STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions.

DISA Rule

SV-99339r1_rule

Vulnerability Number

V-88689

Group Title

SRG-OS-000393-GPOS-00173

Rule Version

VROM-SL-001225

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Update the Ciphers directive with the following command:

# sed -i '/^[^#]*Ciphers/ c\Ciphers aes256-ctr,aes128-ctr' /etc/ssh/sshd_config

Save and close the file. Restart the sshd process:

# service sshd restart

Check Contents

Check the SSH daemon configuration for DoD-approved encryption to protect the confidentiality of SSH remote connections by performing the following commands:

Check the Cipher setting in the "sshd_config" file.

# grep -i Ciphers /etc/ssh/sshd_config | grep -v '#'

The output must contain either none or any number of the following algorithms:

aes128-ctr, aes256-ctr.

If the output contains an algorithm not listed above, this is a finding.

Expected Output:
Ciphers aes256-ctr,aes128-ctr

Vulnerability Number

V-88689

Documentable

False

Rule Version

VROM-SL-001225

Severity Override Guidance

Check the SSH daemon configuration for DoD-approved encryption to protect the confidentiality of SSH remote connections by performing the following commands:

Check the Cipher setting in the "sshd_config" file.

# grep -i Ciphers /etc/ssh/sshd_config | grep -v '#'

The output must contain either none or any number of the following algorithms:

aes128-ctr, aes256-ctr.

If the output contains an algorithm not listed above, this is a finding.

Expected Output:
Ciphers aes256-ctr,aes128-ctr

Check Content Reference

M

Target Key

3461

Comments