SV-230252r646869_rule
V-230252
SRG-OS-000250-GPOS-00093
RHEL-08-010291
CAT II
10
Configure the RHEL 8 SSH daemon to use only ciphers employing FIPS 140-2-approved algorithms with the following command:
$ sudo fips-mode-setup --enable
Next, update the "/etc/crypto-policies/back-ends/openssh.config" and "/etc/crypto-policies/back-ends/opensshserver.config" files to include these ciphers employing FIPS 140-2-approved algorithms:
/etc/crypto-policies/back-ends/openssh.config:Ciphers aes256-ctr,aes192-ctr,aes128-ctr
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
A reboot is required for the changes to take effect.
Verify the SSH daemon is configured to use only ciphers employing FIPS 140-2-approved algorithms:
Verify that system-wide crypto policies are in effect:
$ sudo grep -i crypto_policy /etc/sysconfig/sshd
# crypto_policy=
If the "crypto_policy" is uncommented, this is a finding.
Verify which system-wide crypto policy is in use:
$ sudo update-crypto-policies --show
FIPS
Check that the ciphers in the back-end configurations are FIPS 140-2-approved algorithms with the following command:
$ sudo grep -i ciphers /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config
/etc/crypto-policies/back-ends/openssh.config:Ciphers aes256-ctr,aes192-ctr,aes128-ctr
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
If the cipher entries in the "openssh.config" and "opensshserver.config" files have any ciphers other than "aes256-ctr,aes192-ctr,aes128-ctr", the order differs from the example above, if they are missing, or commented out, this is a finding.
V-230252
False
RHEL-08-010291
Verify the SSH daemon is configured to use only ciphers employing FIPS 140-2-approved algorithms:
Verify that system-wide crypto policies are in effect:
$ sudo grep -i crypto_policy /etc/sysconfig/sshd
# crypto_policy=
If the "crypto_policy" is uncommented, this is a finding.
Verify which system-wide crypto policy is in use:
$ sudo update-crypto-policies --show
FIPS
Check that the ciphers in the back-end configurations are FIPS 140-2-approved algorithms with the following command:
$ sudo grep -i ciphers /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config
/etc/crypto-policies/back-ends/openssh.config:Ciphers aes256-ctr,aes192-ctr,aes128-ctr
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
/etc/crypto-policies/back-ends/opensshserver.config:CRYPTO_POLICY='-oCiphers=aes256-ctr,aes192-ctr,aes128-ctr'
If the cipher entries in the "openssh.config" and "opensshserver.config" files have any ciphers other than "aes256-ctr,aes192-ctr,aes128-ctr", the order differs from the example above, if they are missing, or commented out, this is a finding.
M
2921