GEN005533 - The SSH daemon must limit connections to a single session.

Information

The SSH protocol has the ability to provide multiple sessions over a single connection without reauthentication. A compromised client could use this feature to establish additional sessions to a system without consent or knowledge of the user. Alternate per-connection session limits may be documented if needed for a valid mission requirement. Greater limits are expected to be necessary in situations where TCP or X11 forwarding are used.

Solution

Edit the SSH daemon configuration and add or edit the MaxSessions setting value to 1.

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|III, CCI|CCI-000054, Rule-ID|SV-26776r1_rule, STIG-ID|GEN005533, Vuln-ID|V-22482

Plugin: Unix

Control ID: 67fd319e4d9bbfce472bbcd32cc0854e8d3e7a088336f1491ca13781a98f51e3