GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.

Information

SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.

Solution

Edit the sshd_config file and set the 'Protocol' setting to '2'.

If using the F-Secure SSH server, set the 'Ssh1Compatibility' setting to 'no'.

Restart the SSH daemon.
# /sbin/service sshd restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-17(8), 800-53|IA-5(1)(c), CAT|I, CCI|CCI-000197, CCI|CCI-001436, Rule-ID|SV-218597r603259_rule, STIG-ID|GEN005500, STIG-Legacy|SV-63543, STIG-Legacy|V-4295, Vuln-ID|V-218597

Plugin: Unix

Control ID: 73675a5f7e68e4c14ebc9db7e4c19396916ce94bf8db9fc4cf808ba497ebc8f3