Details
Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance.
Note: That this does not imply FIPS 140-2 certification.
Solution
Limit the ciphers to those algorithms which are FIPS-approved. Counter (CTR) mode is also preferred over cipher-block chaining (CBC) mode.
Add or correct the following line in ‘/etc/ssh/sshd_config’:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.
References
- 800-53|SC-13
- CAT|II
- CCI|CCI-002450
- Group-ID|V-63501
- Rule-ID|SV-77991r2_rule
- STIG-ID|ESXI-06-100010
- Vuln-ID|V-63501