RHEL-06-000227 - The SSH daemon must be configured to use only the SSHv2 protocol.

Information

SSH protocol version 1 suffers from design flaws that result in security vulnerabilities and should not be used.

Solution

Only SSH protocol version 2 connections should be permitted. The default setting in '/etc/ssh/sshd_config' is correct, and can be verified by ensuring that the following line appears:

Protocol 2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(8), CAT|I, CCI|CCI-001941, Rule-ID|SV-217994r603264_rule, STIG-ID|RHEL-06-000227, STIG-Legacy|SV-50408, STIG-Legacy|V-38607, Vuln-ID|V-217994

Plugin: Unix

Control ID: 4804a2838cdbc59a1b7bb53ae221c8a8357d07942795aeaf6de7a9a319c2d34d