150-
chrony_set_nts
151150
chronyd_client_only
152151
chronyd_no_chronyc_network
153152
chronyd_or_ntpd_set_maxpoll

tests/data/profile_stability/rhel10/stig_gui.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,6 @@ auditd_overflow_action
147147
auditd_write_logs
148148
banner_etc_issue
149149
bios_enable_execution_restrictions
150-
chrony_set_nts
151150
chronyd_client_only
152151
chronyd_no_chronyc_network
153152
chronyd_or_ntpd_set_maxpoll

0 commit comments

Comments
 (0)