5.2.33 Ensure no 'shosts.equiv' files exist on the system - shosts.equiv files exist on the system

Information

The operating system must not contain shosts.equiv files.

Rationale:

The shosts.equiv files are used to configure host-based authentication for the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.

Solution

Remove any found shosts.equiv files from the system.
Refer to the list found in the Audit section and apply the path to the file in the example below:

# rm /[path]/[to]/[file]/shosts.equiv

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72279

Rule ID: SV-86903r2_rule

STIG ID: RHEL-07-040550

Severity: CAT I

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., 800-53|CM-7b.

Plugin: Unix

Control ID: 3239fe16dca13a5c8dff0d66f86bc351281db0d493a81f06685918a7861ba5cb