ESXI-06-100010 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.

Information

Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance. Note: That this does not imply FIPS 140-2 certification.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Limit the ciphers to those algorithms which are FIPS-approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.

Add or correct the following line in '/etc/ssh/sshd_config':

Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_ESXi_V1R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002450, Group-ID|V-63501, Rule-ID|SV-77991r2_rule, STIG-ID|ESXI-06-100010

Plugin: VMware

Control ID: ae1f03a553c8117f29ad028850553235da18914efe6f028f8b031a08d9301b9d