The rhost-based authentication for SSH must be disabled.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-216116SRG-OS-000480SOL-11.1-040350SV-216116r959010_rule2024-11-253
Description
Setting this parameter forces users to enter a password when authenticating with SSH.
ℹ️ Check
Determine if rhost-based authentication is enabled. # grep "^IgnoreRhosts" /etc/ssh/sshd_config If the output is produced and it is not: IgnoreRhosts yes this is a finding. If the IgnoreRhosts line does not exist in the file, the default setting of "Yes" is automatically used and there is no finding.
✔️ Fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: IgnoreRhosts Change it to: IgnoreRhosts yes Restart the SSH service. # svcadm restart svc:/network/ssh This action will only set the IgnoreRhosts line if it already exists in the file to ensure that it is set to the proper value. If the IgnoreRhosts line does not exist in the file, the default setting of "Yes" is automatically used, so no additional changes are needed.