RHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-230230RHEL-08-010100SV-230230r1069287_ruleCCI-000186medium
Description
If an unauthorized user obtains access to a private key without a passcode, that user would have unauthorized access to any system where the associated public key has been installed.
STIGDate
Red Hat Enterprise Linux 8 Security Technical Implementation Guide2025-05-14

Details

Check Text (C-230230r1069287_chk)

Verify the SSH private key files have a passcode. For each private key stored on the system, use the following command: $ sudo ssh-keygen -y -f /path/to/file Enter passphrase: If the contents of the key are displayed, this is a finding.

Fix Text (F-32874r1069183_fix)

Create a new private and public key pair that utilizes a passcode with the following command: $ sudo ssh-keygen -p -f /path/to/file