APPL-14-000130 - The macOS system must configure SSHD unused connection timeout to 900.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If SSHD is enabled, it must be configured with unused connection timeout set to 900.

This will set the timeout when there are no open channels within a session.

Note: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.

Satisfies: SRG-OS-000163-GPOS-00072,SRG-OS-000279-GPOS-00109

Solution

Configure the macOS system to set the SSHD unused connection timeout to 900 with the following command:

include_dir=$(/usr/bin/awk '/^Include/ {print $2}' /etc/ssh/sshd_config | /usr/bin/tr -d '*')

if [[ -z $include_dir ]]; then
/usr/bin/sed -i.bk '1s/.*/Include /etc/ssh/sshd_config.d/*/' /etc/ssh/sshd_config
fi

/usr/bin/grep -qxF 'unusedconnectionetimeout 900' '${include_dir}01-mscp-sshd.conf' 2>/dev/null || echo 'unusedconnectionetimeout 900' >> '${include_dir}01-mscp-sshd.conf'

for file in $(ls ${include_dir}); do
if [[ '$file' == '100-macos.conf' ]]; then
continue
fi
if [[ '$file' == '01-mscp-sshd.conf' ]]; then
break
fi
/bin/mv ${include_dir}${file} ${include_dir}20-${file}
done

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_14_V2R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001133, CCI|CCI-002361, Rule-ID|SV-259447r970703_rule, STIG-ID|APPL-14-000130, Vuln-ID|V-259447

Plugin: Unix

Control ID: e7d5065f281dc257b17e9d70129bb35978230591a9b2a1deea0c6d9d9ec91b47