ESXI-65-000018 - The ESXi host SSH daemon must not permit GSSAPI authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system's GSSAPI to remote hosts, increasing the attack surface of the system.

Solution

From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in '/etc/ssh/sshd_config':

GSSAPIAuthentication no

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CAT|III, CCI|CCI-000366, Rule-ID|SV-207619r388482_rule, STIG-ID|ESXI-65-000018, STIG-Legacy|SV-104069, STIG-Legacy|V-93983, Vuln-ID|V-207619

Plugin: Unix

Control ID: 361f0907022814324ad8472426002365f4f7f3f5b26d19e1f440111ab452ea12