SLEM-05-255090 - There must be no .shosts files on SLEM 5.

Information

The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system as it does not require interactive identification and authentication of a connection request or for the use of two-factor authentication.

Solution

Remove any ".shosts" files found on SLEM 5.

> sudo rm /<path_to_file>/.shosts

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SLEM_5_V1R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-261343r996489_rule, STIG-ID|SLEM-05-255090, Vuln-ID|V-261343

Plugin: Unix

Control ID: b9892c44a92f45af24bdf3c30d50cc9fd56ec061c72b2869e0d0b2b25e2a3f87