Check: AIX7-00-002122
IBM AIX 7.x STIG:
AIX7-00-002122
(in versions v2 r9 through v1 r1)
Title
The AIX SSH daemon must be configured to not use host-based authentication. (Cat II impact)
Discussion
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.
Check Content
Check the SSH daemon configuration for allowed host-based authentication using command: # grep -i HostbasedAuthentication /etc/ssh/sshd_config | grep -v '^#' HostbasedAuthentication no If no lines are returned, or the returned "HostbasedAuthentication" directive contains "yes", this is a finding.
Fix Text
Edit "/etc/ssh/sshd_config" and add or update the "HostbasedAuthentication" line as: HostbasedAuthentication no Save the change and restart ssh daemon: # stopsrc -s sshd # startsrc -s sshd
Additional Identifiers
Rule ID: SV-215304r877377_rule
Vulnerability ID: V-215304
Group Title: SRG-OS-000480-GPOS-00229
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |