Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Resources
Documents
Publishers
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
SRG-OS-000250-GPOS-00093
SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.
SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.
An XCCDF Rule
Details
Profiles
Prose
SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.
High Severity
<VulnDiscussion>Without cryptographic integrity protections provided by FIPS 140-2/140-3 validated cryptographic algorithms, information can be viewed and altered by unauthorized users without detection. The system will attempt to use the first algorithm presented by the client that matches the server list. Listing the values "strongest to weakest" is a method to ensure the use of the strongest algorithm available to secure the SSH connection.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>