Information
The HostbasedAuthentication parameter specifies if authentication is allowed through trusted hosts via the user ofrhosts or /etc/hosts.equiv along with successful public key client host authentication.
Host-based authentication is a method to authenticate users (rather than requiring password or key-based authentication method).Used at a system level by OpenSSH requires the file /etc/shosts.equiv to contain a list of so-called
trusted
hosts.When this method is active any user on a trusted host can login to the server as
authenticated
because the server identity the user imitates the connection from (aka the OpenSSH client) authentificatees the user as
trusted
.
Since this feature disables user-based authentication from some hosts - our recommendation is to disable host-based authentication.
Solution
Edit the /etc/ssh/sshd_config file to set the parameter above any Match entries as follows:
HostbasedAuthentication no
Re-cycle the sshd daemon to pick up the configuration changes:
stopsrc -s sshd
startsrc -s sshd
Note: First occurrence of a option takes precedence, Match set statements withstanding.