SV-230251r646866_rule
V-230251
SRG-OS-000250-GPOS-00093
RHEL-08-010290
CAT II
10
Configure the RHEL 8 SSH daemon to use only MACs employing FIPS 140-2-approved algorithms with the following commands:
$ sudo fips-mode-setup --enable
Next, update the "/etc/crypto-policies/back-ends/openssh.config"
and "/etc/crypto-policies/back-ends/opensshserver.config" files to include these MACs employing FIPS 140-2-approved algorithms:
/etc/crypto-policies/back-ends/openssh.config:MACs hmac-sha2-512,hmac-sha2-256
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
A reboot is required for the changes to take effect.
Verify the SSH daemon is configured to use only MACs employing FIPS 140-2-approved algorithms:
Verify that system-wide crypto policies are in effect:
$ sudo grep -i crypto_policy /etc/sysconfig/sshd
# crypto_policy=
If the "crypto_policy" is uncommented, this is a finding.
Verify which system-wide crypto policy is in use:
$ sudo update-crypto-policies --show
FIPS
Check that the MACs in the back-end configurations are FIPS 140-2-approved algorithms with the following command:
$ sudo grep -i macs /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config
/etc/crypto-policies/back-ends/openssh.config:MACs hmac-sha2-512,hmac-sha2-256
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
If the MAC entries in the "openssh.config" and "opensshserver.config" files have any hashes other than "hmac-sha2-512" and "hmac-sha2-256", the order differs from the example above, if they are missing, or commented out, this is a finding.
V-230251
False
RHEL-08-010290
Verify the SSH daemon is configured to use only MACs employing FIPS 140-2-approved algorithms:
Verify that system-wide crypto policies are in effect:
$ sudo grep -i crypto_policy /etc/sysconfig/sshd
# crypto_policy=
If the "crypto_policy" is uncommented, this is a finding.
Verify which system-wide crypto policy is in use:
$ sudo update-crypto-policies --show
FIPS
Check that the MACs in the back-end configurations are FIPS 140-2-approved algorithms with the following command:
$ sudo grep -i macs /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config
/etc/crypto-policies/back-ends/openssh.config:MACs hmac-sha2-512,hmac-sha2-256
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256'
If the MAC entries in the "openssh.config" and "opensshserver.config" files have any hashes other than "hmac-sha2-512" and "hmac-sha2-256", the order differs from the example above, if they are missing, or commented out, this is a finding.
M
2921