GEN002040 - There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.

Information

The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.

Solution

Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-227689r603266_rule, STIG-ID|GEN002040, STIG-Legacy|SV-40332, STIG-Legacy|V-11988, Vuln-ID|V-227689

Plugin: Unix

Control ID: ac262414e251fc334a7ee0cca7d014540df7eb19a114a5ce12ec896cdf5ef1cf