6.4 Disable .rhosts Support in /etc/pam.conf

Information

Used in conjunction with the BSD-style 'r-commands' (rlogin, rsh, rcp), .rhosts files implement a weak form of authentication based on the network address or host name of the remote computer (which can be spoofed by a potential attacker to exploit the local system).

Solution

Perform the following to implement the recommended state-
cd /etc
sed -e 's/^.*pam_rhosts_auth/#&/' < /etc/pam.conf > pam.conf.new
mv pam.conf.new pam.conf
pkgchk -f -n -p /etc/pam.conf

See Also

https://workbench.cisecurity.org/files/614

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-14a., 800-53|IA-5

Plugin: Unix

Control ID: e5a25a30f2f5c6aabfc96b8c2d9d97d29d637dd8477a957627d300f2d0f27b22