3.6.1.5 Ensure SSH PermitEmptyPasswords is disabled

Information

The recommendation is to edit the /etc/ssh/sshd_config file to ensure that the SSH daemon does not authenticate users with a null password.

Rationale:

If password authentication is used and an account has an empty password, the SSH server must be configured to disallow access to the account. Permitting empty passwords could create an easy path of access for hackers to enter the system.

Solution

Edit the /etc/ssh/sshd_config file to disable the acceptance null passwords:

vi /etc/ssh/sshd_config

Replace:

#PermitEmptyPasswords no

With:

PermitEmptyPasswords no

Re-cycle the sshd daemon to pick up the configuration changes:

stopsrc -s sshd
startsrc -s sshd

Default Value:

PermitEmptyPasswords no

See Also

https://workbench.cisecurity.org/files/4119

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1), CSCv7|16.3

Plugin: Unix

Control ID: 92c0ea024ba320435c1aabf2ab67e9cb12a10ff40363ed2affae86a58d6b70b0