There must be no user .rhosts files.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216184 | SOL-11.1-070050 | SV-216184r959010_rule | CCI-000366 | high |
| Description | ||||
| Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from other systems and could contain information useful to an attacker for those other systems. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216184r959010_chk)
The root role is required.
Check for the presence of .rhosts files.
# for dir in \
`logins -ox | awk -F: '($8 == "PS") { print $6 }'`; do
find ${dir}/.rhosts -type f -ls 2>/dev/null
done
If output is produced, this is a finding.
Fix Text (F-17420r372935_fix)
The root role is required.
Remove any .rhosts files found.
# rm [file name]