UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

There must be no .shosts files on the RHEL 8 operating system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-230284 RHEL-08-010470 SV-230284r627750_rule High
Description
The ".shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.
STIG Date
Red Hat Enterprise Linux 8 Security Technical Implementation Guide 2022-12-06

Details

Check Text ( C-32953r567598_chk )
Verify there are no ".shosts" files on RHEL 8 with the following command:

$ sudo find / -name '*.shosts'

If any ".shosts" files are found, this is a finding.
Fix Text (F-32928r567599_fix)
Remove any found ".shosts" files from the system.

$ sudo rm /[path]/[to]/[file]/.shosts