The SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
high | V-224044 | SRG-OS-000033-GPOS-00014 | TSS0-SH-000020 | SV-224044r1083018_rule | 2025-03-11 | 9 |
Description |
---|
Audit record content that may be necessary to satisfy this requirement includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Satisfies: SRG-OS-000033-GPOS-00014, SRG-OS-000120-GPOS-00061, SRG-OS-000250-GPOS-00093 |
ℹ️ Check |
---|
Locate the SSH daemon configuration file found in /etc/ssh/ directory. Alternately: From the Unix System Services ISPF Shell, navigate to ribbon select tools. Select option 1 - Work with Processes. If SSH Daemon is not active, this is not a finding. Examine SSH daemon configuration file. sshd_config If there are no Ciphers lines, or the ciphers list contains any cipher not starting with "aes", this is a finding. If the MACs line is not configured to "hmac-sha1" or greater, this is a finding. Examine the z/OS-specific sshd server systemwide configuration: zos_sshd_config If any of the following is untrue, this is a finding. FIPSMODE=YES CiphersSource=ICSF MACsSource=ICSF |
✔️ Fix |
---|
Edit the SSH daemon configuration and remove any ciphers not starting with "aes". If necessary, add a "Ciphers" line using FIPS 140-2 compliant algorithms. Configure for message authentication to MACs "hmac-sha1" or greater. Edit the z/OS-specific sshd server systemwide configuration file configuration as follows: FIPSMODE=YES CiphersSource=ICSF MACsSource=ICSF |