SOL-11.1-040340 - Consecutive login attempts for SSH must be limited to 3.

Information

Setting the authentication login limit to a low value will disconnect the attacker and force a reconnect, which severely limits the speed of such brute-force attacks.

Solution

The root role is required.

Modify the sshd_config file.

# pfedit /etc/ssh/sshd_config

Locate the lines containing:

MaxAuthTries
MaxAuthTriesLog

Change them to:

MaxAuthTries 6
MaxAuthTriesLog 6

Restart the SSH service.

# svcadm restart svc:/network/ssh

Note: Solaris SSH MaxAuthTries of 6 maps to 3 actual failed attempts.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V3R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216352r1155799_rule, STIG-ID|SOL-11.1-040340, STIG-Legacy|SV-60971, STIG-Legacy|V-48099, Vuln-ID|V-216352

Plugin: Unix

Control ID: 031124fa2a4b469dc941f499f9c3c81cdbb3ec2c77a9a4a916ac808196c01a51