SV-100347r1_rule
V-89697
SRG-OS-000113-GPOS-00058
VRAU-SL-000715
CAT II
10
Configure the SLES for vRealize to enforce SSHv2 for network access to non-privileged accounts by running the following commands:
# sed -i 's/^.*\bProtocol\b.*$/Protocol 2/' /etc/ssh/sshd_config
Restart the ssh service:
# service sshd restart
Verify that the SLES for vRealize enforces SSHv2 for network access to privileged accounts by running the following command:
Replace [ADDRESS] in the following command with the correct IP address based on the current system configuration.
# ssh -1 [ADDRESS]
An example of the command usage is as follows:
# ssh -1 localhost
The output must be one of the following items:
Protocol major versions differ: 1 vs. 2
OR:
Protocol 1 not allowed in the FIPS mode.
If the output is not one of the above, this is a finding.
OR
Verify that the ssh is configured to enforce SSHv2 for network access to privileged accounts by running the following command:
# grep Protocol /etc/ssh/sshd_config
If the result is not "Protocol 2", this is a finding.
V-89697
False
VRAU-SL-000715
Verify that the SLES for vRealize enforces SSHv2 for network access to privileged accounts by running the following command:
Replace [ADDRESS] in the following command with the correct IP address based on the current system configuration.
# ssh -1 [ADDRESS]
An example of the command usage is as follows:
# ssh -1 localhost
The output must be one of the following items:
Protocol major versions differ: 1 vs. 2
OR:
Protocol 1 not allowed in the FIPS mode.
If the output is not one of the above, this is a finding.
OR
Verify that the ssh is configured to enforce SSHv2 for network access to privileged accounts by running the following command:
# grep Protocol /etc/ssh/sshd_config
If the result is not "Protocol 2", this is a finding.
M
3459