5.3.36 Ensure no '.shosts' files exist on the system - .shosts files exist on the system

Information

The operating system must not contain .shosts files.

Rationale:

The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.

Solution

Remove any found .shosts files from the system.
Refer to the list found in the Audit section and apply the path to the file in the example below:

# rm /[path]/[to]/[file]/.shosts

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CCI|CCI-000366, CSCv6|9.1, Rule-ID|SV-204606r603261_rule, STIG-ID|RHEL-07-040540

Plugin: Unix

Control ID: 7bf68eef58a0421521a12a52c9249da3f32feae7b87d4f6ee0a93da851b55195