Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-216119 | SOL-11.1-040380 | SV-216119r603268_rule | Low |
Description |
---|
This requirement applies to both internal and external networks. Terminating network connections associated with communications sessions means de-allocating associated TCP/IP address/port pairs at the operating system level. The time period of inactivity may, as the organization deems necessary, be a set of time periods by type of network access or for specific accesses. |
STIG | Date |
---|---|
Solaris 11 X86 Security Technical Implementation Guide | 2020-12-04 |
Check Text ( C-17357r372739_chk ) |
---|
Determine if SSH is configured to disconnect sessions after 10 minutes of inactivity. # grep ClientAlive /etc/ssh/sshd_config If the output of this command is not: ClientAliveInterval 600 ClientAliveCountMax 0 this is a finding. |
Fix Text (F-17355r372740_fix) |
---|
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. Modify the sshd_config file: # pfedit /etc/ssh/sshd_config Modify or add the lines containing: ClientAliveInterval ClientAliveCountMax Change them to: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service: # svcadm restart svc:/network/ssh |