Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11988 | GEN002040 | SV-37370r1_rule | ECCD-1 ECCD-2 | High |
Description |
---|
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2016-07-22 |
Check Text ( None ) |
---|
None |
Fix Text (F-31301r1_fix) |
---|
Remove all the r-commands access control files. Procedure: # find / -name .rhosts -exec rm {} \; # find / -name .shosts -exec rm {} \; # find / -name hosts.equiv -exec rm {} \; # find / -name shosts.equiv -exec rm {} \; |