The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-216119 | SOL-11.1-040380 | SV-216119r970703_rule | Low |
Description |
This requirement applies to both internal and external networks. Terminating network connections associated with communications sessions means de-allocating associated TCP/IP address/port pairs at the operating system level. The time period of inactivity may, as the organization deems necessary, be a set of time periods by type of network access or for specific accesses. |
STIG | Date |
Solaris 11 X86 Security Technical Implementation Guide | 2024-11-25 |
Details
Check Text (C-17357r372739_chk) |
Determine if SSH is configured to disconnect sessions after 10 minutes of inactivity. # grep ClientAlive /etc/ssh/sshd_config If the output of this command is not: ClientAliveInterval 600 ClientAliveCountMax 0 this is a finding. |
Fix Text (F-17355r372740_fix) |
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. Modify the sshd_config file: # pfedit /etc/ssh/sshd_config Modify or add the lines containing: ClientAliveInterval ClientAliveCountMax Change them to: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service: # svcadm restart svc:/network/ssh |