Information
The operating system must not contain .shosts files.
Rationale:
The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.
Solution
Remove any found .shosts files from the system.
Refer to the list found in the Audit section and apply the path to the file in the example below:
# rm /[path]/[to]/[file]/.shosts
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72277
Rule ID: SV-86901r2_rule
STIG ID: RHEL-07-040540
Severity: CAT I