STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must not allow unattended or automatic login via SSH.

DISA Rule

SV-238218r653829_rule

Vulnerability Number

V-238218

Group Title

SRG-OS-000480-GPOS-00229

Rule Version

UBTU-20-010047

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to allow the SSH daemon to not allow unattended or automatic login to the system.

Add or edit the following lines in the "/etc/ssh/sshd_config" file:

PermitEmptyPasswords no
PermitUserEnvironment no

Restart the SSH daemon for the changes to take effect:

$ sudo systemctl restart sshd.service

Check Contents

Verify that unattended or automatic login via SSH is disabled with the following command:

$ egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config

PermitEmptyPasswords no
PermitUserEnvironment no

If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or are commented out, this is a finding.

Vulnerability Number

V-238218

Documentable

False

Rule Version

UBTU-20-010047

Severity Override Guidance

Verify that unattended or automatic login via SSH is disabled with the following command:

$ egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config

PermitEmptyPasswords no
PermitUserEnvironment no

If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or are commented out, this is a finding.

Check Content Reference

M

Target Key

5318

Comments