STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215346

CAT I (High)

The AIX rsh daemon must be disabled.

Rule ID

SV-215346r987796_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000197

Discussion

The rsh daemon permits username and passwords to be passed over the network in clear text.

Check Content

From the command prompt, run the following command:
# grep -v "^#" /etc/inetd.conf |grep rshd 

The above command may show the daemon is enabled like this:
shell   stream  tcp6    nowait  root    /usr/sbin/rshd  rshd 

If the above grep command returned a line that contains "rshd", this is a finding.

Fix Text

Edit the "/etc/inetd.conf" file and comment out the "rshd" service. 

Restart the inetd service:
# refresh -s inetd