SV-207611r378610_rule
V-207611
SRG-OS-000033-VMM-000140
ESXI-65-000010
CAT II
10
Limit the ciphers to those algorithms which are FIPS-approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.
From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in "/etc/ssh/sshd_config":
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command from an SSH session connected to the ESXi host, or from the ESXi shell:
# grep -i "^Ciphers" /etc/ssh/sshd_config
If there is no output or the output is not exactly "Ciphers aes128-ctr,aes192-ctr,aes256-ctr", this is a finding.
V-207611
False
ESXI-65-000010
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command from an SSH session connected to the ESXi host, or from the ESXi shell:
# grep -i "^Ciphers" /etc/ssh/sshd_config
If there is no output or the output is not exactly "Ciphers aes128-ctr,aes192-ctr,aes256-ctr", this is a finding.
M
2925