Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38617 | RHEL-06-000243 | SV-50418r2_rule | Medium |
Description |
---|
Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2019-09-25 |
Check Text ( C-46176r2_chk ) |
---|
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command: # grep -i "ciphers" /etc/ssh/sshd_config | grep -v '^#' If the output contains ciphers that are not FIPS-approved, or does not return a value, this is a finding. |
Fix Text (F-43566r2_fix) |
---|
Limit the ciphers to FIPS-approved algorithms. The following line in "/etc/ssh/sshd_config" demonstrates the use of FIPS-approved ciphers: Ciphers aes128-ctr,aes192-ctr,aes256-ctr The man page "sshd_config(5)" contains a list of supported ciphers. |