The Photon operating system must be configured to protect the Secure Shell (SSH) private host key from unauthorized access.
An XCCDF Rule
Description
<VulnDiscussion>If an unauthorized user obtains the private SSH host key file, the host could be impersonated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-258896r933749_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
At the command line, run the following commands for each returned file:
# chmod 600 <file>
# chown root:root <file>
# systemctl restart sshd.service