Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11989 | GEN002100 | SV-40334r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
The .rhosts files are used to specify a list of hosts that are permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements. |
STIG | Date |
---|---|
SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE | 2015-03-31 |
Check Text ( C-39211r1_chk ) |
---|
Check the PAM configuration for rhosts_auth. Procedure: # grep rhosts_auth /etc/pam.conf If a rhosts_auth entry is found that is not commented out, this is a finding. |
Fix Text (F-11250r2_fix) |
---|
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module. |