There must be no user .rhosts files.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
high | V-216184 | SRG-OS-000480 | SOL-11.1-070050 | SV-216184r959010_rule | 2024-11-25 | 3 |
Description |
---|
Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from other systems and could contain information useful to an attacker for those other systems. |
ℹ️ Check |
---|
The root role is required. Check for the presence of .rhosts files. # for dir in \ `logins -ox | awk -F: '($8 == "PS") { print $6 }'`; do find ${dir}/.rhosts -type f -ls 2>/dev/null done If output is produced, this is a finding. |
✔️ Fix |
---|
The root role is required. Remove any .rhosts files found. # rm [file name] |