UCF STIG Viewer Logo

The .rhosts file must not be supported in PAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227691 GEN002100 SV-227691r603266_rule Medium
Description
The .rhosts files are used to specify a list of hosts that are permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-29853r488654_chk )
Check the PAM configuration for rhosts_auth.

Procedure:
# grep rhosts_auth /etc/pam.conf

If a rhosts_auth entry is found that is not commented out, this is a finding.
Fix Text (F-29841r488655_fix)
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module.