6.4 Disable .rhosts Support in /etc/pam.conf

Information

Used in conjunction with the BSD-style 'r-commands' (rlogin, rsh, rcp), .rhosts files implement a weak form of authentication based on the network address or host name of the remote computer (which can be spoofed by a potential attacker to exploit the local system).

Solution

Perform the following to implement the recommended state-
cd /etc
sed -e 's/^.*pam_rhosts_auth/#&/' < /etc/pam.conf > pam.conf.new
mv pam.conf.new pam.conf
pkgchk -f -n -p /etc/pam.conf

See Also

https://workbench.cisecurity.org/files/614

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-14a., 800-53|IA-5

Plugin: Unix

Control ID: 12c694d1a44a8427bcb009e3c3b297a0b315c52104a44332b58929dcd37972be