STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.

DISA Rule

SV-215306r508663_rule

Vulnerability Number

V-215306

Group Title

SRG-OS-000480-GPOS-00232

Rule Version

AIX7-00-002124

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the SSH daemon config file and add/modify the "ListenAddress" network addresses:
# vi /etc/ssh/sshd_config

Restart SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd

Check Contents

From the command prompt, run the following command to check if "ListenAddress" is defined in SSH config file:

# grep -i ListenAddress /etc/ssh/sshd_config | grep -v '^#'
ListenAddress 10.17.76.74

If no configuration is returned, or if a returned listen configuration contains addresses not permitted, this is a finding.

Vulnerability Number

V-215306

Documentable

False

Rule Version

AIX7-00-002124

Severity Override Guidance

From the command prompt, run the following command to check if "ListenAddress" is defined in SSH config file:

# grep -i ListenAddress /etc/ssh/sshd_config | grep -v '^#'
ListenAddress 10.17.76.74

If no configuration is returned, or if a returned listen configuration contains addresses not permitted, this is a finding.

Check Content Reference

M

Target Key

4012

Comments