Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-11989 | GEN002100 | SV-12490r2_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
The .rhosts files are used to specify a list of hosts that are permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements. |
STIG | Date |
---|---|
SOLARIS 9 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE | 2015-10-01 |
Check Text ( C-7954r2_chk ) |
---|
Check the PAM configuration for rhosts_auth. Procedure: # grep rhosts_auth /etc/pam.conf If a rhosts_auth entry is found, this is a finding. |
Fix Text (F-11250r2_fix) |
---|
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module. |