UCF STIG Viewer Logo

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11988 GEN002040 SV-38249r1_rule ECCD-1 ECCD-2 High
Description
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-01-27

Details

Check Text ( None )
None
Fix Text (F-31760r1_fix)
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.