4.5.3.7 sshd_config: HostbasedAuthentication is 'no'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The recommendation is to ensure the sshd daemon is configured to prevent host-based authentication.

Rationale:

Host-based authentication is a method to authenticate users (rather than requiring password or key-based authentication method). Used at a system level by OpenSSH requires the file /etc/shosts.equiv to contain a list of so-called trusted hosts. When this method is active any user on a trusted host can login to the server as authenticated because the server identity the user imitates the connection from (aka the OpenSSH client) authentificatees the user as trusted.

Since this feature disables user-based authentication from some hosts - our recommendation is to disable host-based authentication.

Solution

Edit the /etc/ssh/sshd_config file to ensure that host based authentication is disallowed:

vi /etc/ssh/sshd_config

Replace:

#HostbasedAuthentication no

With:

HostbasedAuthentication no

Re-cycle the sshd daemon to pick up the configuration changes:

stopsrc -s sshd
startsrc -s sshd

Default Value:

HostbasedAuthentication no

Additional Information:

Reversion:

Revert to the default setting for the HostBasedAuthentication parameter:

vi /etc/ssh/sshd_config

Replace:

HostbasedAuthentication no

With:

# HostbasedAuthentication no

Re-cycle the sshd daemon to pick up the configuration changes:

stopsrc -s sshd

startsrc -s sshd

See Also

https://workbench.cisecurity.org/benchmarks/7851