Rule ID
SV-256385r984206_rule
Version
V1R4
CCIs
CCI-000767
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable insecure access to their accounts via ".rhosts" files.
From an ESXi shell, run the following command: # /usr/lib/vmware/openssh/bin/sshd -T|grep ignorerhosts Expected result: ignorerhosts yes If the output does not match the expected result, this is a finding.
From an ESXi shell, add or correct the following line in "/etc/ssh/sshd_config": IgnoreRhosts yes