I firstly wanted to say "thank you!" for all the support that I have gained by reading the articles on this site - a major benefit for a web developer donning a sysadmin hat...
We are currently working to get our Web Server PCI compliant and have been going back and forth with TrustWave over CVE-2015-8325. We use a backported version of OpenSSH.
CentOS release 6.8 (Final)
3.2.69-82.art.x86_64
openssh-5.3p1-118.1.el6_8.x86_64
The final thing they are requesting is: "We require confirmation that user_readenv is off in pam_env module on this system."
I am looking for a way to confirm this from the shell but am striking out - per searches online it looks like the setting is disabled by default but I cannot find a way to confirm it.
If I run:
sshd -T
from the shell, its output contains the two following lines:
usepam no
uselogin no
I'm trying to determine if this is the only technique that I can use to get them what they are asking for or if there is a configuration file somewhere that specifically states "user_readenv=0" or something similar.
Thank you for your time, and let me know if you need more information.
=== Update ===
I provided TrustWave with the above information and they have approved the dispute. I still am interested if there is another way to confirm user_readenv is off for pam_env module - but if nothing comes up - I'll just mark the above as the answer - Thanks.