Skip to content

Commit 32e9762

Browse files
authored
Merge pull request #3856 from uyuni-project/5.0.4-document-configration-for-oval-data-consumption-NEW
5.0 4 - Mark the OVAL data consumption as tech preview
2 parents cce65b3 + 784bf09 commit 32e9762

File tree

2 files changed

+75
-13
lines changed

2 files changed

+75
-13
lines changed

Diff for: CHANGELOG.md

+1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
- Marked OVAL data consumption as Technology Preview
12
- Enhanced CVE auditing feature in Administration Guide
23
- Restructured Server and Proxy Installation to better distinguish
34
between SUSE Linux Enterprise Micro and SUSE Linux Enterprise

Diff for: modules/administration/pages/auditing.adoc

+74-13
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,10 @@ In the {productname} {webui}, navigate to [guimenu]``Audit`` to perform auditing
88

99

1010

11-
// This probably needs to be broken into sub-sections. --LKB 20200205
12-
1311

1412
== CVE Audits
1513

16-
A CVE (common vulnerabilities and exposures) is a fix for a publicly known security vulnerability.
14+
A CVE (Common Vulnerabilities and Exposures) is a fix for a publicly known security vulnerability.
1715

1816
[IMPORTANT]
1917
====
@@ -32,7 +30,7 @@ We recommend that before you begin a CVE audit you refresh the data to ensure yo
3230
. In the {productname} {webui}, navigate to menu:Admin[Task Schedules] and select the ``cve-server-channels-default`` schedule.
3331
. Click btn:[cve-server-channels-bunch].
3432
. Click btn:[Single Run Schedule] to schedule the task.
35-
Allow the task to complete before continuing with the CVE audit.
33+
Allow the task to complete before continuing with the CVE audit.
3634

3735
.Procedure: Verifying Patch Status
3836
. In the {productname} {webui}, navigate to menu:Audit[CVE Audit].
@@ -50,24 +48,83 @@ You can use the {productname} API to verify the patch status of your clients.
5048
Use the ``audit.listSystemsByPatchStatus`` API method.
5149
For more information about this method, see the {productname} API Guide.
5250

51+
5352
== OVAL
54-
The CVE Audit operation relies on two primary data sources: Channels and OVAL (Open Vulnerability and Assessment Language).
55-
These two sources provide us with metadata for conducting CVE audits, each serving a distinct purpose.
53+
54+
[IMPORTANT]
55+
====
56+
In addition to retrieving CVE information from channel data, {productname} now includes an experimental feature that fetches CVE details from OVAL files.
57+
This functionality is currently considered a *Technology Preview*.
58+
59+
Users are encouraged to experiment with this feature and share feedback.
60+
However, it is not yet recommended for production use without thorough testing in a test environment.
61+
====
62+
63+
64+
The CVE Audit operation relies on two primary data sources: channels and OVAL (Open Vulnerability and Assessment Language).
65+
These two sources provide the metadata for conducting CVE audits, each serving a distinct purpose.
5666

5767
Channels::
58-
Channels include the updated software packages, which include patches, and provide insights into the essential patches required to address vulnerabilities.
68+
Channels include the updated software packages, including the patches, and provide insights into the essential patches required to address vulnerabilities.
5969

60-
OVAL::
61-
In contrast, OVAL data supplies information about the vulnerabilities themselves and the packages that render a system vulnerable to a CVE.
70+
OVAL (Technology Preview)::
71+
In contrast, OVAL data supply the information about vulnerabilities themselves, and packages that render a system vulnerable to a CVE.
6272

6373
While it is possible to conduct CVE audits using only channels data, synchronizing OVAL data enhances the accuracy of the results, particularly in cases involving zero-day vulnerabilities or partially patched vulnerabilities.
6474

65-
OVAL data is also much more lightweight than channels data.
75+
OVAL data is much more lightweight than channels data.
6676
For example, OVAL data for {opensuse} Leap 15.4 is around 50{nbsp}MB.
77+
6778
Having synced OVAL data only, you can already perform CVE audits and check if your systems are vulnerable or not to a CVE, but you can't apply patches since they come from channels.
6879

69-
By default, OVAL data is updated at 23:00 every day.
70-
We recommend that before you begin a CVE audit you refresh the data to ensure you have the latest vulnerabilities metadata.
80+
81+
[NOTE]
82+
====
83+
Key characteristics of the OVAL feature include:
84+
85+
* *Disabled by default*: The feature is turned off by default and must be explicitly enabled by the user by updating the configuration file [litaral]``rhn.conf`` and restarting relevant services.
86+
* *Reversible*: If any issues arise, users can revert back to the standard channel-based CVE audit.
87+
* *Performance considerations*: While initial testing has been conducted, there are still concerns regarding performance, and further optimizations may be needed.
88+
89+
* OVAL data is updated at 23:00 every day by default.
90+
We recommend that before you begin a CVE audit you refresh the data to ensure you have the latest vulnerabilities metadata.
91+
====
92+
93+
94+
.Procedure: Enabling OVAL Data Support
95+
96+
. Add or modify the following setting in [literal]``rhn.conf``:
97+
98+
+
99+
----
100+
java.cve_audit.enable_oval_metadata=true
101+
----
102+
+
103+
. Restart the Tomcat and Taskomatic services:
104+
105+
+
106+
----
107+
systemctl restart tomcat taskomatic
108+
----
109+
110+
If you encounter issues and need to revert to the default behavior, disable the feature by setting:
111+
112+
113+
.Procedure: Disabling OVAL Data Support
114+
115+
. Add or modify the following setting in [literal]``rhn.conf``:
116+
+
117+
----
118+
java.cve_audit.enable_oval_metadata=false
119+
----
120+
+
121+
. Restart the Tomcat and Taskomatic services:
122+
123+
+
124+
----
125+
systemctl restart tomcat taskomatic
126+
----
127+
71128

72129
.Procedure: Updating OVAL Data
73130
. In the {productname} {webui}, navigate to menu:Admin[Task Schedules] and select the ``oval-data-sync-default`` schedule.
@@ -76,7 +133,8 @@ We recommend that before you begin a CVE audit you refresh the data to ensure yo
76133

77134
Allow the task to complete before continuing with the CVE audit.
78135

79-
=== Collecting CPE
136+
137+
=== Collect CPE
80138

81139
To be able to accurately identify what vulnerabilities apply to a certain client, we need to identify the operating system product that client uses. To do that, we collect the CPE (Common Platform Enumeration) of the client as a salt grain, then we save it to the database.
82140

@@ -88,6 +146,7 @@ However, for existing clients, it is necessary to execute the ``Update Packages
88146
. Then go to the [guimenu]``Software`` tab and select the [guimenu]``Packages`` sub-tab.
89147
. Click btn:[Update Packages List] to update packages and collect the CPE of client.
90148

149+
91150
=== OVAL Sources
92151

93152
To ensure the integrity and currency of the OVAL data, {productname} exclusively consumes OVAL data from the official maintainers of every product. Below, you can find the list of OVAL data sources.
@@ -113,6 +172,7 @@ To ensure the integrity and currency of the OVAL data, {productname} exclusively
113172
OVAL metadata is used in CVE auditing for only a subset of clients, namely, clients that use openSUSE Leap, SUSE enterprise products, RHEL, Debian or Ubuntu. This is due to the absence of OVAL vulnerability definitions metadata for the other products.
114173
====
115174

175+
116176
== CVE Status
117177

118178
The CVE status of clients is usually either ``affected``, ``not affected``, or ``patched``.
@@ -135,6 +195,7 @@ A patch known by {productname} in a relevant channel.
135195
Relevant channel::
136196
A channel managed by {productname}, which is either assigned to the system, the original of a cloned channel which is assigned to the system, a channel linked to a product which is installed on the system or a past or future service pack channel for the system.
137197

198+
138199
[NOTE]
139200
====
140201
Because of the definitions used within {productname}, CVE audit results might be incorrect in some circumstances.

0 commit comments

Comments
 (0)