STIGQter STIGQter: STIG Summary: SUSE Linux Enterprise Server 15 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The SUSE operating system must not allow unattended or automatic logon via SSH.

DISA Rule

SV-235032r622137_rule

Vulnerability Number

V-235032

Group Title

SRG-OS-000480-GPOS-00229

Rule Version

SLES-15-040440

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system disables unattended or automatic logon via SSH.

Add or edit the following lines in the "/etc/ssh/sshd_config" file:

PermitEmptyPasswords no
PermitUserEnvironment no

Check Contents

Verify the SUSE operating system disables unattended or automatic logon via SSH.

Check that unattended or automatic logon via SSH is disabled with the following command:

> sudo egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config

PermitEmptyPasswords no
PermitUserEnvironment no

If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or are commented out, this is a finding.

Vulnerability Number

V-235032

Documentable

False

Rule Version

SLES-15-040440

Severity Override Guidance

Verify the SUSE operating system disables unattended or automatic logon via SSH.

Check that unattended or automatic logon via SSH is disabled with the following command:

> sudo egrep '(Permit(.*?)(Passwords|Environment))' /etc/ssh/sshd_config

PermitEmptyPasswords no
PermitUserEnvironment no

If "PermitEmptyPasswords" or "PermitUserEnvironment" keywords are not set to "no", are missing completely, or are commented out, this is a finding.

Check Content Reference

M

Target Key

5274

Comments