SRG-OS-000113-ESXI5 - The operating system must use organization-defined replay-resistant authentication mechanisms for network access to non-privileged accounts.

Information

An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message.

Techniques used to address this include protocols using challenges (e.g., TLS, WS_Security), time synchronous, or challenge-response one-time authenticators.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Disable lock down mode.
Enable the ESXi Shell.

Edit the SSH client configuration and add/modify the 'Protocol' configuration for Protocol 2 only.
# vi /etc/ssh/ssh_config

Re-enable lock down mode.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Group-ID|V-39413, Rule-ID|SV-250631r798892_rule, STIG-ID|SRG-OS-000113-ESXI5, STIG-Legacy|SV-51271, STIG-Legacy|V-39413, Vuln-ID|V-250631

Plugin: VMware

Control ID: 4a44c374d17db17daf7176e2f80e03e605c851b6f9d2fc842cd61bef77f7b990