9.12 Check for Presence of User .rhosts Files

Information

While no .rhosts files are shipped with Solaris, users can easily create them.

Rationale:

This action is only meaningful if .rhosts support is permitted in the PAM configuration. Even though the .rhosts files are ineffective if support is disabled in the PAM configuration, they may have been brought over from other systems and could contain information useful to an attacker for those other systems.

Solution

Correct or justify any items discovered in the Audit step. Determine if any user .rhosts files are present in user directories and work with those users to determine the best course of action in accordance with site policy.

See Also

https://workbench.cisecurity.org/benchmarks/4777

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|16.4

Plugin: Unix

Control ID: 222df801bc22a66b6eb645fc31e4d9998c8f7b8343890ff562dfe5f3fe306e84