UCF STIG Viewer Logo

The macOS system must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.


Overview

Finding ID Version Rule ID IA Controls Severity
V-214878 AOSX-13-000570 SV-214878r609363_rule Medium
Description
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058, SRG-OS-000396-GPOS-00176
STIG Date
Apple OS X 10.13 Security Technical Implementation Guide 2021-11-19

Details

Check Text ( C-16078r397206_chk )
To check which protocol is configured for sshd, run the following:

/usr/bin/sudo /usr/bin/grep ^Protocol /etc/ssh/sshd_config

If there is no result or the result is not "Protocol 2", this is a finding.
Fix Text (F-16076r397207_fix)
To ensure that "Protocol 2" is used by sshd, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/.*Protocol.*/Protocol 2/' /etc/ssh/sshd_config