STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

AIX must turn on SSH daemon reverse name checking.

DISA Rule

SV-215298r508663_rule

Vulnerability Number

V-215298

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-002115

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the "/etc/sshd/sshd_config" file and add the following line:
VerifyReverseMapping yes

Restart the SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd

Check Contents

Check the SSH daemon configuration for the "VerifyReverseMapping" setting using command:

# grep -i VerifyReverseMapping /etc/ssh/sshd_config | grep -v '^#'
VerifyReverseMapping yes

If the setting is not present or the setting is "no", this is a finding.

Vulnerability Number

V-215298

Documentable

False

Rule Version

AIX7-00-002115

Severity Override Guidance

Check the SSH daemon configuration for the "VerifyReverseMapping" setting using command:

# grep -i VerifyReverseMapping /etc/ssh/sshd_config | grep -v '^#'
VerifyReverseMapping yes

If the setting is not present or the setting is "no", this is a finding.

Check Content Reference

M

Target Key

4012

Comments