Check: GEN005500
SUSE Linux Enterprise Server v11 for System z STIG:
GEN005500
(in versions v1 r12 through v1 r9)
Title
The SSH daemon must be configured to only use the SSHv2 protocol. (Cat I impact)
Discussion
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.
Check Content
Locate the sshd_config file: # more /etc/ssh/sshd_config Examine the file. If the variables 'Protocol 2,1’ or ‘Protocol 1’ are defined on a line without a leading comment, this is a finding.
Fix Text
Edit the sshd_config file and set the "Protocol" setting to "2". Restart the SSH daemon. # /sbin/service sshd restart
Additional Identifiers
Rule ID: SV-45997r2_rule
Vulnerability ID: V-4295
Group Title: GEN005500
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001436 |
The organization disables organization-defined networking protocols within the information system deemed to be nonsecure except for explicitly identified components in support of specific operational requirements. |
Controls
Number | Title |
---|---|
No controls are assigned to this check |