UCF STIG Viewer Logo

There must be no ".shosts" files on the OL 8 operating system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-248598 OL08-00-010470 SV-248598r779360_rule High
Description
The ".shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.
STIG Date
Oracle Linux 8 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-52032r779358_chk )
Verify there are no ".shosts" files on OL 8 with the following command:

$ sudo find / -name '*.shosts'

If any ".shosts" files are found, this is a finding.
Fix Text (F-51986r779359_fix)
Remove any found ".shosts" files from the system.

$ sudo rm /[path]/[to]/[file]/.shosts