The following is a description of the elements, types, and attributes that compose the MacOS specific system characteristic items found in Open Vulnerability and Assessment Language (OVAL). Each item is an extension of the standard test element defined in the Core Definition Schema. Through extension, each test inherits a set of elements and attributes that are shared amongst all OVAL tests. Each test is described in detail and should provide the information necessary to understand what each element and attribute represents. This document is intended for developers and assumes some familiarity with XML. A high level description of the interaction between the different tests and their relationship to the Core Definition Schema is not outlined here. The MacOS System Characteristics Schema was initially developed by The Center for Internet Security. Many thanks to their contributions to OVAL and the security community. The OVAL Schema is maintained by the OVAL Community. For more information, including how to get involved in the project and how to submit change requests, please visit the OVAL website at http://oval.cisecurity.org. MacOS System Characteristics 5.11.1:1.2 11/30/2016 09:00:00 AM Copyright (c) 2016, Center for Internet Security. All rights reserved. The contents of this file are subject to the terms of the OVAL License located at https://oval.cisecurity.org/terms. See the OVAL License for the specific language governing permissions and limitations for use of this schema. When distributing copies of the OVAL Schema, this license header must be included. This item stores sser account information (username, uid, gid, etc.). The user associated with the information collected. Obfuscated (*****) or encrypted password for this user. The numeric user id, or uid, is the third column of each user's entry in /etc/passwd. This element represents the owner of the file. Group ID of this account. User's real name, aka gecos field of /etc/passwd. The home directory for this user account. The login shell for this user account. This item stores results from checking the contents of an authorizationdb right. Specifies the right_name in which the item is specified. Specifies an Xpath expression describing the text node(s) or attribute(s) to look at. The value_of element checks the value(s) of the text node(s) or attribute(s) found. How this is used is entirely controlled by operator attributes. This item stores results from checking the contents of the CoreStorage XML plist information. Specifies the UUID of the volume about which the plist information was retrieved. Specifies an Xpath expression describing the text node(s) or attribute(s) to look at. The value_of element checks the value(s) of the text node(s) or attribute(s) found. How this is used is entirely controlled by operator attributes. The diskutil_item holds verification information about an individual disk on a Mac OS system. Each diskutil_item contains a device, filepath, and details on how the actual permissions, ownerships and link targets differ from the expected values. For more information, see diskutil(8) or repair_packages(8). It extends the standard ItemType as defined in the oval-system-characteristics schema and one should refer to the ItemType description for more information. The device entity is a string that represents the disk on a Mac OS system to verify. Please see diskutil(8) for instructions on how to specify the device. The filepath element specifies the absolute path for a file or directory on the specified device. Has the actual user read permission changed from the expected user read permission? Has the actual user write permission changed from the expected user write permission? Has the actual user exec permission changed from the expected user exec permission? Has the actual group read permission changed from the expected group read permission? Has the actual group write permission changed from the expected group write permission? Has the actual group exec permission changed from the expected group exec permission? Has the actual others read permission changed from the expected others read permission? Has the actual others write permission changed from the expected others write permission? Has the actual others exec permission changed from the expected others exec permission? Has the actual user changed from the expected user? The actual user of the file/directory. The expected user of the file/directory. Has the actual group changed from the expected group? The actual group of the file/directory. The expected group of the file/directory. Has the actual symlink changed from the expected symlink? The actual symlink of the file/directory. The expected symlink of the file/directory. This item stores results from checking the settings of the Gatekeeper. The status of Gatekeeper assessments. The path to an unsigned application folder to which Gatekeeper has granted execute permission. An inet listening server item stores the results of checking for network servers currently active on a system. 5.10 The inetlisteningserver_item has been deprecated and replaced by the inetlisteningserver510_item. The name of an application cannot be used to uniquely identify an application that is listening on the network. As a result, the inetlisteningserver510_object utilizes the protocol, local_address, and local_port entities to uniquely identify an application listening on the network. Please see the inetlisteningserver510_item for additional information. DEPRECATED ITEM: ID: This is the name of the communicating program. This is the IP address of the network interface on which the program listens. Note that the IP address can be IPv4 or IPv6. This is the IP address and network port on which the program listens, equivalent to local_address:local_port. Note that the IP address can be IPv4 or IPv6. This is the TCP or UDP port on which the program listens. Note that this is not a list -- if a program listens on multiple ports, or on a combination of TCP and UDP, each will have its own entry in the table data stored by this item. This is the IP address with which the program is communicating, or with which it will communicate, in the case of a listening server. Note that the IP address can be IPv4 or IPv6. This is the IP address and network port to which the program is communicating or will accept communications from, equivalent to foreign_address:foreign_port. Note that the IP address can be IPv4 or IPv6. This is the TCP or UDP port to which the program communicates. In the case of a listening program accepting new connections, this is usually '0'. This is the process ID of the process. The process in question is that of the program communicating on the network. This is the transport-layer protocol, in lowercase: tcp or udp. The numeric user id, or uid, is the third column of each user's entry in /etc/passwd. It represents the owner, and thus privilege level, of the specified program. An inet listening server item stores the results of checking for network servers currently active on a system. This is the transport-layer protocol, in lowercase: tcp or udp. This is the IP address of the network interface on which the program listens. Note that the IP address can be IPv4 or IPv6. This is the TCP or UDP port on which the program listens. Note that this is not a list -- if a program listens on multiple ports, or on a combination of TCP and UDP, each will have its own entry in the table data stored by this item. This is the IP address and network port on which the program listens, equivalent to local_address:local_port. Note that the IP address can be IPv4 or IPv6. This is the name of the communicating program. This is the IP address with which the program is communicating, or with which it will communicate, in the case of a listening server. Note that the IP address can be IPv4 or IPv6. This is the TCP or UDP port to which the program communicates. In the case of a listening program accepting new connections, this is usually '0'. This is the IP address and network port to which the program is communicating or will accept communications from, equivalent to foreign_address:foreign_port. Note that the IP address can be IPv4 or IPv6. This is the process ID of the process. The process in question is that of the program communicating on the network. The numeric user id, or uid, is the third column of each user's entry in /etc/passwd. It represents the owner, and thus privilege level, of the specified program. This item stores results from checking the settings of a keychain. Specifies the filepath of the keychain. Specifies the whether the keychain is configured to lock on sleep. The inactivity timeout (in seconds) for the keychain, or 0 if there is no timeout. This item stores results from checking a launchd-controlled daemon/agent. Specifies the name of the agent/daemon. Specifies the process ID of the daemon (if any). Specifies the last exit code of the daemon (if any), or if $lt; 0, indicates the negative of the signal that interrupted processing. For example, a value of -15 would indicate that the job was terminated via a SIGTERM. Output of 'nvram -p' A nvram variabl. This is the value of the associated nvram variable. The plist_item holds information about an individual property list preference key found on a system. Each plist_item contains a preference key, application identifier or filepath, type, as well as the preference key's value. It extends the standard ItemType as defined in the oval-system-characteristics schema and one should refer to the ItemType description for more information. 5.11.2:1.0 The plist_item has been deprecated and replaced by the plist511_item. The plist_item cannot express the context hierarchy required to differentiate between nodes with identical names. As a result, it is not possible to address a particular node when the order of their parent nodes is indeterminate. The plist511_item was added to address this deficiency. See the plist511_item. DEPRECATED ITEM: ID: The preference key to check. The unique application identifier that specifies the application to use when looking up the preference key (e.g. com.apple.Safari). The absolute path to a plist file (e.g. ~/Library/Preferences/com.apple.Safari.plist). The instance of the preference key found in the plist. The first instance of a matching preference key is given the instance value of 1, the second instance of a matching preference key is given the instance value of 2, and so on. Instance values must be assigned using a depth-first approach. Note that the main purpose of this entity is to provide uniqueness for the different plist_items that result from multiple instances of a given preference key in the same plist file. The type of the preference key. The value of the preference key. The plist511_item stores results from checking the contents of the XML representation of a plist file. It extends the standard ItemType as defined in the oval-system-characteristics schema and one should refer to the ItemType description for more information. The unique application identifier that specifies the application to use when looking up the preference key (e.g. com.apple.Safari). The absolute path to a plist file (e.g. /Library/Preferences/com.apple.TimeMachine.plist). Specifies an XPath 1.0 expression to evaluate against the XML representation of the plist file specified by the filename or app_id entity. This XPath 1.0 expression must evaluate to a list of zero or more text values which will be accessible in OVAL via instances of the value_of entity. Any results from evaluating the XPath 1.0 expression other than a list of text strings (e.g., a nodes set) is considered an error. The intention is that the text values be drawn from instances of a single, uniquely named element or attribute. However, an OVAL interpreter is not required to verify this, so the author should define the XPath expression carefully. Note that "equals" is the only valid operator for the xpath entity. The value_of element checks the value(s) of the text node(s) or attribute(s) found. How this is used is entirely controlled by operator attributes. Output of 'pwpolicy -getpolicy'. Please see the 'pwpolicy' man page for additional information. 5.9 Replaced by the pwpolicy59_item. The username, userpass, and directory_node entities in the pwpolicy_item were underspecified and as a result their meaning was uncertain. A new item was created to resolve this issue. See the pwpolicy59_item. This item has been deprecated and may be removed in a future version of the language. DEPRECATED ITEM: ID: Maximum number of characters allowed in a password. Maximum number of failed logins before the account is locked. Minimum number of characters allowed in a password. Defines if the password is allowed to be the same as the username or not. Defines if the password must contain an alphabetical character or not. Defines if the password must contain an numeric character or not. The pwpolicy59_item holds the password policy information for a particular user specified by the target_user element. Please see the 'pwpolicy' man page for additional information. The target_user element specifies the user whose password policy information was collected. If xsi:nil="true", the item specifies the global policy. The username element specifies the username of the authenticator. The userpass element specifies the password of the authenticator as specified by the username element. The directory_node element specifies the directory node that the password policy information was collected from. Maximum number of characters allowed in a password. Maximum number of failed logins before the account is locked. Minimum number of characters allowed in a password. Defines if the password is allowed to be the same as the username or not. Defines if the password must contain an alphabetical character or not. Defines if the password must contain an numeric character or not. Maximum number of minutes until the password must be changed. Minimum number of minutes between password changes. Defines if the password must contain upper and lower case characters or not. Defines if the password must contain a symbol character or not. Number of minutes after login has been disabled due to too many failed login attempts to wait before reenabling login. 0 = user can reuse the current pass-word, 1 = user cannot reuse the current password, 2-15 = user cannot reuse the last n passwords. If true, the user can change the password. If true, user is required to change password on the date in expirationDateGMT If true, user's account is disabled on the date in hardExpireDateGMT Date for the password to expire, format is: mm/dd/yyyy. NOTE: The pwpolicy command returns the year as a two digit value, but OVAL uses four digit years; the pwpolicy value is converted to an OVAL compatible value. Date for the user's account to be disabled, format is: mm/dd/yyyy. NOTE: The pwpolicy command returns the year as a two digit value, but OVAL uses four digit years; the pwpolicy value is converted to an OVAL compatible value. User's account is disabled after this interval User's account is disabled if it is not accessed by this interval If true, the user will be prompted for a new password at the next authentication. The rlimit_item contains information about the resource limits for launchd. A resource limit is specified as a soft (current) limit and a hard (max) limit. When a soft limit is exceeded a process may receive a signal (for example, if the cpu time or file size is exceeded), but it will be allowed to con-tinue continue tinue execution until it reaches the hard limit (or modifies its resource limit). For any 'unlimited' resource, the entity will have the status of 'does not exist'. The maximum amount of cpu time (in seconds) to be used by each process. cpu hard limit. The largest size (in bytes) file that may be created. filesize hard limit. The maximum size (in bytes) of the data segment for a process; this defines how far a program may extend its break with the sbrk(2) system call. data hard limit. The maximum size (in bytes) of the stack segment for a process; this defines how far a program's stack segment may be extended. Stack extension is performed automatically by the system. stack hard limit. The largest size (in bytes) core file that may be created. core hard limit. The maximum size (in bytes) to which a process's resident set size may grow. This imposes a limit on the amount of physical memory to be given to a process; if memory is tight, the system will prefer to take memory from processes that are exceeding their declared resident set size. rss hard limit. The maximum size (in bytes) which a process may lock into memory using the mlock(2) function. memlock hard limit. The maximum number of simultaneous processes for this user id. maxproc hard limit. The maximum number of open files for this process. maxfiles hard limit. This item represents automatic software update information. Specifies whether automatic checking is enabled (true). Specifies the title string for an available (not installed) software update. This item stores results from performing an XPATH query on the XML result of a systemprofiler data type query. Specifies the data type that was used in collection. Specifies an Xpath expression describing the text node(s) or attribute(s) to look at. The value_of element checks the value(s) of the text node(s) or attribute(s) found. How this is used is entirely controlled by operator attributes. This item represents system setup information. Specifies the name of the current time zone. Specifies wither the machine is using network time. Specifies the network time server. Specifies the computer sleep inactivity timer, or 0 for never. Specifies the display sleep inactivity timer, or 0 for never. Specifies the hard disk sleep inactivity timer, or 0 for never. Specifies whether the computer will wake up if the modem is accessed. Specifies whether the computer will wake up if the network is accessed. Specifies whether the computer will restart after freezing. Specifies whether the computer will restart after a power failure. Specifies whether the power button can be used to cause the computer to sleep. Specifies whether remote logins are allowed. Specifies whether remote Apple events are enabled. Specifies the computer's name. Specifies the name of the local subnet. Specifies the startup disks. Specifies the number of seconds the computer waits to start up after a power failure. Specifies whether the keyboard is locked when the closure lock is engaged. Specifies the kernel boot architecture setting. The EntityItemDataTypeType complex type defines the different values that are valid for the data_type entity of a system_profiler item. These values describe the system_profiler XML data to be retrieved. The empty string is also allowed as a valid value to support an empty element that is found when a variable reference is used within the index entity. Note that when using pattern matches and variables care must be taken to ensure that the regular expression and variable values align with the enumerated values. Please note that the values identified are for the data_type entity and are not valid values for the datatype attribute. The empty string value is permitted here to allow for detailed error reporting. The EntityItemPermissionCompareType complex type restricts a string value to more, less, or same which specifies if an actual permission is different than the expected permission (more or less restrictive) or if the permission is the same. The empty string is also allowed to support empty elements associated with error conditions. The actual permission is more restrictive than the expected permission. The actual permission is less restrictive than the expected permission. The actual permission is the same as the expected permission. The empty string value is permitted here to allow for detailed error reporting. The EntityItemPlistTypeType complex type restricts a string value to the seven values CFString, CFNumber, CFBoolean, CFDate, CFData, CFArray, and CFDictionary that specify the type of the value associated with a property list preference key. The empty string is also allowed to support empty elements associated with error conditions. 5.11.2:1.0 Used only by the deprecated plist_item. This enumeration has been deprecated and may be removed in a future version of the language. The CFString type is used to describe a preference key that has a string value. The OVAL string datatype should be used to represent CFString values. The CFNumber type is used to describe a preference key that has a integer or float value. The OVAL int and float datatypes should be used, as appropriate, to represent CFNumber values. The CFBoolean type is used to describe a preference key that has a boolean value. The OVAL boolean datatype should be used to represent CFBoolean values. The CFDate type is used to describe a preference key that has a date value. The OVAL string datatype should be used to represent CFDate values. The CFData type is used to describe a preference key that has a base64-encoded binary value. The OVAL string datatype should be used to represent CFData values. The CFArray type is used to describe a preference key that has a collection of values. This is represented as multiple value entities. The CFDictionary type is used to describe a preference key that has a collection of key-value pairs. Note that the collection of CFDictionary values is not supported. If an attempt is made to collect a CFDictionary value, an error should be reported. The empty string value is permitted here to allow for detailed error reporting.