UCF STIG Viewer Logo

Consecutive login attempts for SSH must be limited to 3.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48099 SOL-11.1-040340 SV-60971r1_rule Low
Description
Setting the authentication login limit to a low value will disconnect the attacker and force a reconnect, which severely limits the speed of such brute-force attacks.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2017-04-28

Details

Check Text ( None )
None
Fix Text (F-51707r1_fix)
The root role is required.

Modify the sshd_config file.

# pfedit /etc/ssh/sshd_config

Locate the line containing:

MaxAuthTries

Change it to:

MaxAuthTries 6

Restart the SSH service.

# svcadm restart svc:/network/ssh

Note: Solaris SSH MaxAuthTries of 6 maps to 3 actual failed attempts.