UCF STIG Viewer Logo

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11988 GEN002040 SV-38249r1_rule ECCD-1 ECCD-2 High
Description
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36421r1_chk )
Check for the existence of the files.

# find / -type f -name .rhosts
# find / -type f -name .shosts
# find / -type f -name hosts.equiv
# find / -type f -name shosts.equiv

If .rhosts, .shosts, hosts.equiv, or shosts.equiv are found, this is a finding.
Fix Text (F-31760r1_fix)
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.