UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SSH daemon must not permit tunnels.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63219 ESXI-06-000025 SV-77709r1_rule Medium
Description
OpenSSH has the ability to create network tunnels (layer-2 and layer-3) over an SSH connection. This function can provide similar convenience to a Virtual Private Network (VPN) with the similar risk of providing a path to circumvent firewalls and network ACLs.
STIG Date
VMware vSphere ESXi 6.0 Security Technical Implementation Guide 2017-01-06

Details

Check Text ( C-63953r1_chk )
To verify the PermitTunnel setting, run the following command:

# grep -i "^PermitTunnel" /etc/ssh/sshd_config

If there is no output or the output is not exactly "PermitTunnel no", this is a finding.
Fix Text (F-69137r1_fix)
To set the PermitTunnel setting, add or correct the following line in "/etc/ssh/sshd_config":

PermitTunnel no