UCF STIG Viewer Logo

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11988 GEN002040 SV-37370r1_rule ECCD-1 ECCD-2 High
Description
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-31301r1_fix)
Remove all the r-commands access control files.

Procedure:
# find / -name .rhosts -exec rm {} \;
# find / -name .shosts -exec rm {} \;
# find / -name hosts.equiv -exec rm {} \;
# find / -name shosts.equiv -exec rm {} \;