STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The SSH daemon must be configured to only use the SSHv2 protocol.

DISA Rule

SV-220108r603266_rule

Vulnerability Number

V-220108

Group Title

SRG-OS-000112

Rule Version

GEN005500

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Edit the configuration file and modify the Protocol line to look like:

Protocol 2

Reload sshd:
kill -HUP <PID of sshd>

Check Contents

Check the SSH daemon configuration for allowed protocol versions.

# grep -i protocol /etc/ssh/sshd_config | grep -v '^#'

If the variables Protocol 2,1 or Protocol 1 are defined on a line without a leading comment, this is a finding.

Vulnerability Number

V-220108

Documentable

False

Rule Version

GEN005500

Severity Override Guidance

Check the SSH daemon configuration for allowed protocol versions.

# grep -i protocol /etc/ssh/sshd_config | grep -v '^#'

If the variables Protocol 2,1 or Protocol 1 are defined on a line without a leading comment, this is a finding.

Check Content Reference

M

Target Key

4061

Comments