SV-238217r653826_rule
V-238217
SRG-OS-000424-GPOS-00188
UBTU-20-010044
CAT II
10
Configure the Ubuntu operating system to allow the SSH daemon to only implement FIPS-approved algorithms.
Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor):
Ciphers aes256-ctr,aes192-ctr,aes128-ctr
Restart the SSH daemon for the changes to take effect:
$ sudo systemctl restart sshd.service
Verify the SSH daemon is configured to only implement FIPS-approved algorithms by running the following command:
$ grep -E 'Ciphers ' /etc/ssh/sshd_config
Ciphers aes256-ctr,aes192-ctr, aes128-ctr
If any ciphers other than "aes256-ctr", "aes192-ctr", or "aes128-ctr" are listed, the order differs from the example above, the "Ciphers" keyword is missing, or the returned line is commented out, this is a finding.
V-238217
False
UBTU-20-010044
Verify the SSH daemon is configured to only implement FIPS-approved algorithms by running the following command:
$ grep -E 'Ciphers ' /etc/ssh/sshd_config
Ciphers aes256-ctr,aes192-ctr, aes128-ctr
If any ciphers other than "aes256-ctr", "aes192-ctr", or "aes128-ctr" are listed, the order differs from the example above, the "Ciphers" keyword is missing, or the returned line is commented out, this is a finding.
M
5318