GEN002040 - There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the system.

Information

The .rhosts, .shosts, hosts.equiv, and shosts.equiv files are used to configure host-based authentication for individual users or the system. Host-based authentication is not sufficient for preventing unauthorized access to the system.

Solution

Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-226563r603265_rule, STIG-ID|GEN002040, STIG-Legacy|SV-40332, STIG-Legacy|V-11988, Vuln-ID|V-226563

Plugin: Unix

Control ID: 940d7969050e00f5c33c308a8cdba13f326ca05098526d26b2ea4f70a62bf954