GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.

Information

DoD information systems are required to use FIPS 140-2 approved ciphers. SSHv2 ciphers meeting this requirement are 3DES and AES.

Solution

Edit the SSH daemon configuration and remove any ciphers not starting with '3des' or 'aes' and remove any ciphers ending with 'cbc'. If necessary, add a 'Ciphers' line.

Ciphers aes256-ctr,aes192-ctr,aes128-ctr

Restart the SSH daemon.
# /sbin/service sshd restart

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(2), CAT|II, CCE|CCE-14491-5, CCI|CCI-000068, Group-ID|V-22458, Rule-ID|SV-37824r3_rule, STIG-ID|GEN005505, Vuln-ID|V-22458

Plugin: Unix

Control ID: 34b790149e1eb0377913298833d16f27bc4b9f4b5c1b5fc3045041417282bc80