{"logs":[{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-lock_settings_obscure","result":"fail","title":"Disable Firefox Configuration File ROT-13 Encoding","description":"\nDisable ROT-13 encoding by setting general.config.obscure_value\nto 0.\n","rationale":"\nROT-13 encoded prevents system adminstrators from easily configuring\nand deploying Firefox configuration settings. It also prevents validating\nsettings easily from automated security tools.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ] ; then\n PREFERENCE_DIR=${FIREFOX_DIR}/defaults/preferences/\n \n if [ ! -d ${PREFERENCE_DIR} ]; then\n mkdir -p -m 755 ${PREFERENCE_DIR}\n fi\n\n grep -q '^pref(\\\"general.config.obscure_value\\\", 0);' ${PREFERENCE_DIR}/security_settings.js && \\\n sed -i 's/pref(\\\"general.config.obscure_value\\\".*/pref(\\\"general.config.obscure_value\\\", 0);/g' ${PREFERENCE_DIR}/security_settings.js\n if ! [ $? -eq 0 ] ; then\n echo 'pref(\"general.config.obscure_value\", 0);' >> ${PREFERENCE_DIR}/security_settings.js\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-lock_settings_config_file","result":"fail","title":"Set Firefox Configuration File Location","description":"\nSpecify the Firefox configuration file location by setting \ngeneral.config.filename to the configuration (i.e. mozilla.cfg)\nfilename that contains the Firefox security preferences.\n","rationale":"\nLocked settings prevents users from accessing about:config and changing\nthe security settings set by the system administrator.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ] ; then\n PREFERENCE_DIR=${FIREFOX_DIR}/defaults/preferences/\n \n if [ ! -d ${PREFERENCE_DIR} ]; then\n mkdir -p -m 755 ${PREFERENCE_DIR}\n fi\n\n grep -q 'pref(\\\"general.config.filename\\\", \\\"mozilla.cfg\\\");' ${PREFERENCE_DIR}/security_settings.js && \\\n sed -i 's/pref(\\\"general.config.filename\\\".*/pref(\\\"general.config.filename\\\", \\\"mozilla.cfg\\\");/g' ${PREFERENCE_DIR}/security_settings.js\n if ! [ $? -eq 0 ] ; then\n echo 'pref(\"general.config.filename\", \"mozilla.cfg\");' >> ${PREFERENCE_DIR}/security_settings.js\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-enable_ca_trust","result":"notchecked","title":"Enable Shared System Certificates","description":"\nThe Shared System Certificates store makes NSS, GnuTLS, OpenSSL, and Java\nshare a default source for retrieving system certificate anchors and blacklist\ninformation. Firefox has the capability of using this centralized store for its\nCA certificates. If the Shared System Certificates store is disabled, it can\nbe enabled by running the following command:\n$ sudo update-ca-trust enable\n","rationale":"\nThe DOD root certificate will ensure that the trust chain is\nestablished for server certificates issued from the DOD CA.\n","references":[{"title":"AC-10","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"AC-10"},{"title":"54","href":"http://iase.disa.mil/cci/index.html","html_link":"54"}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"P11=$(ls -l /etc/alternatives/libnssckbi.so* | awk {'print $11'})\nP11LIB=\"/usr/lib64/pkcs11/p11-kit-trust.so\"\n\nif ! [[ ${P11} == ${P11LIB} ]] ; then\n /usr/bin/update-ca-trust enable\nfi\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-dod_root_certificate_installed","result":"notchecked","title":"The DoD Root Certificate Exists","description":"\nThe DoD root certificate should be installed in the Shared System Certificates store\nfor Firefox to be able to access the DoD certificate. To install the root certificated\ninto the Shared System Certificates store, copy the DoD root certificate into\n/etc/pki/ca-trust/source/anchors. Once the file is copied, run the following\ncommand:\n$ sudo update-ca-trust extract\n","rationale":"\nThe DOD root certificate will ensure that the trust chain is\nestablished for server certificates issued from the DOD CA.\n","references":[{"title":"AC-10","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"AC-10"},{"title":"54","href":"http://iase.disa.mil/cci/index.html","html_link":"54"}],"fixes":[],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-addons_plugin_updates","result":"fail","title":"Disable Addons Plugin Updates","description":"\nFirefox automatically updates installed add-ons and plugins which \ncan be disabled by setting extensions.update.enabled to\nfalse.\n","rationale":"\nAutomatic updates from untrusted sites puts the enclave at\nrisk of attack and may override security settings.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"extensions.update.enabled\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"extensions.update.enabled\\\".*/lockPref(\\\"extensions.update.enabled\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo \"lockPref(\\\"extensions.update.enabled\\\", false);\" >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-autofill_forms","result":"fail","title":"Disable Autofill Form Assistance","description":"\nFirefox provides tools to auto-fill forms from prefilled information.\nThis can be disabled by setting browser.formfill.enable to\nfalse.\n","rationale":"\nIn order to protect privacy and sensitive data, Firefox provides\nthe ability to configure Firefox such that data entered into forms\nis not saved. This mitigates the risk of a website gleaning private\ninformation from prefilled information.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"browser.formfill.enable\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"browser.formfill.enable\\\".*/lockPref(\\\"browser.formfill.enable\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"browser.formfill.enable\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-autofill_passwords","result":"fail","title":"Disable User Ability To Autofill Passwords","description":"\nFirefox automatically allows users to save passwords to be auto-filled\ninto password forms. This can be disabled by setting\nsignon.prefillForms to false.\n","rationale":"\nWhile on the internet, it may be possible for an attacker to view\nthe saved password files and gain access to the user's accounts on\nvarious hosts.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"signon.prefillForms\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"signon.prefillForms\\\".*/lockPref(\\\"signon.prefillForms\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then \n echo 'lockPref(\"signon.prefillForms\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-auto-update_of_firefox","result":"fail","title":"Disable Firefox Auto-Update Capability","description":"\nFirefox can be set to automatically update as new updates. This can be\ndisabled by setting app.update.enable to false.\n","rationale":"\nAllowing software updates from non-trusted sites can introduce settings\nthat will override a secured installation of the application. This can\nplace DoD information at risk. If this setting is enabled, then there are\nmany other default settings which point to untrusted sites which must be\nchanged to point to an authorized update site that is not publicly accessible.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"app.update.enabled\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"app.update.enabled\\\".*/lockPref(\\\"app.update.enabled\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"app.update.enabled\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-cookies_clear","result":"fail","title":"Clear Data When Firefox Closes","description":"\nWhen a user browses to a website, cookies and other types of data\nget stored on the system. This can be disabled by setting\nprivacy.sanitize.sanitizeOnShutdown to true.\n","rationale":"\nCookies can help websites perform better but can also be part of spyware.\nTo mitigate this risk, set browser preferences to perform a Clear Private\nData operation when closing the browser in order to clear cookies and\nother data installed by websites visited during the session.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"privacy.sanitize.sanitizeOnShutdown\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"privacy.sanitize.sanitizeOnShutdown\\\".*/lockPref(\\\"privacy.sanitize.sanitizeOnShutdown\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"privacy.sanitize.sanitizeOnShutdown\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-cookies_user_notice","result":"fail","title":"Disable User Prompt When Data Is Cleared","description":"\nBy default, users are asked if it is okay to clear out cookies and data\nwhen Firefox closes. This can be disabled by \nsetting privacy.sanitize.promptOnSanitize to false.\n","rationale":"\nCookies can help websites perform better but can also be part of spyware.\nTo mitigate this risk, set browser preferences to perform a Clear Private\nData operation when closing the browser in order to clear cookies and\nother data installed by websites visited during the session.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"privacy.sanitize.promptOnSanitize\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"privacy.sanitize.promptOnSanitize\\\".*/lockPref(\\\"privacy.sanitize.promptOnSanitize\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"privacy.sanitize.promptOnSanitize\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-open_confirmation","result":"fail","title":"Enable Downloading and Opening File Confirmation","description":"\nTo have an action dialog box appear promping users what action to take when\ncertain types of files are downloaded or opened, set\nplugin.disable_full_page_plugin_for_types to\n.\n","rationale":"\nWhen the user receives a dialog box asking if they want to save the file\nor open it with a specified application, this indicates that a plugin does\nnot exist. Also, the user has not previously selected a download action or helper\napplication to automatically use for that type of file. When prompted, if the user\nchecks the option to 'Do this automatically for files like this from now on', then\nan entry will appear for that type of file in the plugins listing, and this file\ntype is automatically opened in the future. This can be a security issue. New file\ntypes cannot be added directly to the Application plugin listing.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"var_required_file_types=\"\"\nFIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"plugin.disable_full_page_plugin_for_types\\\"' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i \"s;lockPref(\\\"plugin.disable_full_page_plugin_for_types\\\".*;lockPref(\\\"plugin.disable_full_page_plugin_for_types\\\", \\\"${var_required_file_types}\\\")\\;;g\" ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo \"lockPref(\\\"plugin.disable_full_page_plugin_for_types\\\", \\\"${var_required_file_types}\\\");\" >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-password_store","result":"fail","title":"Disable the Firefox Password Store","description":"\nFirefox allows users to store passwords whether or not a master password\nis set for the password store. To disable the storing of passwords, set\nsignon.rememberSignons to false.\n","rationale":"\nAutofill of a password can be enabled when a site is visited. This feature could also\nbe used to autofill the certificate pin which could lead to compromise of DoD information.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ] ; then\n grep -q '^lockPref(\\\"signon.rememberSignons\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"signon.rememberSignons\\\".*/lockPref(\\\"signon.rememberSignons\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"signon.rememberSignons\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-search_update","result":"fail","title":"Disable Installed Search Plugins Update Checking","description":"\nFirefox automatically checks for updated versions of search plugins.\nTo disable the automatic updates of plugins, set\nbrowser.search.update to false.\n","rationale":"\nUpdates need to be controlled and installed from authorized and trusted servers.\nThis setting overrides a number of other settings which may direct the application\nto access external URLs.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"browser.search.update\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"browser.search.update\\\".*/lockPref(\\\"browser.search.update\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"browser.search.update\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-shell_protocol","result":"fail","title":"Disable Firefox Access to Shell Protocols","description":"\nAccess to the shell is disabled by default but can be changed.\nTo prevent shell access from being enabled, set\nnetwork.protocol-handler.external.shell to false.\n","rationale":"\nIf enabled, this setting would allow the browser to access the Windows shell.\nThis could allow access to the underlying system.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"network.protocol-handler.external.shell\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"network.protocol-handler.external.shell\\\".*/lockPref(\\\"network.protocol-handler.external.shell\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"network.protocol-handler.external.shell\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-ssl_version_2","result":"fail","title":"Disable SSL Version 2.0 in Firefox","description":"\nSSL version 2 is not enabled by default and should not be enabled.\nTo prevent SSL version 2 from being enabled set\nsecurity.enable_ssl2 to false.\n","rationale":"\nUse of versions prior to TLS 1.0 are not permitted because these versions are\nnon-standard. SSL 2.0 and SSL 3.0 contain a number of security flaws.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"security.enable_ssl2\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"security.enable_ssl2\\\".*/lockPref(\\\"security.enable_ssl2\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"security.enable_ssl2\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-ssl_protocol_tls","result":"fail","title":"Enable TLS Usage in Firefox","description":"\nTo enable TLS, set security.enable_tls to true.\n","rationale":"\nEarlier versions of SSL have known security vulnerabilities and are not\nauthorized for use in DOD environments.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"security.enable_tls\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"security.enable_tls\\\".*/lockPref(\\\"security.enable_tls\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"security.enable_tls\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-verification","result":"fail","title":"Enable Certificate Verification","description":"\nFirefox can be configured to prompt the user to choose a certificate\nto present to a website when asked. To enable certificate verification, \nset security.default_personal_cert to Ask Every Time.\n","rationale":"\nWebsites within DoD require user authentication for access which increases\nsecurity for DoD information. Access will be denied to the user if\ncertificate management is not configured.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"security.default_personal_cert\\\", \\\"Ask Every Time\\\");' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"security.default_personal_cert\\\".*/lockPref(\\\"security.default_personal_cert\\\", \\\"Ask Every Time\\\");/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ]; then\n echo 'lockPref(\"security.default_personal_cert\", \"Ask Every Time\");' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-ssl_version_3","result":"fail","title":"Disable SSL Version 3.0 in Firefox","description":"\nSSL version 3.0 is vulnerable and should be disabled by setting\nsecurity.enable_ssl3 to false.\n","rationale":"\nEarlier versions of SSL have known security vulnerabilities and are not\nauthorized for use in DOD.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"security.enable_ssl3\\\", false);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"security.enable_ssl3\\\".*/lockPref(\\\"security.enable_ssl3\\\", false);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"security.enable_ssl3\", false);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-home_page","result":"fail","title":"Default Firefox Home Page Configured","description":"\nThe default home page is set to a vendor's defined website or\nFirefox's own website. This can be changed to an organizationally defined website\nor about:blank. To set the default home page, set\nbrowser.startup.homepage to .\n","rationale":"\nThe browser home page parameter specifies the web page that is to be\ndisplayed when the browser is started explicitly and when product-specific\nbuttons or key sequences for the home page are accessed. This helps to\nmitigate the possibility of automatic inadvertent execution of scripts \nadded to a previously safe site.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"var_default_home_page=\"\"\nFIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"browser.startup.homepage\\\"' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i \"s;lockPref(\\\"browser.startup.homepage\\\".*;lockPref(\\\"browser.startup.homepage\\\", \\\"${var_default_home_page}\\\")\\;;g\" ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo \"lockPref(\\\"browser.startup.homepage\\\", \\\"${var_default_home_page}\\\");\" >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_installed_firefox_version_supported","result":"pass","title":"Supported Version of Firefox Installed","description":"\nIf the system is joined to the Red Hat Network, a Red Hat Satellite Server,\nor a yum server, run the following command to install updates:\n$ sudo yum update\nIf the system is not configured to use one of these sources, updates (in the form of RPM packages)\ncan be manually downloaded and installed using rpm.\n","rationale":"\nUse of versions of an application which are not supported by the vendor\nare not permitted. Vendors respond to security flaws with updates and\npatches. These updates are not available for unsupported version which\ncan leave the application vulnerable to attack.\n","references":[{"title":"DCMC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"DCMC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[],"severity":"High"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-javascript_status_bar_text","result":"fail","title":"Disable JavaScript's Ability To Modify The Browser Appearance","description":"\nJavaScript can configure and make changes to the web browser's appearance by\nspecifically hiding the status bar from view. This can disabled by \nsetting dom.disable_window_open_feature.status to true.\n","rationale":"\nJavaScript can make changes to the browser___s appearance. This activity\ncan help disguise an attack taking place in a minimized background window.\nWebpage authors can disable many features of a popup window that they open.\nThis setting prevents the status bar from being hidden.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"dom.disable_window_open_feature.status\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"dom.disable_window_open_feature.status\\\".*/lockPref(\\\"dom.disable_window_open_feature.status\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"dom.disable_window_open_feature.status\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-javascript_status_bar_changes","result":"fail","title":"Disable JavaScript's Ability To Change The Status Bar","description":"\nJavaScript can configure and make changes to the web browser's appearance by\nspecifically hiding or changing the status bar. This can be disabled by\nsetting dom.disable_window_status_change to true.\n","rationale":"\nWhen a user visits some webpages, JavaScript can hide or make changes\nto the browser___s appearance to hide unauthorized activity. This activity\ncan help disguise an attack taking place in a minimized background window.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"dom.disable_window_status_change\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"dom.disable_window_status_change\\\".*/lockPref(\\\"dom.disable_window_status_change\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"dom.disable_window_status_change\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-javascript_window_resizing","result":"fail","title":"Disable JavaScript's Moving Or Resizing Windows Capability","description":"\nJavaScript can configure and make changes to the web browser's appearance by\nspecifically moving and resizing browser windows. This can be disabled by\nsetting dom.disable_window_move_resize to true.\n","rationale":"\nJavaScript can make changes to the browser___s appearance. This activity\ncan help disguise an attack taking place in a minimized background window.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"dom.disable_window_move_resize\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"dom.disable_window_move_resize\\\".*/lockPref(\\\"dom.disable_window_move_resize\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"dom.disable_window_move_resize\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-javascript_window_changes","result":"fail","title":"Disable JavaScript's Raise Or Lower Windows Capability","description":"\nJavaScript can configure and make changes to the web browser's appearance by\nspecifically raising and lowering windows. This can be disabled by\nsetting dom.disable_window_flip to true.\n","rationale":"\nJavaScript can make changes to the browser___s appearance. Allowing a website\nto use JavaScript to raise and lower browser windows may disguise an attack.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"dom.disable_window_flip\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"dom.disable_window_flip\\\".*/lockPref(\\\"dom.disable_window_flip\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"dom.disable_window_flip\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-non-secure_page_warning","result":"fail","title":"Enable Non-Secure Page Warnings","description":"\nWhen users browse websites, web pages can switch in between secure and \nnon-secure protocols. Users can be warned each time by\nsetting security.warn_leaving_secure to true.\n","rationale":"\nUsers may not be aware that the information being viewed under secure\nconditions in a previous page are not currently being viewed under\nthe same security settings.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"security.warn_leaving_secure\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"security.warn_leaving_secure\\\".*/lockPref(\\\"security.warn_leaving_secure\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo 'lockPref(\"security.warn_leaving_secure\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"},{"source":"xccdf_org.ssgproject.content_rule_firefox_preferences-pop-up_windows","result":"fail","title":"Enable Firefox Pop-up Blocker","description":"\nThe pop-up blocker can be enabled by setting\ndom.disable_window_open_feature.status to true.\n","rationale":"\nPopup windows may be used to launch an attack within a new browser window\nwith altered settings.\n","references":[{"title":"ECSC-1","href":"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf","html_link":"ECSC-1"},{"title":"","href":"http://iase.disa.mil/cci/index.html","html_link":""}],"fixes":[{"id":"","platform":"","system":"urn:xccdf:fix:script:sh","content":"FIREFOX_DIRs=\"/usr/lib/firefox /usr/lib64/firefox /usr/local/lib/firefox /usr/local/lib64/firefox\"\nfor FIREFOX_DIR in ${FIREFOX_DIRs}; do\n if [ -d ${FIREFOX_DIR} ]; then\n grep -q '^lockPref(\\\"dom.disable_window_open_feature.status\\\", true);' ${FIREFOX_DIR}/mozilla.cfg && \\\n sed -i 's/lockPref(\\\"dom.disable_window_open_feature.status\\\".*/lockPref(\\\"dom.disable_window_open_feature.status\\\", true);/g' ${FIREFOX_DIR}/mozilla.cfg\n if ! [ $? -eq 0 ] ; then\n echo '^lockPref(\"dom.disable_window_open_feature.status\", true);' >> ${FIREFOX_DIR}/mozilla.cfg\n fi\n fi\ndone\n"}],"severity":"Medium"}],"digest":"26a5865ab702617d716f2457aa5e7c4786950589c515f37fce1de15004b1d230","metrics":{"passed":1,"failed":23,"othered":2}}