Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11989 | GEN002100 | SV-38845r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
The .rhosts files are used to specify a list of hosts permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements. |
STIG | Date |
---|---|
Draft AIX Security Technical Implementation Guide | 2011-08-17 |
Check Text ( C-37837r1_chk ) |
---|
Check the PAM configuration for rhosts_auth. Procedure: # grep rhosts_auth /etc/pam.conf |grep -v \# If a rhosts_auth entry is found, this is a finding. |
Fix Text (F-33100r1_fix) |
---|
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module. |