Check: UBTU-16-030320
Canonical Ubuntu 16.04 LTS STIG:
UBTU-16-030320
(in versions v2 r3 through v1 r3)
Title
The SSH private host key files must have mode 0600 or less permissive. (Cat II impact)
Discussion
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
Check Content
Verify the SSH private host key files have mode "0600" or less permissive. Check the mode of the private host key files under "/etc/ssh" file with the following command: # ls -alL /etc/ssh/ssh_host*key -rw------- 1 root wheel 668 Nov 28 06:43 ssh_host_dsa_key -rw------- 1 root wheel 582 Nov 28 06:43 ssh_host_key -rw------- 1 root wheel 887 Nov 28 06:43 ssh_host_rsa_key If any private host key file has a mode more permissive than "0600", this is a finding.
Fix Text
Configure the mode of SSH private host key files under "/etc/ssh" to "0600" with the following command: #sudo chmod 0600 /etc/ssh/ssh_host*key The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: # sudo systemctl restart sshd.service
Additional Identifiers
Rule ID: SV-215133r610931_rule
Vulnerability ID: V-215133
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |