Information
Teh operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
Rationale:
If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection, potentially with root privileges.
Solution
Uncomment the Compression keyword in /etc/ssh/sshd_config (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) on the system and set the value to delayed or no:
Example: vim /etc/ssh/sshd_config
Add, uncomment or update the following line:
Compression no
The SSH service must be restarted for changes to take effect.
# systemctl restart sshd.service
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72267
Rule ID: SV-86891r3_rule
STIG ID: RHEL-07-040470
Severity: CAT II