UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SSH daemon must limit connections to a single session.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN005533-ESXI5-000109 GEN005533-ESXI5-000109 GEN005533-ESXI5-000109_rule Low
Description
The SSH protocol has the ability to provide multiple sessions over a single connection without reauthentication. A compromised client could use this feature to establish additional sessions to a system without consent or knowledge of the user.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN005533-ESXI5-000109_chk )
Disable lock down mode. Enable the ESXi Shell. Login as root and execute the following command(s):
# grep MaxSessions /etc/ssh/sshd_config

If "MaxSessions" is not set to "1" or the keyword/line is missing, this is a finding.

Re-enable lock down mode.
Fix Text (F-GEN005533-ESXI5-000109_fix)
Disable lock down mode. Enable the ESXi Shell. Login as root and execute the following command(s):
# vi /etc/ssh/sshd_config

Add/modify the "MaxSessions" keyword to "1", i.e.; MaxSessions= 1

Re-enable lock down mode.