STIGQter STIGQter: STIG Summary: Solaris 10 SPARC Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The SSH daemon must be configured for IP filtering.

DISA Rule

SV-227000r603265_rule

Vulnerability Number

V-227000

Group Title

SRG-OS-000480

Rule Version

GEN005540

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.

Check Contents

Check the TCP wrappers configuration files to determine if SSHD is configured to use TCP wrappers.

Procedure:
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.deny
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.allow

If neither of the hosts.deny or hosts.allow files exist, this is a finding.
If no entries are returned, the TCP wrappers are not configured for SSHD, this is a finding.

Vulnerability Number

V-227000

Documentable

False

Rule Version

GEN005540

Severity Override Guidance

Check the TCP wrappers configuration files to determine if SSHD is configured to use TCP wrappers.

Procedure:
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.deny
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.allow

If neither of the hosts.deny or hosts.allow files exist, this is a finding.
If no entries are returned, the TCP wrappers are not configured for SSHD, this is a finding.

Check Content Reference

M

Target Key

4060

Comments