UCF STIG Viewer Logo

There must be no user .rhosts files.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216421 SOL-11.1-070050 SV-216421r603267_rule High
Description
Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from other systems and could contain information useful to an attacker for those other systems.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2021-11-23

Details

Check Text ( C-17657r371351_chk )
The root role is required.

Check for the presence of .rhosts files.

# for dir in \
`logins -ox | awk -F: '($8 == "PS") { print $6 }'`; do
find ${dir}/.rhosts -type f -ls 2>/dev/null
done

If output is produced, this is a finding.
Fix Text (F-17655r371352_fix)
The root role is required.

Remove any .rhosts files found.

# rm [file name]