AIX7-00-003100 - The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers - CBC

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.

Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information.

Solution

Edit the '/etc/ssh/sshd_config' file and add or edit a 'Ciphers' line like this:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr

Restart the SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000068, Rule-ID|SV-215402r508663_rule, STIG-ID|AIX7-00-003100, STIG-Legacy|SV-101343, STIG-Legacy|V-91243, Vuln-ID|V-215402

Plugin: Unix

Control ID: ea493b00a63a75b95c11a9d653623a36f4729c86543681b200be659ba843c844