Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-63193 | ESXI-06-000012 | SV-77683r1_rule | Medium |
Description |
---|
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. |
STIG | Date |
---|---|
VMware vSphere ESXi 6.0 Security Technical Implementation Guide | 2017-07-11 |
Check Text ( C-63927r1_chk ) |
---|
To verify how the SSH daemon's "IgnoreRhosts" option is set, run the following command: # grep -i "^IgnoreRhosts" /etc/ssh/sshd_config If there is no output or the output is not exactly "IgnoreRhosts yes", this is a finding. |
Fix Text (F-69111r1_fix) |
---|
SSH can emulate the behavior of the obsolete rsh command in allowing users to enable insecure access to their accounts via ".rhosts" files. Add or correct the following line in "/etc/ssh/sshd_config": IgnoreRhosts yes |