Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-215305 | AIX7-00-002123 | SV-215305r877377_rule | Medium |
Description |
---|
If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request and not any user-specific authentication. |
STIG | Date |
---|---|
IBM AIX 7.x Security Technical Implementation Guide | 2023-02-13 |
Check Text ( C-16503r294366_chk ) |
---|
Check the SSH daemon configuration for the "RhostsRSAAuthentication" setting by running: # grep -i RhostsRSAAuthentication /etc/ssh/sshd_config | grep -v '^#' The above command should yield the following output: RhostsRSAAuthentication no If the setting is present and set to "yes", this is a finding. |
Fix Text (F-16501r294367_fix) |
---|
Edit the "/etc/ssh/sshd_config file", add the following line, and save the change: RhostsRSAAuthentication no Restart the SSH daemon: # stopsrc -s sshd # startsrc -s sshd |