UCF STIG Viewer Logo

The .rhosts file must not be supported in PAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11989 GEN002100 SV-38264r2_rule Medium
Description
.rhosts files are used to specify a list of hosts permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-01-27

Details

Check Text ( None )
None
Fix Text (F-31761r1_fix)
Edit /etc/pam.conf and comment/remove the "rcomds" line(s).