Information
The operating system must not contain shosts.equiv files.
Rationale:
The shosts.equiv files are used to configure host-based authentication for the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.
Solution
Remove any found shosts.equiv files from the system.
Refer to the list found in the Audit section and apply the path to the file in the example below:
# rm /[path]/[to]/[file]/shosts.equiv
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72279
Rule ID: SV-86903r2_rule
STIG ID: RHEL-07-040550
Severity: CAT I