Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-214878 | AOSX-13-000570 | SV-214878r507075_rule | Medium |
Description |
---|
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058, SRG-OS-000396-GPOS-00176 |
STIG | Date |
---|---|
Apple OS X 10.13 Security Technical Implementation Guide | 2020-09-11 |
Check Text ( C-16078r397206_chk ) |
---|
To check which protocol is configured for sshd, run the following: /usr/bin/sudo /usr/bin/grep ^Protocol /etc/ssh/sshd_config If there is no result or the result is not "Protocol 2", this is a finding. |
Fix Text (F-16076r397207_fix) |
---|
To ensure that "Protocol 2" is used by sshd, run the following command: /usr/bin/sudo /usr/bin/sed -i.bak 's/.*Protocol.*/Protocol 2/' /etc/ssh/sshd_config |