5.3.36 Ensure no ".shosts" files exist on the system

Information

The operating system must not contain .shosts files.

The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.

Solution

Remove any foundshosts files from the system.

Refer to the list found in the Audit section and apply the path to the file in the example below:

# rm /[path]/[to]/[file]/.shosts

See Also

https://workbench.cisecurity.org/benchmarks/8415

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b.

Plugin: Unix

Control ID: 781ac7be64daf6d39b48da7cd8f43e413dc8a932613c71eb54c21d73e2da896e