Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11988 | GEN002040 | SV-12489r2_rule | ECCD-1 ECCD-2 | High |
Description |
---|
The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system. |
STIG | Date |
---|---|
Solaris 9 X86 Security Technical Implementation Guide | 2013-01-10 |
Check Text ( C-7953r2_chk ) |
---|
Check for the existence of the files. # find / -name .rhosts # find / -name .shosts # find / -name hosts.equiv # find / -name shosts.equiv If .rhosts, .shosts, hosts.equiv, or shosts.equiv are found, this is a finding. |
Fix Text (F-11249r2_fix) |
---|
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files. |