UCF STIG Viewer Logo

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215432 AIX7-00-003138 SV-215432r508663_rule Medium
Description
Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated access to a system.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2022-06-06

Details

Check Text ( C-16630r294747_chk )
Check for the existence of the files using:
# find / -name .rhosts
# find / -name .shosts
# find / -name hosts.equiv
# find / -name shosts.equiv

If ".rhosts", ".shosts", "hosts.equiv", or "shosts.equiv" are found, this is a finding.
Fix Text (F-16628r294748_fix)
Remove the ".rhosts", ".shosts", "hosts.equiv", and/or "shosts.equiv" files.