RHEL 8 must enforce SSHv2 for network access to all accounts.

STIG ID: RHEL-08-040060  |  SRG: SRG-OS-000112-GPOS-00057 |  Severity: high |  CCI: CCI-001941 |  Vulnerability Id: V-230501 | 

Vulnerability Discussion

A replay attack may enable an unauthorized user to gain access to RHEL 8. Authentication sessions between the authenticator and RHEL 8 validating the user credentials must not be vulnerable to a replay attack.

An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message.

A privileged account is any information system account with authorizations of a privileged user.

Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one-time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators.

RHEL 8 incorporates OpenSSH as a default ssh provider. OpenSSH has been a 100 percent SSHv2 implementation since version 7.6 in late 2017 and dropped support of SSH protocol version 1.

Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058

Check

Verify that RHEL 8 enforces SSH protocol 2 for network access.

Check the SSH version that RHEL 8 is using with the following command:

$ sudo yum list installed openssh

openssh.x86_64 8.0p1-3.el8

If the version of OpenSSH is newer than 7.6 the system is utilizing SSHv2 and is compliant.

If the version of OpenSSH is older than 7.6 or is a different SSH package, check the protocol versions that SSH allows with the following command:

$ sudo grep -i protocol /etc/ssh/sshd_config

Protocol 2

If the returned line allows for use of protocol "1", is commented out, or the line is missing, this is a finding.

Fix

Configure RHEL 8 to enforce SSHv2 for network access to all accounts via OpenSSH or by updating the SSH configuration to enforce SSHv2.

Install OpenSSH with the following command:

$ sudo yum -y install openssh.x86_64

or

Add or update the following line in the "/etc/ssh/sshd_config" file:

Protocol 2

Restart the ssh service.

$ sudo systemctl restart sshd.service