GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.

Information

SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.

Solution

Edit the sshd_config file and set the 'Protocol' setting to '2'. If using the F-Secure SSH server, set the 'Ssh1Compatibility' setting to 'no'.

Restart the SSH daemon.
# /sbin/service sshd restart

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(8), CAT|I, CCE|CCE-4325-7, CCI|CCI-001436, Group-ID|V-4295, Rule-ID|SV-37818r2_rule, STIG-ID|GEN005500, Vuln-ID|V-4295

Plugin: Unix

Control ID: e8869e89a8aae4cc4408a062b0d88adc582185a6f775e823d1c5ef647d35c673