OL07-00-040390 - The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use the SSHv2 protocol.

Information

SSHv1 is an insecure implementation of the SSH protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.

Satisfies: SRG-OS-000074-GPOS-00042, SRG-OS-000480-GPOS-00227

Solution

Remove all Protocol lines that reference version '1' in '/etc/ssh/sshd_config' (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). The 'Protocol' line must be as follows:

Protocol 2

The SSH service must be restarted for changes to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_7_V2R14_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|I, CCI|CCI-000197, Rule-ID|SV-221856r877396_rule, STIG-ID|OL07-00-040390, STIG-Legacy|SV-108555, STIG-Legacy|V-99451, Vuln-ID|V-221856

Plugin: Unix

Control ID: 20c79ac05f714f220b7e10911aced0d613ae818536ae2477c0cd1e469331f0b2