RHEL-10-700530 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow rhosts authentication.

Information

SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.

OpenSSH uses the first occurrence of a keyword it sees, and drop-in files are read in lexicographical order at the start of the configuration. Red Hat recommends using drop-in files rather than changing base configuration files.

Solution

Configure RHEL 10 SSH daemons to not allow rhosts authentication.

In "/etc/ssh/sshd_config.d", create a drop file that will lexicographically precede 50-redhat.conf and add the following line:

IgnoreRhosts yes

Restart the SSH service with the following command for the changes to take effect:

$ sudo systemctl restart sshd.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-6a., CAT|II, CCI|CCI-002696, Rule-ID|SV-281256r1184756_rule, STIG-ID|RHEL-10-700530, Vuln-ID|V-281256

Plugin: Unix

Control ID: 22a3ba9a7776c9018b18749e259ac69960e0baedf2967923a4b0064d626ef23e