Skip to content

The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.

An XCCDF Rule

Description

<VulnDiscussion>SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH's cryptographic host-based authentication is more secure than ".rhosts" authentication since hosts are cryptographically authenticated. However, it is not recommended that hosts unilaterally trust one another, even within an organization.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-258761r933344_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

From an ESXi shell, run the following command:

# esxcli system ssh server config set -k hostbasedauthentication -v no

or