STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 ESXi Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The ESXi host SSH daemon must be configured to only use FIPS 140-2 approved ciphers.

DISA Rule

SV-239331r674922_rule

Vulnerability Number

V-239331

Group Title

SRG-OS-000478-VMM-001980

Rule Version

ESXI-67-100010

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Limit the ciphers to algorithms that are FIPS approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.

Add or correct the following line in "/etc/ssh/sshd_config":

Ciphers aes128-ctr,aes192-ctr,aes256-ctr

Check Contents

Verify that only FIPS-approved ciphers are used by running the following command:

# grep -i "^Ciphers" /etc/ssh/sshd_config

If there is no output, or the output is not exactly "Ciphers aes128-ctr,aes192-ctr,aes256-ctr", this is a finding.

Vulnerability Number

V-239331

Documentable

False

Rule Version

ESXI-67-100010

Severity Override Guidance

Verify that only FIPS-approved ciphers are used by running the following command:

# grep -i "^Ciphers" /etc/ssh/sshd_config

If there is no output, or the output is not exactly "Ciphers aes128-ctr,aes192-ctr,aes256-ctr", this is a finding.

Check Content Reference

M

Target Key

5326

Comments