STIGQter STIGQter: STIG Summary: SLES 12 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.

DISA Rule

SV-217280r603964_rule

Vulnerability Number

V-217280

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

SLES-12-030260

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system SSH daemon to disable forwarded X connections for interactive users.

Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor):

X11Forwarding no

Check Contents

Determine if X11Forwarding is disabled with the following command:

# sudo grep -i x11forwarding /etc/ssh/sshd_config
X11Forwarding no

If the "X11Forwarding" keyword is set to "yes" and is not documented with the Information System Security Officer (ISSO) as an operational requirement, is missing, or is commented out, this is a finding.

Vulnerability Number

V-217280

Documentable

False

Rule Version

SLES-12-030260

Severity Override Guidance

Determine if X11Forwarding is disabled with the following command:

# sudo grep -i x11forwarding /etc/ssh/sshd_config
X11Forwarding no

If the "X11Forwarding" keyword is set to "yes" and is not documented with the Information System Security Officer (ISSO) as an operational requirement, is missing, or is commented out, this is a finding.

Check Content Reference

M

Target Key

4033

Comments