STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The AIX SSH daemon must be configured to not use host-based authentication.

DISA Rule

SV-215304r508663_rule

Vulnerability Number

V-215304

Group Title

SRG-OS-000480-GPOS-00229

Rule Version

AIX7-00-002122

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit "/etc/ssh/sshd_config" and add or update the "HostbasedAuthentication" line as:
HostbasedAuthentication no

Save the change and restart ssh daemon:
# stopsrc -s sshd
# startsrc -s sshd

Check Contents

Check the SSH daemon configuration for allowed host-based authentication using command:

# grep -i HostbasedAuthentication /etc/ssh/sshd_config | grep -v '^#'
HostbasedAuthentication no

If no lines are returned, or the returned "HostbasedAuthentication" directive contains "yes", this is a finding.

Vulnerability Number

V-215304

Documentable

False

Rule Version

AIX7-00-002122

Severity Override Guidance

Check the SSH daemon configuration for allowed host-based authentication using command:

# grep -i HostbasedAuthentication /etc/ssh/sshd_config | grep -v '^#'
HostbasedAuthentication no

If no lines are returned, or the returned "HostbasedAuthentication" directive contains "yes", this is a finding.

Check Content Reference

M

Target Key

4012

Comments