UCF STIG Viewer Logo

The SSH public host key files must have mode 0644 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-226993 GEN005522 SV-226993r603265_rule Medium
Description
If a public host key file is modified by an unauthorized user, the SSH service may be compromised.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-29155r485318_chk )
Check the permissions for SSH public host key files.
# ls -lL /etc/ssh/*key.pub
If any file has a mode more permissive than 0644, this is a finding.
Fix Text (F-29143r485319_fix)
Change the permissions for the SSH public host key files.
# chmod 0644 /etc/ssh/*key.pub