SV-219314r610963_rule
V-219314
SRG-OS-000480-GPOS-00229
UBTU-18-010424
CAT I
10
Configure the Ubuntu operating system to allow the SSH daemon to not allow unattended or automatic login to the system.
Add or edit the following lines in the "/etc/ssh/sshd_config" file:
PermitEmptyPasswords no
PermitUserEnvironment no
In order for the changes to take effect, the SSH daemon must be restarted.
# sudo systemctl restart sshd.service
Verify that unattended or automatic login via ssh is disabled.
Check that unattended or automatic login via ssh is disabled with the following command:
# egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config
PermitEmptyPasswords no
PermitUserEnvironment no
If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or they are commented out, this is a finding.
V-219314
False
UBTU-18-010424
Verify that unattended or automatic login via ssh is disabled.
Check that unattended or automatic login via ssh is disabled with the following command:
# egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config
PermitEmptyPasswords no
PermitUserEnvironment no
If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or they are commented out, this is a finding.
M
4055