Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Red Hat Enterprise Linux 8
System Settings
Installing and Maintaining Software
System and Software Integrity
System Cryptographic Policies
Configure SSH Client to Use FIPS 140-2 Validated Ciphers: openssh.config
Configure SSH Client to Use FIPS 140-2 Validated Ciphers: openssh.config
An XCCDF Rule
Details
Profiles
Prose
Configure SSH Client to Use FIPS 140-2 Validated Ciphers: openssh.config
High Severity
Crypto Policies provide a centralized control over crypto algorithms usage of many packages. OpenSSH is supported by system crypto policy, but the OpenSSH configuration may be set up incorrectly. To check that Crypto Policies settings for ciphers are configured correctly, ensure that
/etc/crypto-policies/back-ends/openssh.config
contains the following line and is not commented out:
Ciphers