Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-12022 | GEN005540 | SV-40279r1_rule | ECSC-1 | Medium |
Description |
---|
The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized addresses. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-39122r1_chk ) |
---|
Check the TCP wrappers configuration files to determine if SSHD is configured to use TCP wrappers. Procedure: # egrep '^[^#:]*(ALL|sshd)' /etc/hosts.deny # egrep '^[^#:]*(ALL|sshd)' /etc/hosts.allow If neither of the hosts.deny or hosts.allow files exist, this is a finding. If no entries are returned, the TCP wrappers are not configured for SSHD, this is a finding. |
Fix Text (F-11281r2_fix) |
---|
Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files. |