Verify Group Ownership on SSH Server Private *_key Key Files
An XCCDF Rule
Description
SSH server private keys, files that match the/etc/ssh/*_key
glob, must be
group-owned by ssh_keys
group.
Rationale
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
- ID
- xccdf_org.ssgproject.content_rule_file_groupownership_sshd_private_key
- Severity
- Medium
- References
- Updated
Remediation Templates
A Shell Script
# Remediation is applicable only in certain platforms
if rpm --quiet -q kernel; then
find -L /etc/ssh/ -maxdepth 1 -type f ! -group ssh_keys -regextype posix-extended -regex '^.*_key$' -exec chgrp -L ssh_keys {} \;
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
An Ansible Snippet
- name: Gather the package facts
package_facts:
manager: auto
tags:
- configure_strategy
- file_groupownership_sshd_private_key