GEN005501 - The SSH client must be configured to only use the SSHv2 protocol.

Information

SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH client could provide access to the system with the privileges of the user running the client.

Solution

Edit the /etc/ssh/ssh_config file and add or edit a 'Protocol' configuration line not allowing versions less than 2.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-17(8), 800-53|IA-5(1)(c), CAT|II, CCI|CCI-000197, CCI|CCI-001436, Rule-ID|SV-218598r603259_rule, STIG-ID|GEN005501, STIG-Legacy|SV-63547, STIG-Legacy|V-22456, Vuln-ID|V-218598

Plugin: Unix

Control ID: 169bd54ef47447367168a74219b8e46d41af960c3ea0b733b640505fc4ba5516