AIX7-00-002104 - The AIX SSH server must use SSH Protocol 2.


Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.

Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information.


Add or edit the following line in the '/etc/ssh/sshd_config' file to support 'Protocol 2' only:
Protocol 2

Save the change to /etc/ssh/sshd_config

Restart ssh daemon:
# stopsrc -s sshd
# startsrc -s sshd

See Also

Item Details


References: 800-53|AC-17(2), CAT|II, CCI|CCI-000068, Rule-ID|SV-215289r508663_rule, STIG-ID|AIX7-00-002104, STIG-Legacy|SV-101345, STIG-Legacy|V-91245, Vuln-ID|V-215289

Plugin: Unix

Control ID: bf505993ab8bfd23a68d2bd17cb39104251c848cdf34d810b5d1a9468dc321ef