PHTN-67-000009 - The Photon operating system must configure sshd to use approved encryption algorithms.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.

OpenSSH on the Photon operating system is compiled with a FIPS-validated cryptographic module. The 'FipsMode' setting controls whether this module is initialized and used in FIPS 140-2 mode.

Satisfies: SRG-OS-000033-GPOS-00014, SRG-OS-000250-GPOS-00093, SRG-OS-000393-GPOS-00173, SRG-OS-000396-GPOS-00176, SRG-OS-000423-GPOS-00187

Solution

Open /etc/ssh/sshd_config with a text editor.

Ensure that the 'FipsMode' line is uncommented and set to the following:

FipsMode yes

At the command line, execute the following command:

# service sshd reload

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M04_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000068, CCI|CCI-001453, CCI|CCI-002418, CCI|CCI-002450, CCI|CCI-002890, Rule-ID|SV-239081r816597_rule, STIG-ID|PHTN-67-000009, Vuln-ID|V-239081

Plugin: Unix

Control ID: 4e4d06b1434b20d47fc30100976a7b939c794f0b148d6f0bf30f864b3e235b3f