There must be no user .rhosts files.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
highV-216184SRG-OS-000480SOL-11.1-070050SV-216184r959010_rule2024-11-253
Description
Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from other systems and could contain information useful to an attacker for those other systems.
ℹ️ Check
The root role is required. Check for the presence of .rhosts files. # for dir in \ `logins -ox | awk -F: '($8 == "PS") { print $6 }'`; do find ${dir}/.rhosts -type f -ls 2>/dev/null done If output is produced, this is a finding.
✔️ Fix
The root role is required. Remove any .rhosts files found. # rm [file name]