Check: RHEL-09-255130
RHEL 9 STIG:
RHEL-09-255130
(in versions v1 r2 through v1 r1)
Title
RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication. (Cat II impact)
Discussion
If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection, potentially with root privileges.
Check Content
Verify the SSH daemon performs compression after a user successfully authenticates with the following command: $ sudo grep -ir compression /etc/ssh/sshd_config /etc/ssh/sshd_config.d/* Compression delayed If the "Compression" keyword is set to "yes", is missing, or the returned line is commented out, this is a finding.
Fix Text
Configure the SSH daemon to not allow compression. Uncomment the "Compression" keyword in "/etc/ssh/sshd_config" on the system and set the value to "delayed" or "no": Compression no The SSH service must be restarted for changes to take effect: $ sudo systemctl restart sshd.service
Additional Identifiers
Rule ID: SV-258002r925993_rule
Vulnerability ID: V-258002
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |