

Exploits of the SSH daemon could provide immediate root access to the system. SSHv1 is an insecure implementation of the SSH protocol and has many well-known vulnerability exploits. The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use the SSHv2 protocol. Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection.Ĭryptographic mechanisms used for protecting the integrity of. The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values. If a privileged user were to log on using. The FTP service provides an unencrypted remote access that does not provide for the confidentiality and integrity of user passwords or the remote session. The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed. If TFTP is required for operational support (such as the transmission of router configurations) its use must be documented with the Information System Security Officer (ISSO), restricted to only. The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support. If the service is running with the default authenticators, anyone. Whether active or not, default Simple Network Management Protocol (SNMP) community strings must be changed to maintain security. SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default. These unnecessary capabilities or services are often.

It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. The Red Hat Enterprise Linux operating system must not have the telnet-server package installed. Accounts with empty passwords should never be used in operational environments. If an account has an empty password, anyone could log on and run commands with the privileges of that account. The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords. The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.Ĭonfiguring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere. Findings (MAC III - Administrative Sensitive) Finding ID
