UCF STIG Viewer Logo

The operating system, upon successful logon, must display to the user the date and time of the last logon or access via ssh.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218090 RHEL-06-000507 SV-218090r505923_rule Medium
Description
Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. At ssh login, a user must be presented with the last successful login date and time.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19571r377285_chk )
Verify the value associated with the "PrintLastLog" keyword in /etc/ssh/sshd_config:

# grep -i "^PrintLastLog" /etc/ssh/sshd_config

If the "PrintLastLog" keyword is not present, this is not a finding. If the value is not set to "yes", this is a finding.
Fix Text (F-19569r377286_fix)
Update the "PrintLastLog" keyword to "yes" in /etc/ssh/sshd_config:

PrintLastLog yes

While it is acceptable to remove the keyword entirely since the default action for the SSH daemon is to print the last logon date and time, it is preferred to have the value explicitly documented.