UCF STIG Viewer Logo

The SSH client must be configured to only use the SSHv2 protocol.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22456 GEN005501 SV-37820r1_rule DCPP-1 Medium
Description
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH client could provide access to the system with the privileges of the user running the client.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-32289r1_fix)
Edit the /etc/ssh/ssh_config file and add or edit a "Protocol" configuration line not allowing versions less than 2.