UCF STIG Viewer Logo

The .rhosts file must not be supported in PAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11989 GEN002100 SV-40334r1_rule ECCD-1 ECCD-2 Medium
Description
The .rhosts files are used to specify a list of hosts that are permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements.
STIG Date
SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2015-09-17

Details

Check Text ( None )
None
Fix Text (F-11250r2_fix)
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module.