The SUSE operating system SSH daemon must encrypt forwarded remote X connections for interactive users.

From SLES 12 Security Technical Implementation Guide

Part of SRG-OS-000480-GPOS-00227

Associated with: CCI-000366

SV-92169r1_rule The SUSE operating system SSH daemon must encrypt forwarded remote X connections for interactive users.

Vulnerability discussion

Open X displays allow an attacker to capture keystrokes and execute commands remotely.

Check content

Verify the SUSE operating system SSH daemon remote X forwarded connections for interactive users are encrypted. Check that SSH remote X forwarded connections are encrypted with the following command: # sudo grep -i x11forwarding /etc/ssh/sshd_config X11Forwarding yes If the "X11Forwarding" keyword is set to "no", is missing, or is commented out, this is a finding.

Fix text

Configure the SUSE operating system SSH daemon to encrypt forwarded X connections for interactive users. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "yes" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding yes

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer