UCF STIG Viewer Logo

All .rhosts, .shosts, or host.equiv files must only contain trusted host-user pairs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4427 GEN002020 SV-38438r1_rule ECCD-1 ECCD-2 Medium
Description
If these files are not properly configured, they could allow malicious access by unknown malicious users from untrusted hosts who could compromise the system.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-36375r1_chk )
Locate and examine all .rhosts, .shosts, hosts.equiv, and shosts.equiv files.

Procedure:
# find / -name .rhosts
# more //.rhosts

# find / -name .shosts
# more //.shosts

# find / -name hosts.equiv
# more //hosts.equiv

# find / -name shosts.equiv
# more //shosts.equiv

If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains anything other than host-user pairs, this is a finding.
Fix Text (F-32971r1_fix)
Locate and examine all .rhosts, .shosts, hosts.equiv, and shosts.equiv files.

Procedure:
# find / -name .rhosts
# more //.rhosts

# find / -name .shosts
# more //.shosts

# find / -name hosts.equiv
# more //hosts.equiv

# find / -name shosts.equiv
# more //shosts.equiv

If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains anything other than host-user pairs, this is a finding.