Skip to content

The ESXi host Secure Shell (SSH) daemon must ignore ".rhosts" files.

An XCCDF Rule

Description

<VulnDiscussion>SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable insecure access to their accounts via ".rhosts" files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-256385r919018_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

From an ESXi shell, add or correct the following line in "/etc/ssh/sshd_config":

IgnoreRhosts yes