The Red Hat Enterprise Linux operating system must not contain .shosts files.
An XCCDF Rule
Description
The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.
- ID
- SV-204606r603261_rule
- Version
- RHEL-07-040540
- Severity
- High
- References
- Updated
Remediation Templates
A Manual Procedure
Remove any found ".shosts" files from the system.
# rm /[path]/[to]/[file]/.shosts