UCF STIG Viewer Logo

The operating system must use organization-defined replay-resistant authentication mechanisms for network access to privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-51523 OSX8-00-00570 SV-65733r1_rule Medium
Description
An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using challenges (e.g., TLS, WS_Security), time synchronous, or challenge-response one-time authenticators.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53859r1_chk )
To check which protocol is configured for sshd, run the following:

grep ^Protocol /etc/sshd_config | awk '{ print $2 }'

If there is no result or the result is not "2", this is a finding.
Fix Text (F-56329r1_fix)
In order to make sure that "Protocol 2" is used by sshd, run the following command:

sudo sed -i.bak 's/.*Protocol.*/Protocol 2/' /etc/sshd_config