UCF STIG Viewer Logo

The SSH daemon must be configured to use only the SSHv2 protocol.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38607 RHEL-06-000227 SV-50408r1_rule High
Description
SSH protocol version 1 suffers from design flaws that result in security vulnerabilities and should not be used.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2014-06-10

Details

Check Text ( None )
None
Fix Text (F-43555r1_fix)
Only SSH protocol version 2 connections should be permitted. The default setting in "/etc/ssh/sshd_config" is correct, and can be verified by ensuring that the following line appears:

Protocol 2