Used in conjunction with the BSD-style 'r-commands' (rlogin, rsh, rcp), .rhosts files implement a weak form of authentication based on the network address or host name of the remote computer (which can be spoofed by a potential attacker to exploit the local system).
Solution
Perform the following to implement the recommended state- cd /etc sed -e 's/^.*pam_rhosts_auth/#&/' < /etc/pam.conf > pam.conf.new mv pam.conf.new pam.conf pkgchk -f -n -p /etc/pam.conf