OL6-00-000243 - The SSH daemon must be configured to use only FIPS 140-2 approved ciphers.

Information

Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance.

Solution

Limit the ciphers to those algorithms which are FIPS-approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode. The following line in '/etc/ssh/sshd_config' demonstrates use of FIPS-approved ciphers:

Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc

The man page 'sshd_config(5)' contains a list of supported ciphers.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V1R17_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-001144, Group-ID|V-50807, Rule-ID|SV-65013r1_rule, STIG-ID|OL6-00-000243, Vuln-ID|V-50807

Plugin: Unix

Control ID: aa40c61210d5a0acdcc3f1bcf243217171cef59f5b4486b0daa2bbed7c9b0c60