UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215292 AIX7-00-002108 SV-215292r508663_rule Medium
Description
GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system's GSSAPI to remote hosts, increasing the attack surface of the system. GSSAPI authentication must be disabled unless needed.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2021-11-19

Details

Check Text ( C-16490r294327_chk )
Ask the SA if GSSAPI authentication is used for SSH authentication to the system. If so, this is not applicable.

Check the SSH daemon configuration for the GSSAPI authentication setting:

# grep -i GSSAPIAuthentication /etc/ssh/sshd_config | grep -v '^#'
GSSAPIAuthentication no

If the setting is not set to "no", this is a finding.
Fix Text (F-16488r294328_fix)
Edit "/etc/ssh/sshd_config" and remove the "GSSAPIAuthentication" setting or change the value to "no".

Refresh sshd:
# stopsrc -s sshd
# startsrc -s sshd