UCF STIG Viewer Logo

The SSH daemon must ignore .rhosts files.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63193 ESXI-06-000012 SV-77683r1_rule Medium
Description
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.
STIG Date
VMware vSphere ESXi 6.0 Security Technical Implementation Guide 2019-01-04

Details

Check Text ( C-63927r1_chk )
To verify how the SSH daemon's "IgnoreRhosts" option is set, run the following command:

# grep -i "^IgnoreRhosts" /etc/ssh/sshd_config

If there is no output or the output is not exactly "IgnoreRhosts yes", this is a finding.
Fix Text (F-69111r1_fix)
SSH can emulate the behavior of the obsolete rsh command in allowing users to enable insecure access to their accounts via ".rhosts" files.

Add or correct the following line in "/etc/ssh/sshd_config":

IgnoreRhosts yes