GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.

Solution

Edit the configuration file and modify the Protocol line to look like:

Protocol 2

Reload sshd:
kill -HUP <PID of sshd>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

References: CAT|I, CCI|CCI-001941, Rule-ID|SV-220108r603266_rule, STIG-ID|GEN005500, STIG-Legacy|SV-39817, STIG-Legacy|V-4295, Vuln-ID|V-220108

Plugin: Unix

Control ID: 08c1fd2f139b444ab7e58c05e27f65d47bd2f497630f6b32f1ce5e9ac46979c4