Information
The operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
Rationale:
If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as another user.
Solution
Uncomment the StrictModes keyword in /etc/ssh/sshd_config (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to yes:
Example: vim /etc/ssh/sshd_config
Add, uncomment or update the following line:
StrictModes yes
The SSH service must be restarted for changes to take effect.
# systemctl restart sshd.service
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72263
Rule ID: SV-86887r3_rule
STIG ID: RHEL-07-040450
Severity: CAT II