Check: GEN005505
Title
The SSH daemon must be configured to only use FIPS 140-2 approved ciphers. (Cat II impact)
Discussion
DoD information systems are required to use FIPS 140-2 approved ciphers. SSHv2 ciphers meeting this requirement are 3DES and AES.
Check Content
Check the SSH daemon configuration for allowed ciphers. # grep -i ciphers /etc/ssh/sshd_config | grep -v '^#' # grep -i ciphers /etc/openssh/sshd_config | grep -v '^#' If no lines are returned, or the returned ciphers list contains any cipher not starting with 3des or aes, this is a finding.
Fix Text
Edit /etc/ssh/sshd_config and change or set the Ciphers line to the following. Ciphers aes128-ctr, aes192-ctr, aes256-ctr
Additional Identifiers
Rule ID:
Vulnerability ID: V-22458
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17 (2) |
Protection Of Confidentiality / Integrity Using Encryption |