SV-238216r654316_rule
V-238216
SRG-OS-000424-GPOS-00188
UBTU-20-010043
CAT II
10
Configure the Ubuntu operating system to allow the SSH daemon to only use MACs that employ FIPS 140-2 approved ciphers.
Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor):
MACs hmac-sha2-512,hmac-sha2-256
Restart the SSH daemon for the changes to take effect:
$ sudo systemctl reload sshd.service
Verify the SSH daemon is configured to only use MACs that employ FIPS 140-2 approved ciphers with the following command:
$ grep -i macs /etc/ssh/sshd_config
MACs hmac-sha2-512,hmac-sha2-256
If any ciphers other than "hmac-sha2-512" or "hmac-sha2-256" are listed, the order differs from the example above, or the returned line is commented out, this is a finding.
V-238216
False
UBTU-20-010043
Verify the SSH daemon is configured to only use MACs that employ FIPS 140-2 approved ciphers with the following command:
$ grep -i macs /etc/ssh/sshd_config
MACs hmac-sha2-512,hmac-sha2-256
If any ciphers other than "hmac-sha2-512" or "hmac-sha2-256" are listed, the order differs from the example above, or the returned line is commented out, this is a finding.
M
5318