The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.
An XCCDF Rule
Description
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH's cryptographic host-based authentication is more secure than ".rhosts" authentication since hosts are cryptographically authenticated. However, it is not recommended that hosts unilaterally trust one another, even within an organization.
- ID
- SV-258761r959010_rule
- Version
- ESXI-80-000202
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
From an ESXi shell, run the following command:
# esxcli system ssh server config set -k hostbasedauthentication -v no
or