UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Red Hat Enterprise Linux operating system must be configured so that remote X connections for interactive users are encrypted.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72303 RHEL-07-040710 SV-86927r4_rule High
Description
Open X displays allow an attacker to capture keystrokes and execute commands remotely.
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2020-05-15

Details

Check Text ( C-72537r5_chk )
Verify remote X connections for interactive users are encrypted.

Check that remote X connections are encrypted with the following command:

# grep -i x11forwarding /etc/ssh/sshd_config | grep -v "^#"

X11Forwarding yes

If the "X11Forwarding" keyword is set to "no" or is missing, this is a finding.
Fix Text (F-78657r6_fix)
Configure SSH to encrypt connections for interactive users.

Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "yes" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor):

X11Forwarding yes

The SSH service must be restarted for changes to take effect:

# systemctl restart sshd