ansible-hardening/doc/metadata/rhel7/RHEL-07-040190.rst
Major Hayden 4405271e69 [Docs] Configure sshd based on the RHEL 7 STIG
This patch is a follow-on docs patch for the sshd configuration work.

Implements: blueprint security-rhel7-stig
Change-Id: Ie140302bd0a20282f2f08a1296e04217e52da114
2016-11-10 16:29:37 -06:00

951 B

---id: RHEL-07-040190 status: implemented tag: sshd ---

The ClientAliveInterval configuration is set to 600 in /etc/ssh/sshd_config and sshd is restarted.

Deployers can adjust the length of the interval by changing the following Ansible variable:

security_sshd_client_alive_interval: 600

Note

The STIG requires that ClientAliveInterval is set to 600 and ClientAliveCountMax is set to zero, which sets a 10 minute session timeout. If no data is transferred in a 10 minute period, the session is disconnected.

The ClientAliveInterval specifies how long the ssh daemon waits before it sends a message to the client to see if it is still alive. The ClientAliveCountMax specifies how many of these messages are sent without receiving a response.

Deployers should refer to stig-RHEL-07-040191 to customize the ClientAliveCountMax setting.