AIX7-00-002110 - AIX must setup SSH daemon to disable revoked public keys.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates).

Solution

Obtain the file that contains all the public keys that need to be revoked from ISSO/SA and save the file in /etc/ssh/ directory.

Edit the '/etc/ssh/sshd_config' file to allow 'RevokedKeys' to point to the revoked key file obtained above.

Restart the SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001991, Rule-ID|SV-215293r508663_rule, STIG-ID|AIX7-00-002110, STIG-Legacy|SV-101647, STIG-Legacy|V-91549, Vuln-ID|V-215293

Plugin: Unix

Control ID: 17dc6b9d4240cc9e21531483fffe021ba92ed8aff69d1f118772da2bc885b0b8