UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The rsh daemon must not be running.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4687 GEN003820 SV-37441r1_rule EBRU-1 High
Description
The rshd process provides a typically unencrypted, host-authenticated remote access service. SSH should be used in place of this service.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36113r1_chk )
Check to see if rshd is configured to run on startup.

Procedure:
# grep disable /etc/xinetd.d/rsh

If /etc/xinetd.d/rsh exists and rsh is found to be enabled, this is a finding.
Fix Text (F-31359r1_fix)
Edit /etc/xinetd.d/rsh and set "disable=yes".