UCF STIG Viewer Logo

The SSH private host key files must have mode 0600 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227901 GEN005523 SV-227901r603266_rule Medium
Description
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-30063r490108_chk )
Check the permissions for SSH private host key files.
# ls -lL /etc/ssh/*key
If any file has a mode more permissive than 0600, this is a finding.
Fix Text (F-30051r490109_fix)
Change the permissions for the SSH private host key files.
# chmod 0600 /etc/ssh/*key