UCF STIG Viewer Logo

The SSH daemon must not permit user environment settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218003 RHEL-06-000241 SV-218003r505923_rule Low
Description
SSH environment options potentially allow users to bypass access restriction in some configurations.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19484r377024_chk )
To ensure users are not able to present environment daemons, run the following command:

# grep PermitUserEnvironment /etc/ssh/sshd_config

If properly configured, output should be:

PermitUserEnvironment no


If it is not, this is a finding.
Fix Text (F-19482r377025_fix)
To ensure users are not able to present environment options to the SSH daemon, add or correct the following line in "/etc/ssh/sshd_config":

PermitUserEnvironment no