5.2.21 Ensure SSH AllowTcpForwarding is disabled

Information

SSH port forwarding is a mechanism in SSH for tunneling application ports from the client
to the server, or servers to clients. It can be used for adding encryption to legacy
applications, going through firewalls, and some system administrators and IT professionals
use it for opening backdoors into the internal network from their home machines

Rationale:

Leaving port forwarding enabled can expose the organization to security risks and back-
doors.

SSH connections are protected with strong encryption. This makes their contents invisible
to most deployed network monitoring and traffic filtering solutions. This invisibility carries
considerable risk potential if it is used for malicious purposes such as data exfiltration.
Cybercriminals or malware could exploit SSH to hide their unauthorized communications,
or to exfiltrate stolen data from the target network

Solution

Edit the /etc/ssh/sshd_config file to set the parameter as follows:

AllowTcpForwarding no

Impact:

SSH tunnels are widely used in many corporate environments that employ mainframe
systems as their application backends. In those environments the applications themselves
may have very limited native support for security. By utilizing tunneling, compliance with
SOX, HIPAA, PCI-DSS, and other standards can be achieved without having to modify the
applications.

Default Value:

AllowTcpForwarding yes

See Also

https://workbench.cisecurity.org/files/2420

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-4, CSCv6|16, CSCv7|9.2

Plugin: Unix

Control ID: 9073272432e8824586fc90f363fa21b9651aa5303713fdbc77abcec1333ba622