GEN005507 - The SSH daemon must be configured to only use MACs employing FIPS 140-2 approved cryptographic hash algorithms

Information

DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the SSH daemon configuration and remove any MACs that are not hmac-sha1 or a better hmac algorithm that is on the FIPS 140-2 approved list. If necessary, add a MACs line.

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-001453, Rule-ID|SV-35220r2_rule, STIG-ID|GEN005507, Vuln-ID|V-22460

Plugin: Unix

Control ID: 9b8319e9594339f05eedab837a12fa9225cadf98f9314d8114aa2f81042934a6