APPL-15-000051 - The macOS system must configure SSHD ClientAliveInterval to 900.

Information

If SSHD is enabled, it must be configured with the Client Alive Interval set to 900.

This sets a timeout interval in seconds, after which if no data has been received from the client, sshd(8) will send a message through the encrypted channel to request a response from the client.

This setting works in conjunction with ClientAliveCountMax to determine the termination of the connection after the threshold has been reached.

NOTE: This setting is not intended to manage idle user sessions where there is no input from the client. Its purpose is to monitor for interruptions in network connectivity and force the session to terminate after the connection appears to be broken.

NOTE: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.

Solution

Configure the macOS system to set the SSHD ClientAliveInterval to 900 with the following command:

include_dir=$(/usr/bin/awk '/^Include/ {print $2}' /etc/ssh/sshd_config | /usr/bin/tr -d '*')

if [[ -z $include_dir ]]; then
/usr/bin/sed -i.bk '1s/.*/Include /etc/ssh/sshd_config.d/*/' /etc/ssh/sshd_config
fi

/usr/bin/grep -qxF 'clientaliveinterval 900' '${include_dir}01-mscp-sshd.conf' 2>/dev/null || echo 'clientaliveinterval 900' >> '${include_dir}01-mscp-sshd.conf'

for file in $(ls ${include_dir}); do
if [[ '$file' == '100-macos.conf' ]]; then
continue
fi
if [[ '$file' == '01-mscp-sshd.conf' ]]; then
break
fi
/bin/mv ${include_dir}${file} ${include_dir}20-${file}
done

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_15_V1R1_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-10, CAT|II, CCI|CCI-001133, Rule-ID|SV-268435r1034245_rule, STIG-ID|APPL-15-000051, Vuln-ID|V-268435

Plugin: Unix

Control ID: 3b4d1d1a09153f01e37eed7a500113904f8dd270ed0641edd08d7d16ec97d63c