UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63189 ESXI-06-000010 SV-77679r2_rule Medium
Description
Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance. Note: This does not imply FIPS 140-2 certification.
STIG Date
VMware vSphere ESXi 6.0 Security Technical Implementation Guide 2017-07-11

Details

Check Text ( C-63923r2_chk )
Only FIPS-approved ciphers should be used. To verify that only FIPS-approved ciphers are in use, run the following command:

# grep -i "^Ciphers" /etc/ssh/sshd_config

If there is no output or the output is not exactly "Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc", this is a finding.
Fix Text (F-69107r2_fix)
Limit the ciphers to those algorithms which are FIPS-approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.

Add or correct the following line in "/etc/ssh/sshd_config":

Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc