UCF STIG Viewer Logo

The rsh daemon must not be running.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4687 GEN003820 SV-37441r1_rule EBRU-1 High
Description
The rshd process provides a typically unencrypted, host-authenticated remote access service. SSH should be used in place of this service.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-31359r1_fix)
Edit /etc/xinetd.d/rsh and set "disable=yes".