Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11989 | GEN002100 | SV-37389r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
.rhosts files are used to specify a list of hosts permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-01-09 |
Check Text ( C-36075r1_chk ) |
---|
Check the PAM configuration for rhosts_auth. Example: # grep rhosts_auth /etc/pam.d/* If a rhosts_auth entry is found, this is a finding. |
Fix Text (F-31319r1_fix) |
---|
Edit the file(s) in /etc/pam.d referencing the rhosts_auth module, and remove the references to the rhosts_auth module. |