AIX7-00-002122 - The AIX SSH daemon must be configured to not use host-based authentication.

Information

SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.

Solution

Edit '/etc/ssh/sshd_config' and add or update the 'HostbasedAuthentication' line as:
HostbasedAuthentication no

Save the change and restart ssh daemon:
# stopsrc -s sshd
# startsrc -s sshd

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-215304r991591_rule, STIG-ID|AIX7-00-002122, STIG-Legacy|SV-101845, STIG-Legacy|V-91747, Vuln-ID|V-215304

Plugin: Unix

Control ID: 64bc998cfac5c47ee87ff4450edeb44461a522fec945ecbbf159899dc9a2ab8c