Skip to content

The Red Hat Enterprise Linux operating system must not contain .shosts files.

An XCCDF Rule

Description

The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it does not require interactive identification and authentication of a connection request, or for the use of two-factor authentication.

ID
SV-204606r603261_rule
Version
RHEL-07-040540
Severity
High
References
Updated

Remediation Templates

A Manual Procedure

Remove any found ".shosts" files from the system.

# rm /[path]/[to]/[file]/.shosts