Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-215221 | AIX7-00-001124 | SV-215221r508663_rule | High |
Description |
---|
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. |
STIG | Date |
---|---|
IBM AIX 7.x Security Technical Implementation Guide | 2021-11-19 |
Check Text ( C-16419r294114_chk ) |
---|
Determine if root has logged in over an unencrypted network connection: # last | grep "root " | egrep -v "reboot|console" | more root pts/1 10.74.17.76 Jul 4 16:44 - 17:39 (00:54) Next, determine if the SSH daemon is running: # ps -ef |grep sshd root 3670408 6029762 0 Jan 24 - 0:00 /usr/sbin/sshd If root has logged in over the network and SSHD is not running, this is a finding. |
Fix Text (F-16417r294115_fix) |
---|
If OpenSSH server is not installed, install it from the from AIX DVD Volume 1 using the following command (assuming that the DVD device is /dev/cd0): # installp -aXYgd /dev/cd0 -e /tmp/install.log openssh.base.server Start SSH server if it is not started: # startsrc -s sshd Enable SSH on the system and use it for all remote connections used to attain root access. Disable direct root remote login: # chsec -f /etc/security/user -s root -a rlogin=false |