Details
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.
Solution
SSH can emulate the behavior of the obsolete rsh command in allowing users to enable insecure access to their accounts via '.rhosts' files.
Add or correct the following line in '/etc/ssh/sshd_config':
IgnoreRhosts yes
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|IA-2(3)
- CAT|II
- CCI|CCI-000767
- Group-ID|V-63193
- Rule-ID|SV-77683r1_rule
- STIG-ID|ESXI-06-000012
- Vuln-ID|V-63193
Comments
Please sign in to leave a comment.