SV-219561r603343_rule
V-219561
SRG-OS-000250
OL6-00-000243
CAT II
10
Limit the ciphers to those algorithms which are FIPS-approved. The following line in "/etc/ssh/sshd_config" demonstrates use of FIPS-approved ciphers:
Ciphers 256-ctr,aes192-ctr,aes128-ctr
Note: The man page "sshd_config(5)" contains a list of supported ciphers.
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command:
# grep -i Ciphers /etc/ssh/sshd_config
Ciphers aes256-ctr,aes192-ctr,aes128-ctr
If any ciphers other than "aes256-ctr", "aes192-ctr", or "aes128-ctr" are listed, the order differs from the example above, the "Ciphers" keyword is missing, or the returned line is commented out, this is a finding.
V-219561
False
OL6-00-000243
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command:
# grep -i Ciphers /etc/ssh/sshd_config
Ciphers aes256-ctr,aes192-ctr,aes128-ctr
If any ciphers other than "aes256-ctr", "aes192-ctr", or "aes128-ctr" are listed, the order differs from the example above, the "Ciphers" keyword is missing, or the returned line is commented out, this is a finding.
M
2928