STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.

DISA Rule

SV-216119r603268_rule

Vulnerability Number

V-216119

Group Title

SRG-OS-000163

Rule Version

SOL-11.1-040380

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

The root role is required.

Configure the system to disconnect SSH sessions after 10 minutes of inactivity.

Modify the sshd_config file:

# pfedit /etc/ssh/sshd_config

Modify or add the lines containing:

ClientAliveInterval
ClientAliveCountMax

Change them to:

ClientAliveInterval 600
ClientAliveCountMax 0

Restart the SSH service:

# svcadm restart svc:/network/ssh

Check Contents

Determine if SSH is configured to disconnect sessions after 10 minutes of inactivity.

# grep ClientAlive /etc/ssh/sshd_config

If the output of this command is not:

ClientAliveInterval 600
ClientAliveCountMax 0

this is a finding.

Vulnerability Number

V-216119

Documentable

False

Rule Version

SOL-11.1-040380

Severity Override Guidance

Determine if SSH is configured to disconnect sessions after 10 minutes of inactivity.

# grep ClientAlive /etc/ssh/sshd_config

If the output of this command is not:

ClientAliveInterval 600
ClientAliveCountMax 0

this is a finding.

Check Content Reference

M

Target Key

4021

Comments