UCF STIG Viewer Logo

The SSH daemon must not permit tunnels.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63219 ESXI-06-000025 SV-77709r1_rule Medium
Description
OpenSSH has the ability to create network tunnels (layer-2 and layer-3) over an SSH connection. This function can provide similar convenience to a Virtual Private Network (VPN) with the similar risk of providing a path to circumvent firewalls and network ACLs.
STIG Date
VMware vSphere ESXi 6.0 Security Technical Implementation Guide 2019-01-04

Details

Check Text ( C-63953r1_chk )
To verify the PermitTunnel setting, run the following command:

# grep -i "^PermitTunnel" /etc/ssh/sshd_config

If there is no output or the output is not exactly "PermitTunnel no", this is a finding.
Fix Text (F-69137r1_fix)
To set the PermitTunnel setting, add or correct the following line in "/etc/ssh/sshd_config":

PermitTunnel no