UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must be configured to timeout after 60 seconds or less for incomplete or broken SSH sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-5612 NET1645 SV-28744r2_rule Medium
Description
An attacker may attempt to connect to the device using SSH by guessing the authentication method, encryption algorithm, and keys. Limiting the amount of time allowed for authenticating and negotiating the SSH session reduces the window of opportunity for the malicious user attempting to make a connection to the network element.
STIG Date
Perimeter Router Security Technical Implementation Guide Juniper 2017-06-29

Details

Check Text ( C-29028r3_chk )
Review the configuration and verify the timeout is set for 60 seconds or less. The SSH service terminates the connection if protocol negotiation (that includes user authentication) is not complete within this timeout period.


system {
login {
retry-options {
tries-before-disconnect 3;
maximum-time 60;
}
Fix Text (F-5523r5_fix)
Configure the network devices so it will require a secure shell timeout of 60 seconds or less.