GEN002040 - There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system - '.shosts'

Information

The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.

Solution

Remove all the r-commands access control files.

Procedure:
# find / -name .rhosts -exec rm {} ;
# find / -name .shosts -exec rm {} ;
# find / -name hosts.equiv -exec rm {} ;
# find / -name shosts.equiv -exec rm {} ;

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-218348r603259_rule, STIG-ID|GEN002040, STIG-Legacy|SV-63621, STIG-Legacy|V-11988, Vuln-ID|V-218348

Plugin: Unix

Control ID: 6b4ea7ecf13adff005da30d9e8dd846eaf3a1e27b022f84de31d7c328f64dd40