GEN005505 - The operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

DoD information systems are required to use FIPS 140-2 approved ciphers. SSHv2 ciphers meeting this requirement are 3DES and AES.

By specifying a cipher list with the order of ciphers being in a 'strongest to weakest' orientation, the system will automatically attempt to use the strongest cipher for securing SSH connections.

Satisfies: SRG-OS-000033, SRG-OS-000505, SRG-OS-000555

Solution

Edit /etc/ssh/sshd_config and change or set the Ciphers line to the following.

Ciphers aes256-ctr, aes192-ctr, aes128-ctr

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-000068, Rule-ID|SV-226986r603852_rule, STIG-ID|GEN005505, STIG-Legacy|SV-41035, STIG-Legacy|V-22458, Vuln-ID|V-226986

Plugin: Unix

Control ID: 819fc0a5700a14b049b5052ab9aab487fa6a01059b12288f312386dacd585f2e