GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.

Solution

Edit the configuration file and modify the Protocol line to look like:

Protocol 2

Reload sshd:
kill -HUP <PID of sshd>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R2_STIG.zip

Item Details

References: CAT|I, CCI|CCI-001941, Rule-ID|SV-220055r603265_rule, STIG-ID|GEN005500, STIG-Legacy|SV-39817, STIG-Legacy|V-4295, Vuln-ID|V-220055

Plugin: Unix

Control ID: 132348d66b02aff1d458f1fb04d6bc73a60983a5550d6f16de98f0bddb13d840