UCF STIG Viewer Logo

The AIX SSH daemon must not allow RhostsRSAAuthentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215305 AIX7-00-002123 SV-215305r508663_rule Medium
Description
If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request and not any user-specific authentication.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2022-06-06

Details

Check Text ( C-16503r294366_chk )
Check the SSH daemon configuration for the "RhostsRSAAuthentication" setting by running:
# grep -i RhostsRSAAuthentication /etc/ssh/sshd_config | grep -v '^#'

The above command should yield the following output:
RhostsRSAAuthentication no

If the setting is present and set to "yes", this is a finding.
Fix Text (F-16501r294367_fix)
Edit the "/etc/ssh/sshd_config file", add the following line, and save the change:
RhostsRSAAuthentication no

Restart the SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd