Skip to content

The Photon operating system must be configured to protect the Secure Shell ( SSH) private host key from unauthorized access.

An XCCDF Rule

Description

<VulnDiscussion>If an unauthorized user obtains the private SSH host key file, the host could be impersonated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-256578r942497_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

At the command line, run the following commands for each returned file:

# chmod 600 <file>
# chown root:root <file>