UCF STIG Viewer Logo

The SSH daemon must be configured for IP filtering.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227907 GEN005540 SV-227907r603266_rule Medium
Description
The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized addresses.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-30069r490126_chk )
Check the TCP wrappers configuration files to determine if SSHD is configured to use TCP wrappers.

Procedure:
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.deny
# egrep '^[^#:]*(ALL|sshd)' /etc/hosts.allow

If neither of the hosts.deny or hosts.allow files exist, this is a finding.
If no entries are returned, the TCP wrappers are not configured for SSHD, this is a finding.
Fix Text (F-30057r490127_fix)
Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.