OL07-00-040180 |
V3R1 |
The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications. |
|
OL07-00-040190 |
V3R1 |
The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications. |
|
OL07-00-040200 |
V3R1 |
The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications. |
|
OL07-00-040400 |
V3R1 |
The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. |
|
OL08-00-010287 |
V2R2 |
The OL 8 SSH daemon must be configured to use system-wide crypto policies. |
|
OL08-00-010293 |
V2R2 |
The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package. |
|
OL08-00-010294 |
V2R2 |
The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package. |
|
OL08-00-010295 |
V2R2 |
The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package. |
|
OL08-00-040342 |
V2R2 |
OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
RHEL-07-040180 |
V3R9 |
The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications. |
|
RHEL-07-040190 |
V3R9 |
The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications. |
|
RHEL-07-040200 |
V3R9 |
The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications. |
|
RHEL-07-040400 |
V3R9 |
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. |
|
RHEL-08-010290 |
V2R1 |
The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. |
|
RHEL-08-010291 |
V2R1 |
The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections. |
|
RHEL-08-010293 |
V2R1 |
The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package. |
|
RHEL-08-010294 |
V2R1 |
The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package. |
|
RHEL-08-010295 |
V2R1 |
The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package. |
|
RHEL-08-010287 |
V2R1 |
The RHEL 8 SSH daemon must be configured to use system-wide crypto policies. |
|
RHEL-08-040342 |
V2R1 |
RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
RHEL-09-255055 |
V2R2 |
RHEL 9 SSH daemon must be configured to use system-wide crypto policies. |
|
RHEL-09-255060 |
V2R2 |
RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections. |
|
RHEL-09-255065 |
V2R2 |
RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections. |
|
RHEL-09-255075 |
V2R2 |
RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms. |
|
RHEL-09-672030 |
V2R2 |
RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package. |
|
RHEL-09-672035 |
V2R2 |
RHEL 9 must implement DOD-approved encryption in the OpenSSL package. |
|
RHEL-09-672040 |
V2R2 |
RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package. |
|
SLES-12-030270 |
V3R1 |
The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
SLES-15-040450 |
V2R2 |
The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
UBTU-18-010417 |
V2R15 |
The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications. |
|
UBTU-18-010421 |
V2R15 |
The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
UBTU-20-010045 |
V2R1 |
The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. |
|
UBTU-22-255055 |
V2R2 |
Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission. |
|
WN10-CC-000285 |
V3R2 |
The Remote Desktop Session Host must require secure RPC communications. |
|
WN11-CC-000285 |
V2R2 |
The Remote Desktop Session Host must require secure RPC communications. |
|
WN16-CC-000400 |
V2R9 |
The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications. |
|
WN16-CC-000410 |
V2R9 |
Remote Desktop Services must be configured with the client connection encryption set to High Level. |
|